<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-05-20T06:27:43</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20022443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2002-2443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443" source="CVE"/>
    <reference ref_id="SUSE CVE-2002-2443" ref_url="https://www.suse.com/security/cve/CVE-2002-2443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1122-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html" source="SUSE-SU"/>
    <description>
    schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2002-2443/">CVE-2002-2443</cve>
	<bugzilla href="https://bugzilla.suse.com/825985">SUSE bug 825985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871411">SUSE bug 871411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887734">SUSE bug 887734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-0801" ref_url="https://www.suse.com/security/cve/CVE-2004-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2004:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2004-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2006:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0950-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-0801/">CVE-2004-0801</cve>
	<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140679" comment="hplip-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140680" comment="hplip-hpijs-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140681" comment="hplip-sane-3.14.6-3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-2771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00097.html" source="SUSE-SU"/>
    <description>
    The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141041" comment="mailx-12.5-28.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-0855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2006:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2006:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<bugzilla href="https://bugzilla.suse.com/153057">SUSE bug 153057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0903</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-0903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0903" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-0903" ref_url="https://www.suse.com/security/cve/CVE-2006-0903" source="SUSE CVE"/>
    <description>
    MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function.  NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0903/">CVE-2006-0903</cve>
	<bugzilla href="https://bugzilla.suse.com/163157">SUSE bug 163157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-2607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-2607" ref_url="https://www.suse.com/security/cve/CVE-2006-2607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2006:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-05/msg00017.html" source="SUSE-SU"/>
    <description>
    do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-2607/">CVE-2006-2607</cve>
	<bugzilla href="https://bugzilla.suse.com/178863">SUSE bug 178863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537178">SUSE bug 537178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-4197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-4197" ref_url="https://www.suse.com/security/cve/CVE-2006-4197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2006:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in libmusicbrainz (aka mb_client or MusicBrainz Client Library) 2.1.2 and earlier, and SVN 8406 and earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a long Location header by the HTTP server, which triggers an overflow in the MBHttp::Download function in lib/http.cpp; and (2) a long URL in RDF data, as demonstrated by a URL in an rdf:resource field in an RDF XML document, which triggers overflows in many functions in lib/rdfparse.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2006-4197/">CVE-2006-4197</cve>
	<bugzilla href="https://bugzilla.suse.com/199134">SUSE bug 199134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140886" comment="libmusicbrainz4-2.1.5-27.86 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4226</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-4226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4226" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-4226" ref_url="https://www.suse.com/security/cve/CVE-2006-4226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2006:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00023.html" source="SUSE-SU"/>
    <description>
    MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4226/">CVE-2006-4226</cve>
	<bugzilla href="https://bugzilla.suse.com/201711">SUSE bug 201711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4227</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-4227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4227" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-4227" ref_url="https://www.suse.com/security/cve/CVE-2006-4227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2006:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00023.html" source="SUSE-SU"/>
    <description>
    MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4227/">CVE-2006-4227</cve>
	<bugzilla href="https://bugzilla.suse.com/201711">SUSE bug 201711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-4484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-4484" ref_url="https://www.suse.com/security/cve/CVE-2006-4484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2006:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-06/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-4484/">CVE-2006-4484</cve>
	<bugzilla href="https://bugzilla.suse.com/200181">SUSE bug 200181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/355864">SUSE bug 355864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/356187">SUSE bug 356187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/357978">SUSE bug 357978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/372642">SUSE bug 372642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/374257">SUSE bug 374257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/386009">SUSE bug 386009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709852">SUSE bug 709852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141069" comment="perl-Tk-804.031-3.82 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-7250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7250" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-7250" ref_url="https://www.suse.com/security/cve/CVE-2006-7250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00039.html" source="SUSE-SU"/>
    <description>
    The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7250/">CVE-2006-7250</cve>
	<bugzilla href="https://bugzilla.suse.com/748738">SUSE bug 748738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883307">SUSE bug 883307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-1669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669" source="SUSE CVE"/>
    <description>
    zoo decoder 2.10 (zoo-2.10), as used in multiple products including (1) Barracuda Spam Firewall 3.4 and later with virusdef before 2.0.6399, (2) Spam Firewall before 3.4 20070319 with virusdef before 2.0.6399o, and (3) AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<bugzilla href="https://bugzilla.suse.com/271781">SUSE bug 271781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009512004" comment="zoo-2.10-1020.62 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-2721" ref_url="https://www.suse.com/security/cve/CVE-2007-2721" source="SUSE CVE"/>
    <description>
    The jpc_qcx_getcompparms function in jpc/jpc_cs.c for the JasPer JPEG-2000 library (libjasper) before 1.900 allows remote user-assisted attackers to cause a denial of service (crash) and possibly corrupt the heap via malformed image files, as originally demonstrated using imagemagick convert.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-2721/">CVE-2007-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/258253">SUSE bug 258253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/339731">SUSE bug 339731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/340138">SUSE bug 340138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4129" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4129" ref_url="https://www.suse.com/security/cve/CVE-2007-4129" source="SUSE CVE"/>
    <description>
    CoolKey 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files in the /tmp/.pk11ipc1/ directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-4129/">CVE-2007-4129</cve>
	<bugzilla href="https://bugzilla.suse.com/304180">SUSE bug 304180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140495" comment="coolkey-1.1.0-147.71 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4571" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4571" ref_url="https://www.suse.com/security/cve/CVE-2007-4571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:053" ref_url="https://lists.opensuse.org/opensuse-security-announce/2007-10/msg00000.html" source="SUSE-SU"/>
    <description>
    The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2007-4571/">CVE-2007-4571</cve>
	<bugzilla href="https://bugzilla.suse.com/328404">SUSE bug 328404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4772" ref_url="https://www.suse.com/security/cve/CVE-2007-4772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html" source="SUSE-SU"/>
    <description>
    The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-4772/">CVE-2007-4772</cve>
	<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5969</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-5969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-5969" ref_url="https://www.suse.com/security/cve/CVE-2007-5969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" source="SUSE-SU"/>
    <description>
    MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-5969/">CVE-2007-5969</cve>
	<bugzilla href="https://bugzilla.suse.com/347223">SUSE bug 347223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/348003">SUSE bug 348003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/348307">SUSE bug 348307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-5970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5970" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-5970" ref_url="https://www.suse.com/security/cve/CVE-2007-5970" source="SUSE CVE"/>
    <description>
    MySQL 5.1.x before 5.1.23 and 6.0.x before 6.0.4 allows remote authenticated users to gain privileges on arbitrary tables via unspecified vectors involving use of table-level DATA DIRECTORY and INDEX DIRECTORY options when creating a partitioned table with the same name as a table on which the user lacks privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-5970/">CVE-2007-5970</cve>
	<bugzilla href="https://bugzilla.suse.com/348307">SUSE bug 348307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6303</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6303" ref_url="https://www.suse.com/security/cve/CVE-2007-6303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" source="SUSE-SU"/>
    <description>
    MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-6303/">CVE-2007-6303</cve>
	<bugzilla href="https://bugzilla.suse.com/348003">SUSE bug 348003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6304</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6304" ref_url="https://www.suse.com/security/cve/CVE-2007-6304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" source="SUSE-SU"/>
    <description>
    The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6304/">CVE-2007-6304</cve>
	<bugzilla href="https://bugzilla.suse.com/348003">SUSE bug 348003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6335" ref_url="https://www.suse.com/security/cve/CVE-2007-6335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2007-6335/">CVE-2007-6335</cve>
	<bugzilla href="https://bugzilla.suse.com/343277">SUSE bug 343277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334331" comment="clamav is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6600" ref_url="https://www.suse.com/security/cve/CVE-2007-6600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6600/">CVE-2007-6600</cve>
	<bugzilla href="https://bugzilla.suse.com/329282">SUSE bug 329282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537706">SUSE bug 537706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6698" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6698" ref_url="https://www.suse.com/security/cve/CVE-2007-6698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6698/">CVE-2007-6698</cve>
	<bugzilla href="https://bugzilla.suse.com/357919">SUSE bug 357919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334215" comment="openldap2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6761" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6761" ref_url="https://www.suse.com/security/cve/CVE-2007-6761" source="SUSE CVE"/>
    <description>
    drivers/media/video/videobuf-vmalloc.c in the Linux kernel before 2.6.24 does not initialize videobuf_mapping data structures, which allows local users to trigger an incorrect count value and videobuf leak via unspecified vectors, a different vulnerability than CVE-2010-5321.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2007-6761/">CVE-2007-6761</cve>
	<bugzilla href="https://bugzilla.suse.com/1035720">SUSE bug 1035720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-0928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-0928" ref_url="https://www.suse.com/security/cve/CVE-2008-0928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-0928/">CVE-2008-0928</cve>
	<bugzilla href="https://bugzilla.suse.com/362956">SUSE bug 362956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<bugzilla href="https://bugzilla.suse.com/372246">SUSE bug 372246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140997" comment="libvorbis-doc-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140998" comment="libvorbis0-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141000" comment="libvorbisenc2-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141002" comment="libvorbisfile3-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="TID7005435" ref_url="https://www.suse.com/support/kb/doc/?id=7005435" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3243-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00032.html" source="SUSE-SU"/>
    <description>
    OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483</cve>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/373527">SUSE bug 373527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/585630">SUSE bug 585630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647633">SUSE bug 647633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706386">SUSE bug 706386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549918" comment="openssh-7.2p2-74.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549919" comment="openssh-askpass-gnome-7.2p2-74.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549920" comment="openssh-fips-7.2p2-74.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549921" comment="openssh-helpers-7.2p2-74.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1686" ref_url="https://www.suse.com/security/cve/CVE-2008-1686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-06/msg00004.html" source="SUSE-SU"/>
    <description>
    Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-1686/">CVE-2008-1686</cve>
	<bugzilla href="https://bugzilla.suse.com/377602">SUSE bug 377602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/379098">SUSE bug 379098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1945" ref_url="https://www.suse.com/security/cve/CVE-2008-1945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1945/">CVE-2008-1945</cve>
	<bugzilla href="https://bugzilla.suse.com/362956">SUSE bug 362956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1947</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1947" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1947" ref_url="https://www.suse.com/security/cve/CVE-2008-1947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Apache Tomcat 5.5.9 through 5.5.26 and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via the name parameter (aka the hostname attribute) to host-manager/html/add.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-1947/">CVE-2008-1947</cve>
	<bugzilla href="https://bugzilla.suse.com/396962">SUSE bug 396962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/427726">SUSE bug 427726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2079</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2079" ref_url="https://www.suse.com/security/cve/CVE-2008-2079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" source="SUSE-SU"/>
    <description>
    MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2079/">CVE-2008-2079</cve>
	<bugzilla href="https://bugzilla.suse.com/387746">SUSE bug 387746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/425079">SUSE bug 425079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/497546">SUSE bug 497546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2382" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2382" ref_url="https://www.suse.com/security/cve/CVE-2008-2382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2382/">CVE-2008-2382</cve>
	<bugzilla href="https://bugzilla.suse.com/461565">SUSE bug 461565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/464142">SUSE bug 464142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2938" ref_url="https://www.suse.com/security/cve/CVE-2008-2938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="TID7006398" ref_url="https://www.suse.com/support/kb/doc/?id=7006398" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2938/">CVE-2008-2938</cve>
	<bugzilla href="https://bugzilla.suse.com/417217">SUSE bug 417217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/427726">SUSE bug 427726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/392410">SUSE bug 392410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html" source="SUSE-SU"/>
    <description>
    pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<bugzilla href="https://bugzilla.suse.com/425861">SUSE bug 425861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3915</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3915" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3915" ref_url="https://www.suse.com/security/cve/CVE-2008-3915" source="SUSE CVE"/>
    <description>
    Buffer overflow in nfsd in the Linux kernel before 2.6.26.4, when NFSv4 is enabled, allows remote attackers to have an unknown impact via vectors related to decoding an NFSv4 acl.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-3915/">CVE-2008-3915</cve>
	<bugzilla href="https://bugzilla.suse.com/423515">SUSE bug 423515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4225" ref_url="https://www.suse.com/security/cve/CVE-2008-4225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4225/">CVE-2008-4225</cve>
	<bugzilla href="https://bugzilla.suse.com/445677">SUSE bug 445677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4226" ref_url="https://www.suse.com/security/cve/CVE-2008-4226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2008-4226/">CVE-2008-4226</cve>
	<bugzilla href="https://bugzilla.suse.com/441368">SUSE bug 441368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4316" ref_url="https://www.suse.com/security/cve/CVE-2008-4316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4316/">CVE-2008-4316</cve>
	<bugzilla href="https://bugzilla.suse.com/382708">SUSE bug 382708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/449927">SUSE bug 449927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/475541">SUSE bug 475541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409" source="SUSE CVE"/>
    <description>
    libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409</cve>
	<bugzilla href="https://bugzilla.suse.com/432486">SUSE bug 432486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4539" ref_url="https://www.suse.com/security/cve/CVE-2008-4539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-4539/">CVE-2008-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/435135">SUSE bug 435135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/448551">SUSE bug 448551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4989" ref_url="https://www.suse.com/security/cve/CVE-2008-4989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4989/">CVE-2008-4989</cve>
	<bugzilla href="https://bugzilla.suse.com/392947">SUSE bug 392947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/441856">SUSE bug 441856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/467911">SUSE bug 467911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5077" ref_url="https://www.suse.com/security/cve/CVE-2008-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" source="SUSE-SU"/>
    <description>
    OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5077/">CVE-2008-5077</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/465675">SUSE bug 465675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/465676">SUSE bug 465676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/468866">SUSE bug 468866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/470968">SUSE bug 470968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/475108">SUSE bug 475108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552497">SUSE bug 552497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708266">SUSE bug 708266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5079" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" source="SUSE-SU"/>
    <description>
    net/atm/svc.c in the ATM subsystem in the Linux kernel 2.6.27.8 and earlier allows local users to cause a denial of service (kernel infinite loop) by making two calls to svc_listen for the same socket, and then reading a /proc/net/atm/*vc file, related to corruption of the vcc table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079</cve>
	<bugzilla href="https://bugzilla.suse.com/450417">SUSE bug 450417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5519" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5519" ref_url="https://www.suse.com/security/cve/CVE-2008-5519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-5519/">CVE-2008-5519</cve>
	<bugzilla href="https://bugzilla.suse.com/493575">SUSE bug 493575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140459" comment="apache2-mod_jk-1.2.40-5.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5913" ref_url="https://www.suse.com/security/cve/CVE-2008-5913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
    <description>
    The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2008-5913/">CVE-2008-5913</cve>
	<bugzilla href="https://bugzilla.suse.com/468762">SUSE bug 468762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-7247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7247" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-7247" ref_url="https://www.suse.com/security/cve/CVE-2008-7247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00006.html" source="SUSE-SU"/>
    <description>
    sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-7247/">CVE-2008-7247</cve>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0023" ref_url="https://www.suse.com/security/cve/CVE-2009-0023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00005.html" source="SUSE-SU"/>
    <description>
    The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0023/">CVE-2009-0023</cve>
	<bugzilla href="https://bugzilla.suse.com/510301">SUSE bug 510301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140776" comment="libapr-util1-1.5.3-1.77 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140777" comment="libapr-util1-dbd-sqlite3-1.5.3-1.77 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0035" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035" source="SUSE CVE"/>
    <description>
    alsa-utils 1.0.19 and later versions allows local users to overwrite arbitrary files via a symlink attack via the /usr/bin/alsa-info and /usr/bin/alsa-info.sh scripts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035</cve>
	<bugzilla href="https://bugzilla.suse.com/533396">SUSE bug 533396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140443" comment="alsa-1.0.27.2-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140444" comment="alsa-docs-1.0.27.2-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140445" comment="libasound2-1.0.27.2-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140446" comment="libasound2-32bit-1.0.27.2-11.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0036" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0036" ref_url="https://www.suse.com/security/cve/CVE-2009-0036" source="SUSE CVE"/>
    <description>
    Buffer overflow in the proxyReadClientSocket function in proxy/libvirt_proxy.c in libvirt_proxy 0.5.1 might allow local users to gain privileges by sending a portion of the header of a virProxyPacket packet, and then sending the remainder of the packet with crafted values in the header, related to use of uninitialized memory in a validation check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2009-0036/">CVE-2009-0036</cve>
	<bugzilla href="https://bugzilla.suse.com/1085554">SUSE bug 1085554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0037" ref_url="https://www.suse.com/security/cve/CVE-2009-0037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html" source="SUSE-SU"/>
    <description>
    The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0037/">CVE-2009-0037</cve>
	<bugzilla href="https://bugzilla.suse.com/475103">SUSE bug 475103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527990">SUSE bug 527990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0040" ref_url="https://www.suse.com/security/cve/CVE-2009-0040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0040/">CVE-2009-0040</cve>
	<bugzilla href="https://bugzilla.suse.com/472745">SUSE bug 472745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608040">SUSE bug 608040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<bugzilla href="https://bugzilla.suse.com/484653">SUSE bug 484653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/501632">SUSE bug 501632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0163" ref_url="https://www.suse.com/security/cve/CVE-2009-0163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0163/">CVE-2009-0163</cve>
	<bugzilla href="https://bugzilla.suse.com/485895">SUSE bug 485895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<bugzilla href="https://bugzilla.suse.com/481769">SUSE bug 481769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0269" ref_url="https://www.suse.com/security/cve/CVE-2009-0269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
    <description>
    fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0269/">CVE-2009-0269</cve>
	<bugzilla href="https://bugzilla.suse.com/470942">SUSE bug 470942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0316" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316" source="SUSE CVE"/>
    <description>
    Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<bugzilla href="https://bugzilla.suse.com/470100">SUSE bug 470100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140673" comment="gvim-7.4.326-2.62 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140674" comment="vim-7.4.326-2.62 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140675" comment="vim-data-7.4.326-2.62 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0322</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0322" ref_url="https://www.suse.com/security/cve/CVE-2009-0322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" source="SUSE-SU"/>
    <description>
    drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0322/">CVE-2009-0322</cve>
	<bugzilla href="https://bugzilla.suse.com/470943">SUSE bug 470943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0368" ref_url="https://www.suse.com/security/cve/CVE-2009-0368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0368/">CVE-2009-0368</cve>
	<bugzilla href="https://bugzilla.suse.com/480262">SUSE bug 480262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548555">SUSE bug 548555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0590" ref_url="https://www.suse.com/security/cve/CVE-2009-0590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" source="SUSE-SU"/>
    <description>
    The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0590/">CVE-2009-0590</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0591" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0591" ref_url="https://www.suse.com/security/cve/CVE-2009-0591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0591/">CVE-2009-0591</cve>
	<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0652" ref_url="https://www.suse.com/security/cve/CVE-2009-0652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0652/">CVE-2009-0652</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0688" ref_url="https://www.suse.com/security/cve/CVE-2009-0688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0688/">CVE-2009-0688</cve>
	<bugzilla href="https://bugzilla.suse.com/499104">SUSE bug 499104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140518" comment="cyrus-sasl-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140519" comment="cyrus-sasl-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140520" comment="cyrus-sasl-crammd5-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140521" comment="cyrus-sasl-crammd5-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140522" comment="cyrus-sasl-digestmd5-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140523" comment="cyrus-sasl-gssapi-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140524" comment="cyrus-sasl-gssapi-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140525" comment="cyrus-sasl-otp-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140526" comment="cyrus-sasl-otp-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140527" comment="cyrus-sasl-plain-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140528" comment="cyrus-sasl-plain-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140529" comment="cyrus-sasl-saslauthd-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140530" comment="cyrus-sasl-sqlauxprop-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140531" comment="cyrus-sasl-sqlauxprop-32bit-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140532" comment="libsasl2-3-2.1.26-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140533" comment="libsasl2-3-32bit-2.1.26-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0696" ref_url="https://www.suse.com/security/cve/CVE-2009-0696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:040" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00006.html" source="SUSE-SU"/>
    <description>
    The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0696/">CVE-2009-0696</cve>
	<bugzilla href="https://bugzilla.suse.com/526185">SUSE bug 526185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0758" ref_url="https://www.suse.com/security/cve/CVE-2009-0758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0758/">CVE-2009-0758</cve>
	<bugzilla href="https://bugzilla.suse.com/480865">SUSE bug 480865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140469" comment="avahi-utils-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0771" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0771" ref_url="https://www.suse.com/security/cve/CVE-2009-0771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0771/">CVE-2009-0771</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0772" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0772" ref_url="https://www.suse.com/security/cve/CVE-2009-0772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0772/">CVE-2009-0772</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0773" ref_url="https://www.suse.com/security/cve/CVE-2009-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, __defineSetter__, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, __defineSetter__, and watch, which triggers a hang.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0773/">CVE-2009-0773</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0774" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0774" ref_url="https://www.suse.com/security/cve/CVE-2009-0774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0774/">CVE-2009-0774</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0775" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0775" ref_url="https://www.suse.com/security/cve/CVE-2009-0775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements which were linked as a parent and child," which are not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0775/">CVE-2009-0775</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0776" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0776" ref_url="https://www.suse.com/security/cve/CVE-2009-0776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0776/">CVE-2009-0776</cve>
	<bugzilla href="https://bugzilla.suse.com/465291">SUSE bug 465291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0777" ref_url="https://www.suse.com/security/cve/CVE-2009-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 decode invisible characters when they are displayed in the location bar, which causes an incorrect address to be displayed and makes it easier for remote attackers to spoof URLs and conduct phishing attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0777/">CVE-2009-0777</cve>
	<bugzilla href="https://bugzilla.suse.com/478625">SUSE bug 478625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0789" ref_url="https://www.suse.com/security/cve/CVE-2009-0789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0789/">CVE-2009-0789</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0790" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0790" ref_url="https://www.suse.com/security/cve/CVE-2009-0790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0790/">CVE-2009-0790</cve>
	<bugzilla href="https://bugzilla.suse.com/487762">SUSE bug 487762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0793" ref_url="https://www.suse.com/security/cve/CVE-2009-0793" source="SUSE CVE"/>
    <description>
    cmsxform.c in LittleCMS (aka lcms or liblcms) 1.18, as used in OpenJDK and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted image that triggers execution of incorrect code for "transformations of monochrome profiles."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0793/">CVE-2009-0793</cve>
	<bugzilla href="https://bugzilla.suse.com/490610">SUSE bug 490610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/521512">SUSE bug 521512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/521513">SUSE bug 521513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0844" ref_url="https://www.suse.com/security/cve/CVE-2009-0844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00005.html" source="SUSE-SU"/>
    <description>
    The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0844/">CVE-2009-0844</cve>
	<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0845" ref_url="https://www.suse.com/security/cve/CVE-2009-0845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00005.html" source="SUSE-SU"/>
    <description>
    The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0845/">CVE-2009-0845</cve>
	<bugzilla href="https://bugzilla.suse.com/485894">SUSE bug 485894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0846" ref_url="https://www.suse.com/security/cve/CVE-2009-0846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7003100" ref_url="https://www.suse.com/support/kb/doc/?id=7003100" source="SUSE-SU"/>
    <description>
    The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0846/">CVE-2009-0846</cve>
	<bugzilla href="https://bugzilla.suse.com/486723">SUSE bug 486723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0847" ref_url="https://www.suse.com/security/cve/CVE-2009-0847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00005.html" source="SUSE-SU"/>
    <description>
    The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0847/">CVE-2009-0847</cve>
	<bugzilla href="https://bugzilla.suse.com/486722">SUSE bug 486722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0945" ref_url="https://www.suse.com/security/cve/CVE-2009-0945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0024-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0945/">CVE-2009-0945</cve>
	<bugzilla href="https://bugzilla.suse.com/512559">SUSE bug 512559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515124">SUSE bug 515124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541632">SUSE bug 541632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601349">SUSE bug 601349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644114">SUSE bug 644114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0946" ref_url="https://www.suse.com/security/cve/CVE-2009-0946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0946/">CVE-2009-0946</cve>
	<bugzilla href="https://bugzilla.suse.com/485889">SUSE bug 485889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/496289">SUSE bug 496289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/541626">SUSE bug 541626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1044" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1044" ref_url="https://www.suse.com/security/cve/CVE-2009-1044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00008.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1044/">CVE-2009-1044</cve>
	<bugzilla href="https://bugzilla.suse.com/465291">SUSE bug 465291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/488955">SUSE bug 488955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1046</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1046" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1046" ref_url="https://www.suse.com/security/cve/CVE-2009-1046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00007.html" source="SUSE-SU"/>
    <description>
    The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1046/">CVE-2009-1046</cve>
	<bugzilla href="https://bugzilla.suse.com/478699">SUSE bug 478699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1169" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1169" ref_url="https://www.suse.com/security/cve/CVE-2009-1169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1169/">CVE-2009-1169</cve>
	<bugzilla href="https://bugzilla.suse.com/488955">SUSE bug 488955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509766">SUSE bug 509766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/510964">SUSE bug 510964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515951">SUSE bug 515951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187" source="SUSE CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to CairoOutputDev (CairoOutputDev.cc).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508153">SUSE bug 508153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508154">SUSE bug 508154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539875">SUSE bug 539875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188" source="SUSE CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<bugzilla href="https://bugzilla.suse.com/487100">SUSE bug 487100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508153">SUSE bug 508153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/508154">SUSE bug 508154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539875">SUSE bug 539875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546400">SUSE bug 546400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1191" ref_url="https://www.suse.com/security/cve/CVE-2009-1191" source="SUSE CVE"/>
    <description>
    mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1191/">CVE-2009-1191</cve>
	<bugzilla href="https://bugzilla.suse.com/521943">SUSE bug 521943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539571">SUSE bug 539571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1195" ref_url="https://www.suse.com/security/cve/CVE-2009-1195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1195/">CVE-2009-1195</cve>
	<bugzilla href="https://bugzilla.suse.com/512583">SUSE bug 512583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/513080">SUSE bug 513080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539571">SUSE bug 539571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1210" ref_url="https://www.suse.com/security/cve/CVE-2009-1210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1210/">CVE-2009-1210</cve>
	<bugzilla href="https://bugzilla.suse.com/491449">SUSE bug 491449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<bugzilla href="https://bugzilla.suse.com/501632">SUSE bug 501632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1267" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1267" ref_url="https://www.suse.com/security/cve/CVE-2009-1267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1267/">CVE-2009-1267</cve>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1268" ref_url="https://www.suse.com/security/cve/CVE-2009-1268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1268/">CVE-2009-1268</cve>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1269" ref_url="https://www.suse.com/security/cve/CVE-2009-1269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1269/">CVE-2009-1269</cve>
	<bugzilla href="https://bugzilla.suse.com/493584">SUSE bug 493584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1273" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273" source="SUSE CVE"/>
    <description>
    pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273</cve>
	<bugzilla href="https://bugzilla.suse.com/492764">SUSE bug 492764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/507729">SUSE bug 507729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141063" comment="pam_ssh-2.0-1.40 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141064" comment="pam_ssh-32bit-2.0-1.40 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1302" ref_url="https://www.suse.com/security/cve/CVE-2009-1302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1) nsAsyncInstantiateEvent::Run, (2) nsStyleContext::Destroy, (3) nsComputedDOMStyle::GetWidth, (4) the xslt_attributeset_ImportSameName.html test case for the XSLT stylesheet compiler, (5) nsXULDocument::SynchronizeBroadcastListener, (6) IsBindingAncestor, (7) PL_DHashTableOperate and nsEditor::EndUpdateViewBatch, and (8) gfxSkipCharsIterator::SetOffsets, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1302/">CVE-2009-1302</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1303" ref_url="https://www.suse.com/security/cve/CVE-2009-1303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1303/">CVE-2009-1303</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1304" ref_url="https://www.suse.com/security/cve/CVE-2009-1304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving (1) js_FindPropertyHelper, related to the definitions of Math and Date; and (2) js_CheckRedeclaration.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1304/">CVE-2009-1304</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1305" ref_url="https://www.suse.com/security/cve/CVE-2009-1305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1305/">CVE-2009-1305</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1306" ref_url="https://www.suse.com/security/cve/CVE-2009-1306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1306/">CVE-2009-1306</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1307" ref_url="https://www.suse.com/security/cve/CVE-2009-1307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1307/">CVE-2009-1307</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515951">SUSE bug 515951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1308" ref_url="https://www.suse.com/security/cve/CVE-2009-1308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey allows remote attackers to inject arbitrary web script or HTML via vectors involving XBL JavaScript bindings and remote stylesheets, as exploited in the wild by a March 2009 eBay listing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1308/">CVE-2009-1308</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1309" ref_url="https://www.suse.com/security/cve/CVE-2009-1309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey do not properly implement the Same Origin Policy for (1) XMLHttpRequest, involving a mismatch for a document's principal, and (2) XPCNativeWrapper.toString, involving an incorrect __proto__ scope, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1309/">CVE-2009-1309</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1310" ref_url="https://www.suse.com/security/cve/CVE-2009-1310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the MozSearch plugin implementation in Mozilla Firefox before 3.0.9 allows user-assisted remote attackers to inject arbitrary web script or HTML via a javascript: URI in the SearchForm element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1310/">CVE-2009-1310</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1311" ref_url="https://www.suse.com/security/cve/CVE-2009-1311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1311/">CVE-2009-1311</cve>
	<bugzilla href="https://bugzilla.suse.com/465291">SUSE bug 465291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515951">SUSE bug 515951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1312" ref_url="https://www.suse.com/security/cve/CVE-2009-1312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1312/">CVE-2009-1312</cve>
	<bugzilla href="https://bugzilla.suse.com/495473">SUSE bug 495473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1313" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1313" ref_url="https://www.suse.com/security/cve/CVE-2009-1313" source="SUSE CVE"/>
    <description>
    The nsTextFrame::ClearTextRun function in layout/generic/nsTextFrameThebes.cpp in Mozilla Firefox 3.0.9 allows remote attackers to cause a denial of service (memory corruption) and probably execute arbitrary code via unspecified vectors.  NOTE: this vulnerability reportedly exists because of an incorrect fix for CVE-2009-1302.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1313/">CVE-2009-1313</cve>
	<bugzilla href="https://bugzilla.suse.com/500909">SUSE bug 500909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/502062">SUSE bug 502062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1377" ref_url="https://www.suse.com/security/cve/CVE-2009-1377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1377/">CVE-2009-1377</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1378" ref_url="https://www.suse.com/security/cve/CVE-2009-1378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1378/">CVE-2009-1378</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1379" ref_url="https://www.suse.com/security/cve/CVE-2009-1379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1379/">CVE-2009-1379</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/504687">SUSE bug 504687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1384" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384" source="SUSE CVE"/>
    <description>
    pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384</cve>
	<bugzilla href="https://bugzilla.suse.com/507729">SUSE bug 507729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141061" comment="pam_krb5-2.4.4-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141062" comment="pam_krb5-32bit-2.4.4-4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1386" ref_url="https://www.suse.com/security/cve/CVE-2009-1386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1386/">CVE-2009-1386</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509031">SUSE bug 509031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515659">SUSE bug 515659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1387" ref_url="https://www.suse.com/security/cve/CVE-2009-1387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1387/">CVE-2009-1387</cve>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/509031">SUSE bug 509031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515659">SUSE bug 515659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1415" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1415" ref_url="https://www.suse.com/security/cve/CVE-2009-1415" source="SUSE CVE"/>
    <description>
    lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1415/">CVE-2009-1415</cve>
	<bugzilla href="https://bugzilla.suse.com/497886">SUSE bug 497886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/505494">SUSE bug 505494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1563" ref_url="https://www.suse.com/security/cve/CVE-2009-1563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1563/">CVE-2009-1563</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546371">SUSE bug 546371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557126">SUSE bug 557126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557127">SUSE bug 557127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557128">SUSE bug 557128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557671">SUSE bug 557671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1720" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1720" ref_url="https://www.suse.com/security/cve/CVE-2009-1720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors that trigger heap-based buffer overflows, related to (1) the Imf::PreviewImage::PreviewImage function and (2) compressor constructors.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1720/">CVE-2009-1720</cve>
	<bugzilla href="https://bugzilla.suse.com/527538">SUSE bug 527538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527539">SUSE bug 527539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1721" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1721" ref_url="https://www.suse.com/security/cve/CVE-2009-1721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1721/">CVE-2009-1721</cve>
	<bugzilla href="https://bugzilla.suse.com/527538">SUSE bug 527538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/527539">SUSE bug 527539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140719" comment="libIlmImf-Imf_2_1-21-2.1.0-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140720" comment="openexr-2.1.0-4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1885" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1885" ref_url="https://www.suse.com/security/cve/CVE-2009-1885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1885/">CVE-2009-1885</cve>
	<bugzilla href="https://bugzilla.suse.com/530708">SUSE bug 530708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1886" ref_url="https://www.suse.com/security/cve/CVE-2009-1886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-1886/">CVE-2009-1886</cve>
	<bugzilla href="https://bugzilla.suse.com/513360">SUSE bug 513360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1888" ref_url="https://www.suse.com/security/cve/CVE-2009-1888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1888/">CVE-2009-1888</cve>
	<bugzilla href="https://bugzilla.suse.com/513360">SUSE bug 513360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1890" ref_url="https://www.suse.com/security/cve/CVE-2009-1890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1890/">CVE-2009-1890</cve>
	<bugzilla href="https://bugzilla.suse.com/519194">SUSE bug 519194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1891" ref_url="https://www.suse.com/security/cve/CVE-2009-1891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1891/">CVE-2009-1891</cve>
	<bugzilla href="https://bugzilla.suse.com/521906">SUSE bug 521906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1892" ref_url="https://www.suse.com/security/cve/CVE-2009-1892" source="SUSE CVE"/>
    <description>
    dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1892/">CVE-2009-1892</cve>
	<bugzilla href="https://bugzilla.suse.com/519413">SUSE bug 519413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1955" ref_url="https://www.suse.com/security/cve/CVE-2009-1955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
    <description>
    The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1955/">CVE-2009-1955</cve>
	<bugzilla href="https://bugzilla.suse.com/509825">SUSE bug 509825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/510301">SUSE bug 510301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529591">SUSE bug 529591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992541">SUSE bug 992541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1956" ref_url="https://www.suse.com/security/cve/CVE-2009-1956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00005.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1956/">CVE-2009-1956</cve>
	<bugzilla href="https://bugzilla.suse.com/510301">SUSE bug 510301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<bugzilla href="https://bugzilla.suse.com/518698">SUSE bug 518698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<bugzilla href="https://bugzilla.suse.com/519796">SUSE bug 519796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/616827">SUSE bug 616827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2412" ref_url="https://www.suse.com/security/cve/CVE-2009-2412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2412/">CVE-2009-2412</cve>
	<bugzilla href="https://bugzilla.suse.com/528714">SUSE bug 528714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/529591">SUSE bug 529591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802057">SUSE bug 802057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140776" comment="libapr-util1-1.5.3-1.77 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140777" comment="libapr-util1-dbd-sqlite3-1.5.3-1.77 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140778" comment="libapr1-1.5.1-2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2417" ref_url="https://www.suse.com/security/cve/CVE-2009-2417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
    <description>
    lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2417/">CVE-2009-2417</cve>
	<bugzilla href="https://bugzilla.suse.com/527990">SUSE bug 527990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/528372">SUSE bug 528372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2470" ref_url="https://www.suse.com/security/cve/CVE-2009-2470" source="SUSE CVE"/>
    <description>
    Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2470/">CVE-2009-2470</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2473" ref_url="https://www.suse.com/security/cve/CVE-2009-2473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
    <description>
    neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2473/">CVE-2009-2473</cve>
	<bugzilla href="https://bugzilla.suse.com/528370">SUSE bug 528370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/532345">SUSE bug 532345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140888" comment="libneon27-32bit-0.30.0-3.65 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2474" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2474" ref_url="https://www.suse.com/security/cve/CVE-2009-2474" source="SUSE CVE"/>
    <description>
    neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2474/">CVE-2009-2474</cve>
	<bugzilla href="https://bugzilla.suse.com/528370">SUSE bug 528370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140887" comment="libneon27-0.30.0-3.65 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140888" comment="libneon27-32bit-0.30.0-3.65 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2624" ref_url="https://www.suse.com/security/cve/CVE-2009-2624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" source="SUSE-SU"/>
    <description>
    The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2624/">CVE-2009-2624</cve>
	<bugzilla href="https://bugzilla.suse.com/570331">SUSE bug 570331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588113">SUSE bug 588113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2625" ref_url="https://www.suse.com/security/cve/CVE-2009-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:053" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00014.html" source="SUSE-SU"/>
    <description>
    XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-2625/">CVE-2009-2625</cve>
	<bugzilla href="https://bugzilla.suse.com/525562">SUSE bug 525562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/530717">SUSE bug 530717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534025">SUSE bug 534025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534721">SUSE bug 534721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/537969">SUSE bug 537969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/540945">SUSE bug 540945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/548655">SUSE bug 548655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550664">SUSE bug 550664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553220">SUSE bug 553220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581162">SUSE bug 581162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/610080">SUSE bug 610080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611931">SUSE bug 611931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611932">SUSE bug 611932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2654" ref_url="https://www.suse.com/security/cve/CVE-2009-2654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2654/">CVE-2009-2654</cve>
	<bugzilla href="https://bugzilla.suse.com/527489">SUSE bug 527489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-08/msg00006.html" source="SUSE-SU"/>
    <description>
    socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<bugzilla href="https://bugzilla.suse.com/528746">SUSE bug 528746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140570" comment="fetchmailconf-6.3.26-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2699" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2699" ref_url="https://www.suse.com/security/cve/CVE-2009-2699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2699/">CVE-2009-2699</cve>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2813" ref_url="https://www.suse.com/security/cve/CVE-2009-2813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" source="SUSE-SU"/>
    <description>
    Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2813/">CVE-2009-2813</cve>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/539517">SUSE bug 539517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543115">SUSE bug 543115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2820" ref_url="https://www.suse.com/security/cve/CVE-2009-2820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2820/">CVE-2009-2820</cve>
	<bugzilla href="https://bugzilla.suse.com/548317">SUSE bug 548317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/551563">SUSE bug 551563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2906" ref_url="https://www.suse.com/security/cve/CVE-2009-2906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" source="SUSE-SU"/>
    <description>
    smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2906/">CVE-2009-2906</cve>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543115">SUSE bug 543115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2911" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2911" ref_url="https://www.suse.com/security/cve/CVE-2009-2911" source="SUSE CVE"/>
    <description>
    SystemTap 1.0, when the --unprivileged option is used, does not properly restrict certain data sizes, which allows local users to (1) cause a denial of service or gain privileges via a print operation with a large number of arguments that trigger a kernel stack overflow, (2) cause a denial of service via crafted DWARF expressions that trigger a kernel stack frame overflow, or (3) cause a denial of service (infinite loop) via vectors that trigger creation of large unwind tables, related to Common Information Entry (CIE) and Call Frame Instruction (CFI) records.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2911/">CVE-2009-2911</cve>
	<bugzilla href="https://bugzilla.suse.com/548361">SUSE bug 548361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574243">SUSE bug 574243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141135" comment="systemtap-3.0-7.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141136" comment="systemtap-runtime-3.0-7.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141137" comment="systemtap-server-3.0-7.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2948" ref_url="https://www.suse.com/security/cve/CVE-2009-2948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" source="SUSE-SU"/>
    <description>
    mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-2948/">CVE-2009-2948</cve>
	<bugzilla href="https://bugzilla.suse.com/515479">SUSE bug 515479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/542150">SUSE bug 542150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543115">SUSE bug 543115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3069" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3069" ref_url="https://www.suse.com/security/cve/CVE-2009-3069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3069/">CVE-2009-3069</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3070" ref_url="https://www.suse.com/security/cve/CVE-2009-3070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3070/">CVE-2009-3070</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3071" ref_url="https://www.suse.com/security/cve/CVE-2009-3071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3071/">CVE-2009-3071</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3072" ref_url="https://www.suse.com/security/cve/CVE-2009-3072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3072/">CVE-2009-3072</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3073" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3073" ref_url="https://www.suse.com/security/cve/CVE-2009-3073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3073/">CVE-2009-3073</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3074" ref_url="https://www.suse.com/security/cve/CVE-2009-3074" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox before 3.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3074/">CVE-2009-3074</cve>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3075" ref_url="https://www.suse.com/security/cve/CVE-2009-3075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3075/">CVE-2009-3075</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3077" ref_url="https://www.suse.com/security/cve/CVE-2009-3077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3077/">CVE-2009-3077</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3078" ref_url="https://www.suse.com/security/cve/CVE-2009-3078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Visual truncation vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to trigger a vertical scroll and spoof URLs via unspecified Unicode characters with a tall line-height property.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3078/">CVE-2009-3078</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3079" ref_url="https://www.suse.com/security/cve/CVE-2009-3079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:048" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to execute arbitrary JavaScript with chrome privileges via vectors involving an object, the FeedWriter, and the BrowserFeedWriter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3079/">CVE-2009-3079</cve>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/538290">SUSE bug 538290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3094" ref_url="https://www.suse.com/security/cve/CVE-2009-3094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3094/">CVE-2009-3094</cve>
	<bugzilla href="https://bugzilla.suse.com/538322">SUSE bug 538322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3095" ref_url="https://www.suse.com/security/cve/CVE-2009-3095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3095/">CVE-2009-3095</cve>
	<bugzilla href="https://bugzilla.suse.com/538322">SUSE bug 538322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3241" ref_url="https://www.suse.com/security/cve/CVE-2009-3241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark 0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers to cause a denial of service (memory and CPU consumption) via malformed OPCUA Service CallRequest packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3241/">CVE-2009-3241</cve>
	<bugzilla href="https://bugzilla.suse.com/541654">SUSE bug 541654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3242" ref_url="https://www.suse.com/security/cve/CVE-2009-3242" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in packet.c in the GSM A RR dissector in Wireshark 1.2.0 and 1.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors related to "an uninitialized dissector handle," which triggers an assertion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3242/">CVE-2009-3242</cve>
	<bugzilla href="https://bugzilla.suse.com/541659">SUSE bug 541659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3243" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3243" ref_url="https://www.suse.com/security/cve/CVE-2009-3243" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the TLS dissector in Wireshark 1.2.0 and 1.2.1, when running on Windows, allows remote attackers to cause a denial of service (application crash) via unknown vectors related to TLS 1.2 conversations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3243/">CVE-2009-3243</cve>
	<bugzilla href="https://bugzilla.suse.com/541655">SUSE bug 541655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3274" ref_url="https://www.suse.com/security/cve/CVE-2009-3274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3274/">CVE-2009-3274</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/534458">SUSE bug 534458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3295" ref_url="https://www.suse.com/security/cve/CVE-2009-3295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7005118" ref_url="https://www.suse.com/support/kb/doc/?id=7005118" source="SUSE-SU"/>
    <description>
    The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a ticket request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3295/">CVE-2009-3295</cve>
	<bugzilla href="https://bugzilla.suse.com/561347">SUSE bug 561347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789.  Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs.  Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<bugzilla href="https://bugzilla.suse.com/550002">SUSE bug 550002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550003">SUSE bug 550003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550004">SUSE bug 550004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577925">SUSE bug 577925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583536">SUSE bug 583536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620680">SUSE bug 620680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651598">SUSE bug 651598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3370" ref_url="https://www.suse.com/security/cve/CVE-2009-3370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.15, and 3.5.x before 3.5.4, allows remote attackers to read form history by forging mouse and keyboard events that leverage the auto-fill feature to populate form fields, in an attacker-readable form, with history entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3370/">CVE-2009-3370</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3371" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3371" ref_url="https://www.suse.com/security/cve/CVE-2009-3371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3371/">CVE-2009-3371</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3372" ref_url="https://www.suse.com/security/cve/CVE-2009-3372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3372/">CVE-2009-3372</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3373" ref_url="https://www.suse.com/security/cve/CVE-2009-3373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3373/">CVE-2009-3373</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557686">SUSE bug 557686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3374" ref_url="https://www.suse.com/security/cve/CVE-2009-3374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3374/">CVE-2009-3374</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3375" ref_url="https://www.suse.com/security/cve/CVE-2009-3375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3375/">CVE-2009-3375</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3376" ref_url="https://www.suse.com/security/cve/CVE-2009-3376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3376/">CVE-2009-3376</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3377" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3377" ref_url="https://www.suse.com/security/cve/CVE-2009-3377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3377/">CVE-2009-3377</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3378" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3378" ref_url="https://www.suse.com/security/cve/CVE-2009-3378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3378/">CVE-2009-3378</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608192">SUSE bug 608192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140997" comment="libvorbis-doc-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140998" comment="libvorbis0-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141000" comment="libvorbisenc2-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141002" comment="libvorbisfile3-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3380" ref_url="https://www.suse.com/security/cve/CVE-2009-3380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-3380/">CVE-2009-3380</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3381" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3381" ref_url="https://www.suse.com/security/cve/CVE-2009-3381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3381/">CVE-2009-3381</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3383" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3383" ref_url="https://www.suse.com/security/cve/CVE-2009-3383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3383/">CVE-2009-3383</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3388" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3388" ref_url="https://www.suse.com/security/cve/CVE-2009-3388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
    <description>
    liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to "memory safety issues."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3388/">CVE-2009-3388</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3389" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3389" ref_url="https://www.suse.com/security/cve/CVE-2009-3389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3389/">CVE-2009-3389</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581722">SUSE bug 581722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3553" ref_url="https://www.suse.com/security/cve/CVE-2009-3553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3553/">CVE-2009-3553</cve>
	<bugzilla href="https://bugzilla.suse.com/554861">SUSE bug 554861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/578215">SUSE bug 578215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3555" ref_url="https://www.suse.com/security/cve/CVE-2009-3555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:057" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:061" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7005397" ref_url="https://www.suse.com/support/kb/doc/?id=7005397" source="SUSE-SU"/>
		<reference ref_id="TID7005950" ref_url="https://www.suse.com/support/kb/doc/?id=7005950" source="SUSE-SU"/>
		<reference ref_id="TID7008600" ref_url="https://www.suse.com/support/kb/doc/?id=7008600" source="SUSE-SU"/>
		<reference ref_id="TID7008930" ref_url="https://www.suse.com/support/kb/doc/?id=7008930" source="SUSE-SU"/>
		<reference ref_id="TID7009561" ref_url="https://www.suse.com/support/kb/doc/?id=7009561" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0100-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0182-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0754-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1025-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3555/">CVE-2009-3555</cve>
	<bugzilla href="https://bugzilla.suse.com/1077582">SUSE bug 1077582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/459468">SUSE bug 459468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/552497">SUSE bug 552497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/553641">SUSE bug 553641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554069">SUSE bug 554069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554084">SUSE bug 554084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/554085">SUSE bug 554085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/555177">SUSE bug 555177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557168">SUSE bug 557168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564507">SUSE bug 564507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566041">SUSE bug 566041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/584292">SUSE bug 584292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588996">SUSE bug 588996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590826">SUSE bug 590826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/592589">SUSE bug 592589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594415">SUSE bug 594415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604782">SUSE bug 604782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/614753">SUSE bug 614753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622073">SUSE bug 622073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/623905">SUSE bug 623905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642531">SUSE bug 642531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646906">SUSE bug 646906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670152">SUSE bug 670152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704832">SUSE bug 704832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753357">SUSE bug 753357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799454">SUSE bug 799454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815621">SUSE bug 815621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979060">SUSE bug 979060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3560" ref_url="https://www.suse.com/security/cve/CVE-2009-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3560/">CVE-2009-3560</cve>
	<bugzilla href="https://bugzilla.suse.com/550666">SUSE bug 550666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561561">SUSE bug 561561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581162">SUSE bug 581162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611931">SUSE bug 611931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/694595">SUSE bug 694595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725950">SUSE bug 725950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140776" comment="libapr-util1-1.5.3-1.77 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140777" comment="libapr-util1-dbd-sqlite3-1.5.3-1.77 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<bugzilla href="https://bugzilla.suse.com/546393">SUSE bug 546393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<bugzilla href="https://bugzilla.suse.com/543090">SUSE bug 543090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543410">SUSE bug 543410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546400">SUSE bug 546400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546404">SUSE bug 546404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/556049">SUSE bug 556049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/566697">SUSE bug 566697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3612</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3612" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3612" ref_url="https://www.suse.com/security/cve/CVE-2009-3612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3612/">CVE-2009-3612</cve>
	<bugzilla href="https://bugzilla.suse.com/536467">SUSE bug 536467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<bugzilla href="https://bugzilla.suse.com/550076">SUSE bug 550076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/585716">SUSE bug 585716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141067" comment="perl-HTML-Parser-3.71-1.178 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3700" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3700" ref_url="https://www.suse.com/security/cve/CVE-2009-3700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00006.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in sgLog.c in squidGuard 1.3 and 1.4 allows remote attackers to cause a denial of service (application hang or loss of blocking functionality) via a long URL with many / (slash) characters, related to "emergency mode."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3700/">CVE-2009-3700</cve>
	<bugzilla href="https://bugzilla.suse.com/550930">SUSE bug 550930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141128" comment="squidGuard-1.4-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141129" comment="squidGuard-doc-1.4-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3720" ref_url="https://www.suse.com/security/cve/CVE-2009-3720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2009:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3720/">CVE-2009-3720</cve>
	<bugzilla href="https://bugzilla.suse.com/534721">SUSE bug 534721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550664">SUSE bug 550664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550666">SUSE bug 550666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558892">SUSE bug 558892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/561561">SUSE bug 561561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581162">SUSE bug 581162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/581765">SUSE bug 581765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611931">SUSE bug 611931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725950">SUSE bug 725950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140776" comment="libapr-util1-1.5.3-1.77 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140777" comment="libapr-util1-dbd-sqlite3-1.5.3-1.77 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" source="SUSE-SU"/>
    <description>
    ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<bugzilla href="https://bugzilla.suse.com/556122">SUSE bug 556122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140875" comment="libltdl7-2.4.2-14.60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140876" comment="libltdl7-32bit-2.4.2-14.60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140877" comment="libtool-2.4.2-14.60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140878" comment="libtool-32bit-2.4.2-14.60 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3826" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3826" ref_url="https://www.suse.com/security/cve/CVE-2009-3826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00006.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in squidGuard 1.4 allow remote attackers to bypass intended URL blocking via a long URL, related to (1) the relationship between a certain buffer size in squidGuard and a certain buffer size in Squid and (2) a redirect URL that contains information about the originally requested URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3826/">CVE-2009-3826</cve>
	<bugzilla href="https://bugzilla.suse.com/550930">SUSE bug 550930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141128" comment="squidGuard-1.4-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141129" comment="squidGuard-doc-1.4-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3894" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3894" ref_url="https://www.suse.com/security/cve/CVE-2009-3894" source="SUSE CVE"/>
    <description>
    Multiple untrusted search path vulnerabilities in dstat before 0.7.0 allow local users to gain privileges via a Trojan horse Python module in (1) the current working directory or (2) a certain subdirectory of the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3894/">CVE-2009-3894</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140548" comment="dstat-0.7.2-1.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939</cve>
	<bugzilla href="https://bugzilla.suse.com/555173">SUSE bug 555173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557180">SUSE bug 557180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3979" ref_url="https://www.suse.com/security/cve/CVE-2009-3979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3979/">CVE-2009-3979</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3980" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3980" ref_url="https://www.suse.com/security/cve/CVE-2009-3980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3980/">CVE-2009-3980</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3982" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3982" ref_url="https://www.suse.com/security/cve/CVE-2009-3982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3982/">CVE-2009-3982</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3983" ref_url="https://www.suse.com/security/cve/CVE-2009-3983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3983/">CVE-2009-3983</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590499">SUSE bug 590499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/607935">SUSE bug 607935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3984" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3984" ref_url="https://www.suse.com/security/cve/CVE-2009-3984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3984/">CVE-2009-3984</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3985" ref_url="https://www.suse.com/security/cve/CVE-2009-3985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:063" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3985/">CVE-2009-3985</cve>
	<bugzilla href="https://bugzilla.suse.com/559807">SUSE bug 559807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4012" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in LibThai before 0.1.13 might allow context-dependent attackers to execute arbitrary code via long strings that trigger heap-based buffer overflows, related to (1) thbrk/thbrk.c and (2) thwbrk/thwbrk.c.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<bugzilla href="https://bugzilla.suse.com/569615">SUSE bug 569615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140966" comment="libthai-data-0.1.25-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140967" comment="libthai0-0.1.25-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140968" comment="libthai0-32bit-0.1.25-4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4019" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4019" ref_url="https://www.suse.com/security/cve/CVE-2009-4019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00006.html" source="SUSE-SU"/>
    <description>
    mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4019/">CVE-2009-4019</cve>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4022" ref_url="https://www.suse.com/security/cve/CVE-2009-4022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:059" ref_url="https://lists.opensuse.org/opensuse-security-announce/2009-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4022/">CVE-2009-4022</cve>
	<bugzilla href="https://bugzilla.suse.com/558260">SUSE bug 558260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570912">SUSE bug 570912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644911">SUSE bug 644911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4026" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
    <description>
    The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026</cve>
	<bugzilla href="https://bugzilla.suse.com/558267">SUSE bug 558267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4027" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027</cve>
	<bugzilla href="https://bugzilla.suse.com/558267">SUSE bug 558267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4028" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4028" ref_url="https://www.suse.com/security/cve/CVE-2009-4028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00006.html" source="SUSE-SU"/>
    <description>
    The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4028/">CVE-2009-4028</cve>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000578.html" source="SUSE-SU"/>
    <description>
    The (1) dist or (2) distcheck rules in GNU Automake 1.11.1, 1.10.3, and release branches branch-1-4 through branch-1-9, when producing a distribution tarball for a package that uses Automake, assign insecure permissions (777) to directories in the build tree, which introduces a race condition that allows local users to modify the contents of package files, introduce Trojan horse programs, or conduct other attacks before the build is complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<bugzilla href="https://bugzilla.suse.com/559815">SUSE bug 559815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786745">SUSE bug 786745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140465" comment="automake-1.13.4-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140466" comment="m4-1.4.16-15.74 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4030" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4030" ref_url="https://www.suse.com/security/cve/CVE-2009-4030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0198-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00006.html" source="SUSE-SU"/>
    <description>
    MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4030/">CVE-2009-4030</cve>
	<bugzilla href="https://bugzilla.suse.com/557669">SUSE bug 557669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604528">SUSE bug 604528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4034" ref_url="https://www.suse.com/security/cve/CVE-2009-4034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4034/">CVE-2009-4034</cve>
	<bugzilla href="https://bugzilla.suse.com/564710">SUSE bug 564710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603968">SUSE bug 603968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4067" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4067" ref_url="https://www.suse.com/security/cve/CVE-2009-4067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:042" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4067/">CVE-2009-4067</cve>
	<bugzilla href="https://bugzilla.suse.com/706375">SUSE bug 706375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4131" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
    <description>
    The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131</cve>
	<bugzilla href="https://bugzilla.suse.com/561018">SUSE bug 561018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564380">SUSE bug 564380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4136" ref_url="https://www.suse.com/security/cve/CVE-2009-4136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4136/">CVE-2009-4136</cve>
	<bugzilla href="https://bugzilla.suse.com/564360">SUSE bug 564360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/603969">SUSE bug 603969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4138" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
    <description>
    drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138</cve>
	<bugzilla href="https://bugzilla.suse.com/564712">SUSE bug 564712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4212" ref_url="https://www.suse.com/security/cve/CVE-2009-4212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7005185" ref_url="https://www.suse.com/support/kb/doc/?id=7005185" source="SUSE-SU"/>
		<reference ref_id="TID7005397" ref_url="https://www.suse.com/support/kb/doc/?id=7005397" source="SUSE-SU"/>
    <description>
    Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-4212/">CVE-2009-4212</cve>
	<bugzilla href="https://bugzilla.suse.com/561351">SUSE bug 561351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4273" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4273" ref_url="https://www.suse.com/security/cve/CVE-2009-4273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0166-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00032.html" source="SUSE-SU"/>
    <description>
    stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4273/">CVE-2009-4273</cve>
	<bugzilla href="https://bugzilla.suse.com/574243">SUSE bug 574243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141135" comment="systemtap-3.0-7.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141136" comment="systemtap-runtime-3.0-7.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141137" comment="systemtap-server-3.0-7.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4308</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4308" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4308" ref_url="https://www.suse.com/security/cve/CVE-2009-4308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The ext4_decode_error function in fs/ext4/super.c in the ext4 filesystem in the Linux kernel before 2.6.32 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference), and possibly have unspecified other impact, via a crafted read-only filesystem that lacks a journal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4308/">CVE-2009-4308</cve>
	<bugzilla href="https://bugzilla.suse.com/564382">SUSE bug 564382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4492" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4492" ref_url="https://www.suse.com/security/cve/CVE-2009-4492" source="SUSE CVE"/>
    <description>
    WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4492/">CVE-2009-4492</cve>
	<bugzilla href="https://bugzilla.suse.com/570616">SUSE bug 570616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580482">SUSE bug 580482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00017.html" source="SUSE-SU"/>
    <description>
    drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536</cve>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html" source="SUSE-SU"/>
    <description>
    drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-403" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<bugzilla href="https://bugzilla.suse.com/735850">SUSE bug 735850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/736174">SUSE bug 736174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759836">SUSE bug 759836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826666">SUSE bug 826666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5044" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0642-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00029.html" source="SUSE-SU"/>
    <description>
    contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044</cve>
	<bugzilla href="https://bugzilla.suse.com/698290">SUSE bug 698290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703666">SUSE bug 703666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140646" comment="groff-full-1.22.2-5.429 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140647" comment="gxditview-1.22.2-5.429 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5080" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080" source="SUSE CVE"/>
    <description>
    The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080</cve>
	<bugzilla href="https://bugzilla.suse.com/703665">SUSE bug 703665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140646" comment="groff-full-1.22.2-5.429 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140647" comment="gxditview-1.22.2-5.429 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5081" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081" source="SUSE CVE"/>
    <description>
    The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<bugzilla href="https://bugzilla.suse.com/703666">SUSE bug 703666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140645" comment="groff-1.22.2-5.429 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140646" comment="groff-full-1.22.2-5.429 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140647" comment="gxditview-1.22.2-5.429 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5147" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5147" ref_url="https://www.suse.com/security/cve/CVE-2009-5147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001661.html" source="SUSE-SU"/>
    <description>
    DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2009-5147/">CVE-2009-5147</cve>
	<bugzilla href="https://bugzilla.suse.com/939860">SUSE bug 939860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005821.html" source="SUSE-SU"/>
    <description>
    In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530595" comment="glibc-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530596" comment="glibc-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530597" comment="glibc-devel-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530598" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530602" comment="glibc-locale-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530603" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530604" comment="glibc-profile-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530605" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530606" comment="nscd-2.22-62.22.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551189" comment="glibc-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551190" comment="glibc-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551191" comment="glibc-devel-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551192" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551193" comment="glibc-locale-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551194" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551195" comment="glibc-profile-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551196" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551197" comment="nscd-2.22-62.22.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595033" comment="glibc-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551190" comment="glibc-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595034" comment="glibc-devel-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551192" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595035" comment="glibc-locale-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551194" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595036" comment="glibc-profile-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551196" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595037" comment="nscd-2.22-62.22.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0001" ref_url="https://www.suse.com/security/cve/CVE-2010-0001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0001/">CVE-2010-0001</cve>
	<bugzilla href="https://bugzilla.suse.com/570331">SUSE bug 570331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/588113">SUSE bug 588113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140677" comment="gzip-1.6-7.392 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0164" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0164" ref_url="https://www.suse.com/security/cve/CVE-2010-0164" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the imgContainer::InternalAddFrameHelper function in src/imgContainer.cpp in libpr0n in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace animation in which the frames have different bits-per-pixel (bpp) values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0164/">CVE-2010-0164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0165" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0165" ref_url="https://www.suse.com/security/cve/CVE-2010-0165" source="SUSE CVE"/>
    <description>
    The TraceRecorder::traverseScopeChain function in js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors involving certain indirect calls to the JavaScript eval function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0165/">CVE-2010-0165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0166" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0166" ref_url="https://www.suse.com/security/cve/CVE-2010-0166" source="SUSE CVE"/>
    <description>
    The gfxTextRun::SanitizeGlyphRuns function in gfx/thebes/src/gfxFont.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 on Mac OS X, when the Core Text API is used, does not properly perform certain deletions, which allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via an HTML document containing invisible Unicode characters, as demonstrated by the U+FEFF, U+FFF9, U+FFFA, and U+FFFB characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0166/">CVE-2010-0166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0167" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0167" ref_url="https://www.suse.com/security/cve/CVE-2010-0167" source="SUSE CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors related to (1) layout/generic/nsBlockFrame.cpp and (2) the _evaluate function in modules/plugin/base/src/nsNPAPIPlugin.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0167/">CVE-2010-0167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0168" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0168" ref_url="https://www.suse.com/security/cve/CVE-2010-0168" source="SUSE CVE"/>
    <description>
    The nsDocument::MaybePreLoadImage function in content/base/src/nsDocument.cpp in the image-preloading implementation in Mozilla Firefox 3.6 before 3.6.2 does not apply scheme restrictions and policy restrictions to the image's URL, which might allow remote attackers to cause a denial of service (application crash or hang) or hijack the functionality of the browser's add-ons via a crafted SRC attribute of an IMG element, as demonstrated by remote command execution through an ssh: URL in a configuration that supports gnome-vfs with a nonstandard network.gnomevfs.supported-protocols setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0168/">CVE-2010-0168</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0169" ref_url="https://www.suse.com/security/cve/CVE-2010-0169" source="SUSE CVE"/>
    <description>
    The CSSLoaderImpl::DoSheetComplete function in layout/style/nsCSSLoader.cpp in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 changes the case of certain strings in a stylesheet before adding this stylesheet to the XUL cache, which might allow remote attackers to modify the browser's font and other CSS attributes, and potentially disrupt rendering of a web page, by forcing the browser to perform this erroneous stylesheet caching.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0169/">CVE-2010-0169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0170" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0170" ref_url="https://www.suse.com/security/cve/CVE-2010-0170" source="SUSE CVE"/>
    <description>
    Mozilla Firefox 3.6 before 3.6.2 does not offer plugins the expected window.location protection mechanism, which might allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors that are specific to each affected plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0170/">CVE-2010-0170</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0171" ref_url="https://www.suse.com/security/cve/CVE-2010-0171" source="SUSE CVE"/>
    <description>
    Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allow remote attackers to perform cross-origin keystroke capture, and possibly conduct cross-site scripting (XSS) attacks, by using the addEventListener and setTimeout functions in conjunction with a wrapped object.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-3736.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0171/">CVE-2010-0171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0172" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0172" ref_url="https://www.suse.com/security/cve/CVE-2010-0172" source="SUSE CVE"/>
    <description>
    toolkit/components/passwordmgr/src/nsLoginManagerPrompter.js in the asynchronous Authorization Prompt implementation in Mozilla Firefox 3.6 before 3.6.2 does not properly handle concurrent authorization requests from multiple web sites, which might allow remote web servers to spoof an authorization dialog and capture credentials by demanding HTTP authentication in opportunistic circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0172/">CVE-2010-0172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0173" ref_url="https://www.suse.com/security/cve/CVE-2010-0173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0173/">CVE-2010-0173</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0174" ref_url="https://www.suse.com/security/cve/CVE-2010-0174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0174/">CVE-2010-0174</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0176" ref_url="https://www.suse.com/security/cve/CVE-2010-0176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0176/">CVE-2010-0176</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0177" ref_url="https://www.suse.com/security/cve/CVE-2010-0177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, frees the contents of the window.navigator.plugins array while a reference to an array element is still active, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0177/">CVE-2010-0177</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0178" ref_url="https://www.suse.com/security/cve/CVE-2010-0178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary JavaScript with Chrome privileges by loading a chrome: URL and then loading a javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0178/">CVE-2010-0178</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0181" ref_url="https://www.suse.com/security/cve/CVE-2010-0181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0181/">CVE-2010-0181</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0182" ref_url="https://www.suse.com/security/cve/CVE-2010-0182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0102-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0182/">CVE-2010-0182</cve>
	<bugzilla href="https://bugzilla.suse.com/586567">SUSE bug 586567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0283" ref_url="https://www.suse.com/security/cve/CVE-2010-0283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-02/msg00008.html" source="SUSE-SU"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0283/">CVE-2010-0283</cve>
	<bugzilla href="https://bugzilla.suse.com/571781">SUSE bug 571781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/576524">SUSE bug 576524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0393" ref_url="https://www.suse.com/security/cve/CVE-2010-0393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
    <description>
    The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0393/">CVE-2010-0393</cve>
	<bugzilla href="https://bugzilla.suse.com/574336">SUSE bug 574336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0405" ref_url="https://www.suse.com/security/cve/CVE-2010-0405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0684-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00058.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0405/">CVE-2010-0405</cve>
	<bugzilla href="https://bugzilla.suse.com/636978">SUSE bug 636978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646682">SUSE bug 646682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140483" comment="bzip2-1.0.6-29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140484" comment="bzip2-doc-1.0.6-29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140485" comment="libbz2-1-1.0.6-29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140486" comment="libbz2-1-32bit-1.0.6-29.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0407" ref_url="https://www.suse.com/security/cve/CVE-2010-0407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00020.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0407/">CVE-2010-0407</cve>
	<bugzilla href="https://bugzilla.suse.com/609317">SUSE bug 609317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641823">SUSE bug 641823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140900" comment="libpcsclite1-1.8.10-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140901" comment="pcsc-lite-1.8.10-3.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0408" ref_url="https://www.suse.com/security/cve/CVE-2010-0408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00084.html" source="SUSE-SU"/>
    <description>
    The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0408/">CVE-2010-0408</cve>
	<bugzilla href="https://bugzilla.suse.com/586572">SUSE bug 586572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601151">SUSE bug 601151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0411" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0411" ref_url="https://www.suse.com/security/cve/CVE-2010-0411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0166-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00032.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the (1) __get_argv and (2) __get_compat_argv functions in tapset/aux_syscalls.stp in SystemTap 1.1 allow local users to cause a denial of service (script crash, or system crash or hang) via a process with a large number of arguments, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0411/">CVE-2010-0411</cve>
	<bugzilla href="https://bugzilla.suse.com/574243">SUSE bug 574243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577382">SUSE bug 577382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141135" comment="systemtap-3.0-7.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141136" comment="systemtap-runtime-3.0-7.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141137" comment="systemtap-server-3.0-7.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0412" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0412" ref_url="https://www.suse.com/security/cve/CVE-2010-0412" source="SUSE CVE"/>
    <description>
    stap-server in SystemTap 1.1 does not properly restrict the value of the -B (aka BUILD) option, which allows attackers to have an unspecified impact via vectors associated with executing the make program, a different vulnerability than CVE-2009-4273.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0412/">CVE-2010-0412</cve>
	<bugzilla href="https://bugzilla.suse.com/574243">SUSE bug 574243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141135" comment="systemtap-3.0-7.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141136" comment="systemtap-runtime-3.0-7.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141137" comment="systemtap-server-3.0-7.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0424" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0424" ref_url="https://www.suse.com/security/cve/CVE-2010-0424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
    <description>
    The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0424/">CVE-2010-0424</cve>
	<bugzilla href="https://bugzilla.suse.com/579447">SUSE bug 579447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/580800">SUSE bug 580800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/589640">SUSE bug 589640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/590353">SUSE bug 590353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140508" comment="cron-4.2-58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140509" comment="cronie-1.4.11-58.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0425" ref_url="https://www.suse.com/security/cve/CVE-2010-0425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-0425/">CVE-2010-0425</cve>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/586572">SUSE bug 586572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601151">SUSE bug 601151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0434" ref_url="https://www.suse.com/security/cve/CVE-2010-0434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00084.html" source="SUSE-SU"/>
    <description>
    The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-0434/">CVE-2010-0434</cve>
	<bugzilla href="https://bugzilla.suse.com/586572">SUSE bug 586572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/601151">SUSE bug 601151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0540" ref_url="https://www.suse.com/security/cve/CVE-2010-0540" source="SUSE CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, allows remote attackers to hijack the authentication of administrators for requests that change settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0540/">CVE-2010-0540</cve>
	<bugzilla href="https://bugzilla.suse.com/601830">SUSE bug 601830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/671735">SUSE bug 671735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680210">SUSE bug 680210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680212">SUSE bug 680212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700987">SUSE bug 700987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711490">SUSE bug 711490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715643">SUSE bug 715643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748422">SUSE bug 748422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0541" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0541" ref_url="https://www.suse.com/security/cve/CVE-2010-0541" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00060.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0541/">CVE-2010-0541</cve>
	<bugzilla href="https://bugzilla.suse.com/600752">SUSE bug 600752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0542" ref_url="https://www.suse.com/security/cve/CVE-2010-0542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0542/">CVE-2010-0542</cve>
	<bugzilla href="https://bugzilla.suse.com/601352">SUSE bug 601352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644521">SUSE bug 644521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657780">SUSE bug 657780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0547" ref_url="https://www.suse.com/security/cve/CVE-2010-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0547/">CVE-2010-0547</cve>
	<bugzilla href="https://bugzilla.suse.com/577868">SUSE bug 577868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577925">SUSE bug 577925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583536">SUSE bug 583536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/597421">SUSE bug 597421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/602694">SUSE bug 602694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/709819">SUSE bug 709819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0189-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00044.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<bugzilla href="https://bugzilla.suse.com/579475">SUSE bug 579475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608034">SUSE bug 608034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102938" comment="cpio-2.11-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102939" comment="cpio-lang-2.11-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136443" comment="tar-1.27.1-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009136445" comment="tar-lang-1.27.1-8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0628" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0628" ref_url="https://www.suse.com/security/cve/CVE-2010-0628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
    <description>
    The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in the SPNEGO GSS-API functionality in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2 and 1.8 before 1.8.1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid packet that triggers incorrect preparation of an error token.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0628/">CVE-2010-0628</cve>
	<bugzilla href="https://bugzilla.suse.com/582557">SUSE bug 582557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/586981">SUSE bug 586981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0654" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0654" ref_url="https://www.suse.com/security/cve/CVE-2010-0654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-4" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0654/">CVE-2010-0654</cve>
	<bugzilla href="https://bugzilla.suse.com/583603">SUSE bug 583603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0728" ref_url="https://www.suse.com/security/cve/CVE-2010-0728" source="SUSE CVE"/>
    <description>
    smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-0728/">CVE-2010-0728</cve>
	<bugzilla href="https://bugzilla.suse.com/586683">SUSE bug 586683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0740" ref_url="https://www.suse.com/security/cve/CVE-2010-0740" source="SUSE CVE"/>
    <description>
    The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0740/">CVE-2010-0740</cve>
	<bugzilla href="https://bugzilla.suse.com/590833">SUSE bug 590833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0742" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0742" ref_url="https://www.suse.com/security/cve/CVE-2010-0742" source="SUSE CVE"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
    <description>
    The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0742/">CVE-2010-0742</cve>
	<bugzilla href="https://bugzilla.suse.com/610642">SUSE bug 610642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0750" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0750" ref_url="https://www.suse.com/security/cve/CVE-2010-0750" source="SUSE CVE"/>
    <description>
    pkexec.c in pkexec in libpolkit in PolicyKit 0.96 allows local users to determine the existence of arbitrary files via the argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0750/">CVE-2010-0750</cve>
	<bugzilla href="https://bugzilla.suse.com/593959">SUSE bug 593959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0787" ref_url="https://www.suse.com/security/cve/CVE-2010-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0787/">CVE-2010-0787</cve>
	<bugzilla href="https://bugzilla.suse.com/550002">SUSE bug 550002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/602694">SUSE bug 602694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620680">SUSE bug 620680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0926" ref_url="https://www.suse.com/security/cve/CVE-2010-0926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
    <description>
    The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0926/">CVE-2010-0926</cve>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577868">SUSE bug 577868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/597421">SUSE bug 597421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1028" ref_url="https://www.suse.com/security/cve/CVE-2010-1028" source="SUSE CVE"/>
    <description>
    Integer overflow in the decompression functionality in the Web Open Fonts Format (WOFF) decoder in Mozilla Firefox 3.6 before 3.6.2 and 3.7 before 3.7 alpha 3 allows remote attackers to execute arbitrary code via a crafted WOFF file that triggers a buffer overflow, as demonstrated by the vd_ff module in VulnDisco 9.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1028/">CVE-2010-1028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1121" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1121" ref_url="https://www.suse.com/security/cve/CVE-2010-1121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1121/">CVE-2010-1121</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1125" ref_url="https://www.suse.com/security/cve/CVE-2010-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
    <description>
    The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1125/">CVE-2010-1125</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1146" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1146" ref_url="https://www.suse.com/security/cve/CVE-2010-1146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1146/">CVE-2010-1146</cve>
	<bugzilla href="https://bugzilla.suse.com/593906">SUSE bug 593906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1163" ref_url="https://www.suse.com/security/cve/CVE-2010-1163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0050-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00022.html" source="SUSE-SU"/>
    <description>
    The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1163/">CVE-2010-1163</cve>
	<bugzilla href="https://bugzilla.suse.com/594738">SUSE bug 594738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1167" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167" source="SUSE CVE"/>
    <description>
    fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<bugzilla href="https://bugzilla.suse.com/597673">SUSE bug 597673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140570" comment="fetchmailconf-6.3.26-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1169" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1169" ref_url="https://www.suse.com/security/cve/CVE-2010-1169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0371-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00010.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1169/">CVE-2010-1169</cve>
	<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1170" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1170" ref_url="https://www.suse.com/security/cve/CVE-2010-1170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0371-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00010.html" source="SUSE-SU"/>
    <description>
    The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1170/">CVE-2010-1170</cve>
	<bugzilla href="https://bugzilla.suse.com/605845">SUSE bug 605845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605926">SUSE bug 605926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/634562">SUSE bug 634562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1172" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0969-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0300-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00025.html" source="SUSE-SU"/>
    <description>
    DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, and (3) ModemManager services.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633621">SUSE bug 633621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633622">SUSE bug 633622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633623">SUSE bug 633623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633629">SUSE bug 633629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633637">SUSE bug 633637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633639">SUSE bug 633639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633648">SUSE bug 633648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633652">SUSE bug 633652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633653">SUSE bug 633653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633654">SUSE bug 633654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633658">SUSE bug 633658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633660">SUSE bug 633660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633678">SUSE bug 633678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633679">SUSE bug 633679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633681">SUSE bug 633681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633682">SUSE bug 633682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633685">SUSE bug 633685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633686">SUSE bug 633686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633700">SUSE bug 633700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633701">SUSE bug 633701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633702">SUSE bug 633702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1196" ref_url="https://www.suse.com/security/cve/CVE-2010-1196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1196/">CVE-2010-1196</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1197" ref_url="https://www.suse.com/security/cve/CVE-2010-1197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1197/">CVE-2010-1197</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1198" ref_url="https://www.suse.com/security/cve/CVE-2010-1198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1198/">CVE-2010-1198</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1199" ref_url="https://www.suse.com/security/cve/CVE-2010-1199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1199/">CVE-2010-1199</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1200" ref_url="https://www.suse.com/security/cve/CVE-2010-1200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1200/">CVE-2010-1200</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1201" ref_url="https://www.suse.com/security/cve/CVE-2010-1201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1201/">CVE-2010-1201</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1202" ref_url="https://www.suse.com/security/cve/CVE-2010-1202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1202/">CVE-2010-1202</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1203" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1203" ref_url="https://www.suse.com/security/cve/CVE-2010-1203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:030" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger an assertion failure in jstracer.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1203/">CVE-2010-1203</cve>
	<bugzilla href="https://bugzilla.suse.com/603356">SUSE bug 603356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617399">SUSE bug 617399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-4" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0594-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/617866">SUSE bug 617866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/639941">SUSE bug 639941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1206" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1206" ref_url="https://www.suse.com/security/cve/CVE-2010-1206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    The startDocumentLoad function in browser/base/content/browser.js in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, does not properly implement the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors involving a 204 (aka No Content) status code, and allows (2) remote attackers to conduct spoofing attacks via vectors involving a window.stop call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1206/">CVE-2010-1206</cve>
	<bugzilla href="https://bugzilla.suse.com/618183">SUSE bug 618183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1207" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1207" ref_url="https://www.suse.com/security/cve/CVE-2010-1207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 do not properly implement read restrictions for CANVAS elements, which allows remote attackers to obtain sensitive cross-origin information via vectors involving reference retention and node deletion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1207/">CVE-2010-1207</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1208" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1208" ref_url="https://www.suse.com/security/cve/CVE-2010-1208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1208/">CVE-2010-1208</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1209" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1209" ref_url="https://www.suse.com/security/cve/CVE-2010-1209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the NodeIterator implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via a crafted NodeFilter that detaches DOM nodes, related to the NodeIterator interface and a javascript callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1209/">CVE-2010-1209</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1210" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1210" ref_url="https://www.suse.com/security/cve/CVE-2010-1210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1210/">CVE-2010-1210</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1211" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1211" ref_url="https://www.suse.com/security/cve/CVE-2010-1211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1211/">CVE-2010-1211</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1212" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1212" ref_url="https://www.suse.com/security/cve/CVE-2010-1212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) propagation of deep aborts in the TraceRecorder::record_JSOP_BINDNAME function, (2) depth handling in the TraceRecorder::record_JSOP_GETELEM function, and (3) tracing of out-of-range arguments in the TraceRecorder::record_JSOP_ARGSUB function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1212/">CVE-2010-1212</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1213" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1213" ref_url="https://www.suse.com/security/cve/CVE-2010-1213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-4" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1213/">CVE-2010-1213</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1214" ref_url="https://www.suse.com/security/cve/CVE-2010-1214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1214/">CVE-2010-1214</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1215" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1215" ref_url="https://www.suse.com/security/cve/CVE-2010-1215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-1215/">CVE-2010-1215</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1320" ref_url="https://www.suse.com/security/cve/CVE-2010-1320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0147-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-04/msg00026.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x before 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated with (1) renewal or (2) validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1320/">CVE-2010-1320</cve>
	<bugzilla href="https://bugzilla.suse.com/596002">SUSE bug 596002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1321" ref_url="https://www.suse.com/security/cve/CVE-2010-1321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:013" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0292-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0754-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00026.html" source="SUSE-SU"/>
    <description>
    The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1321/">CVE-2010-1321</cve>
	<bugzilla href="https://bugzilla.suse.com/596826">SUSE bug 596826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/611090">SUSE bug 611090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646073">SUSE bug 646073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648950">SUSE bug 648950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658525">SUSE bug 658525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/659926">SUSE bug 659926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663953">SUSE bug 663953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679560">SUSE bug 679560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1322" ref_url="https://www.suse.com/security/cve/CVE-2010-1322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0709-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1322/">CVE-2010-1322</cve>
	<bugzilla href="https://bugzilla.suse.com/640990">SUSE bug 640990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1323" ref_url="https://www.suse.com/security/cve/CVE-2010-1323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7008287" ref_url="https://www.suse.com/support/kb/doc/?id=7008287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1053-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00030.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1323/">CVE-2010-1323</cve>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1324" ref_url="https://www.suse.com/security/cve/CVE-2010-1324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7008287" ref_url="https://www.suse.com/support/kb/doc/?id=7008287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1053-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00030.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1324/">CVE-2010-1324</cve>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1436" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436" source="SUSE CVE"/>
    <description>
    gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436</cve>
	<bugzilla href="https://bugzilla.suse.com/599957">SUSE bug 599957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1452" ref_url="https://www.suse.com/security/cve/CVE-2010-1452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html" source="SUSE-SU"/>
    <description>
    The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1452/">CVE-2010-1452</cve>
	<bugzilla href="https://bugzilla.suse.com/627030">SUSE bug 627030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1455" ref_url="https://www.suse.com/security/cve/CVE-2010-1455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1455/">CVE-2010-1455</cve>
	<bugzilla href="https://bugzilla.suse.com/603251">SUSE bug 603251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1623" ref_url="https://www.suse.com/security/cve/CVE-2010-1623" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1623/">CVE-2010-1623</cve>
	<bugzilla href="https://bugzilla.suse.com/650435">SUSE bug 650435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693778">SUSE bug 693778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725950">SUSE bug 725950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997229">SUSE bug 997229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140776" comment="libapr-util1-1.5.3-1.77 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140777" comment="libapr-util1-dbd-sqlite3-1.5.3-1.77 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1633" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1633" ref_url="https://www.suse.com/security/cve/CVE-2010-1633" source="SUSE CVE"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
    <description>
    RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1633/">CVE-2010-1633</cve>
	<bugzilla href="https://bugzilla.suse.com/610642">SUSE bug 610642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1635" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1635" ref_url="https://www.suse.com/security/cve/CVE-2010-1635" source="SUSE CVE"/>
    <description>
    The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1635/">CVE-2010-1635</cve>
	<bugzilla href="https://bugzilla.suse.com/605935">SUSE bug 605935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641</cve>
	<bugzilla href="https://bugzilla.suse.com/608576">SUSE bug 608576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1642" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1642" ref_url="https://www.suse.com/security/cve/CVE-2010-1642" source="SUSE CVE"/>
    <description>
    The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1642/">CVE-2010-1642</cve>
	<bugzilla href="https://bugzilla.suse.com/605935">SUSE bug 605935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0050-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00022.html" source="SUSE-SU"/>
    <description>
    The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646</cve>
	<bugzilla href="https://bugzilla.suse.com/594738">SUSE bug 594738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1674" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0274-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0274-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674</cve>
	<bugzilla href="https://bugzilla.suse.com/654270">SUSE bug 654270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/685558">SUSE bug 685558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128392" comment="quagga-0.99.22.1-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1675" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:006" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0274-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0274-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00010.html" source="SUSE-SU"/>
    <description>
    bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675</cve>
	<bugzilla href="https://bugzilla.suse.com/654270">SUSE bug 654270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/685558">SUSE bug 685558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128392" comment="quagga-0.99.22.1-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1748" ref_url="https://www.suse.com/security/cve/CVE-2010-1748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1748/">CVE-2010-1748</cve>
	<bugzilla href="https://bugzilla.suse.com/601352">SUSE bug 601352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/604271">SUSE bug 604271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/644521">SUSE bug 644521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649256">SUSE bug 649256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657780">SUSE bug 657780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2063" ref_url="https://www.suse.com/security/cve/CVE-2010-2063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:025" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-06/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2063/">CVE-2010-2063</cve>
	<bugzilla href="https://bugzilla.suse.com/611927">SUSE bug 611927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2065" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065" source="SUSE CVE"/>
    <description>
    Integer overflow in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<bugzilla href="https://bugzilla.suse.com/612787">SUSE bug 612787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612879">SUSE bug 612879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2066" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:033" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066</cve>
	<bugzilla href="https://bugzilla.suse.com/612457">SUSE bug 612457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2067" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0387-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0420-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00029.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<bugzilla href="https://bugzilla.suse.com/612787">SUSE bug 612787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/612879">SUSE bug 612879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2068" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2068" ref_url="https://www.suse.com/security/cve/CVE-2010-2068" source="SUSE CVE"/>
    <description>
    mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2068/">CVE-2010-2068</cve>
	<bugzilla href="https://bugzilla.suse.com/627030">SUSE bug 627030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627387">SUSE bug 627387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:014" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="TID7002558" ref_url="https://www.suse.com/support/kb/doc?id=7002558" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0393-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00019.html" source="SUSE-SU"/>
    <description>
    istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<bugzilla href="https://bugzilla.suse.com/609451">SUSE bug 609451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141157" comment="w3m-0.5.3-157.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2156" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2156" ref_url="https://www.suse.com/security/cve/CVE-2010-2156" source="SUSE CVE"/>
    <description>
    ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2156/">CVE-2010-2156</cve>
	<bugzilla href="https://bugzilla.suse.com/612546">SUSE bug 612546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2233" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233" source="SUSE CVE"/>
    <description>
    tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used in ImageMagick, does not properly perform vertical flips, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF image, related to "downsampled OJPEG input."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<bugzilla href="https://bugzilla.suse.com/612879">SUSE bug 612879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:038" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00064.html" source="SUSE-SU"/>
    <description>
    The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240</cve>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/211997">SUSE bug 211997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546062">SUSE bug 546062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/59807">SUSE bug 59807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615929">SUSE bug 615929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618152">SUSE bug 618152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632737">SUSE bug 632737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643986">SUSE bug 643986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746947">SUSE bug 746947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746949">SUSE bug 746949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2242" ref_url="https://www.suse.com/security/cve/CVE-2010-2242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0625-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00026.html" source="SUSE-SU"/>
    <description>
    Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2242/">CVE-2010-2242</cve>
	<bugzilla href="https://bugzilla.suse.com/618155">SUSE bug 618155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2244" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2244" ref_url="https://www.suse.com/security/cve/CVE-2010-2244" source="SUSE CVE"/>
    <description>
    The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2244/">CVE-2010-2244</cve>
	<bugzilla href="https://bugzilla.suse.com/603289">SUSE bug 603289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/646961">SUSE bug 646961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140469" comment="avahi-utils-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2252" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2252" ref_url="https://www.suse.com/security/cve/CVE-2010-2252" source="SUSE CVE"/>
    <description>
    GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2252/">CVE-2010-2252</cve>
	<bugzilla href="https://bugzilla.suse.com/606317">SUSE bug 606317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2497" ref_url="https://www.suse.com/security/cve/CVE-2010-2497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00060.html" source="SUSE-SU"/>
    <description>
    Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2497/">CVE-2010-2497</cve>
	<bugzilla href="https://bugzilla.suse.com/619562">SUSE bug 619562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2522" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2522" ref_url="https://www.suse.com/security/cve/CVE-2010-2522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0736-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The mipv6 daemon in UMIP 0.4 does not verify that netlink messages originated in the kernel, which allows local users to spoof netlink socket communication via a crafted unicast message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2522/">CVE-2010-2522</cve>
	<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2523" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2523" ref_url="https://www.suse.com/security/cve/CVE-2010-2523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0736-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in ha.c in the mipv6 daemon in UMIP 0.4 allow remote attackers to have an unspecified impact via a crafted (1) ND_OPT_PREFIX_INFORMATION or (2) ND_OPT_HOME_AGENT_INFO packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2523/">CVE-2010-2523</cve>
	<bugzilla href="https://bugzilla.suse.com/424311">SUSE bug 424311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141042" comment="mipv6d-2.0.2.umip.0.4-19.77 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2529" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in ping.c in iputils 20020927, 20070202, 20071127, and 20100214 on Mandriva Linux allows remote attackers to cause a denial of service (hang) via a crafted echo response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<bugzilla href="https://bugzilla.suse.com/620837">SUSE bug 620837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140686" comment="iputils-s20121221-2.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2547" ref_url="https://www.suse.com/security/cve/CVE-2010-2547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:015" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0479-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2547/">CVE-2010-2547</cve>
	<bugzilla href="https://bugzilla.suse.com/625947">SUSE bug 625947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2640" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2640" ref_url="https://www.suse.com/security/cve/CVE-2010-2640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00019.html" source="SUSE-SU"/>
    <description>
    Array index error in the PK font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2640/">CVE-2010-2640</cve>
	<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2641" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2641" ref_url="https://www.suse.com/security/cve/CVE-2010-2641" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00019.html" source="SUSE-SU"/>
    <description>
    Array index error in the VF font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2641/">CVE-2010-2641</cve>
	<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2642" ref_url="https://www.suse.com/security/cve/CVE-2010-2642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0140-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2642/">CVE-2010-2642</cve>
	<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661018">SUSE bug 661018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662411">SUSE bug 662411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/664484">SUSE bug 664484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/790421">SUSE bug 790421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2643" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2643" ref_url="https://www.suse.com/security/cve/CVE-2010-2643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00019.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the TFM font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2643/">CVE-2010-2643</cve>
	<bugzilla href="https://bugzilla.suse.com/660555">SUSE bug 660555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140557" comment="evince-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140558" comment="evince-browser-plugin-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140559" comment="evince-lang-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140560" comment="evince-plugin-djvudocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140561" comment="evince-plugin-dvidocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140562" comment="evince-plugin-pdfdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140563" comment="evince-plugin-psdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140564" comment="evince-plugin-tiffdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140565" comment="evince-plugin-xpsdocument-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140566" comment="libevdocument3-4-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140567" comment="libevview3-3-3.20.1-5.66 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140568" comment="nautilus-evince-3.20.1-5.66 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2751" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2751" ref_url="https://www.suse.com/security/cve/CVE-2010-2751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2751/">CVE-2010-2751</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2752" ref_url="https://www.suse.com/security/cve/CVE-2010-2752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2752/">CVE-2010-2752</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2753" ref_url="https://www.suse.com/security/cve/CVE-2010-2753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2753/">CVE-2010-2753</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2754" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2754" ref_url="https://www.suse.com/security/cve/CVE-2010-2754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-4" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    dom/base/nsJSEnvironment.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not properly suppress a script's URL in certain circumstances involving a redirect and an error message, which allows remote attackers to obtain sensitive information about script parameters via a crafted HTML document, related to the window.onerror handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2754/">CVE-2010-2754</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2755" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2755" ref_url="https://www.suse.com/security/cve/CVE-2010-2755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:032" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0430-3" ref_url="https://lists.opensuse.org/opensuse-updates/2010-07/msg00052.html" source="SUSE-SU"/>
    <description>
    layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2755/">CVE-2010-2755</cve>
	<bugzilla href="https://bugzilla.suse.com/622506">SUSE bug 622506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2760" ref_url="https://www.suse.com/security/cve/CVE-2010-2760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a "dangling pointer vulnerability." NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2760/">CVE-2010-2760</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2761" ref_url="https://www.suse.com/security/cve/CVE-2010-2761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0064-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00027.html" source="SUSE-SU"/>
    <description>
    The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2761/">CVE-2010-2761</cve>
	<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657731">SUSE bug 657731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663396">SUSE bug 663396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669245">SUSE bug 669245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670476">SUSE bug 670476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2762" ref_url="https://www.suse.com/security/cve/CVE-2010-2762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-2762/">CVE-2010-2762</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2764" ref_url="https://www.suse.com/security/cve/CVE-2010-2764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2764/">CVE-2010-2764</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2765" ref_url="https://www.suse.com/security/cve/CVE-2010-2765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2765/">CVE-2010-2765</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2766" ref_url="https://www.suse.com/security/cve/CVE-2010-2766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2766/">CVE-2010-2766</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2767" ref_url="https://www.suse.com/security/cve/CVE-2010-2767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2767/">CVE-2010-2767</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2768" ref_url="https://www.suse.com/security/cve/CVE-2010-2768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2768/">CVE-2010-2768</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2769" ref_url="https://www.suse.com/security/cve/CVE-2010-2769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2769/">CVE-2010-2769</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2800" ref_url="https://www.suse.com/security/cve/CVE-2010-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000908.html" source="SUSE-SU"/>
    <description>
    The MS-ZIP decompressor in cabextract before 1.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed MSZIP archive in a .cab file during a (1) test or (2) extract action, related to the libmspack library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2800/">CVE-2010-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/627753">SUSE bug 627753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2801" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2801" ref_url="https://www.suse.com/security/cve/CVE-2010-2801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000908.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the Quantum decompressor in cabextract before 1.3, when archive test mode is used, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Quantum archive in a .cab file, related to the libmspack library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2801/">CVE-2010-2801</cve>
	<bugzilla href="https://bugzilla.suse.com/627753">SUSE bug 627753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2805" ref_url="https://www.suse.com/security/cve/CVE-2010-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-08/msg00060.html" source="SUSE-SU"/>
    <description>
    The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2805/">CVE-2010-2805</cve>
	<bugzilla href="https://bugzilla.suse.com/629447">SUSE bug 629447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2891" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<bugzilla href="https://bugzilla.suse.com/649867">SUSE bug 649867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140932" comment="libsmi-0.4.8-18.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140933" comment="libsmi2-0.4.8-18.63 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2939" ref_url="https://www.suse.com/security/cve/CVE-2010-2939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0951-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0952-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime.  NOTE: some sources refer to this as a use-after-free issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2939/">CVE-2010-2939</cve>
	<bugzilla href="https://bugzilla.suse.com/489641">SUSE bug 489641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2941" ref_url="https://www.suse.com/security/cve/CVE-2010-2941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00008.html" source="SUSE-SU"/>
    <description>
    ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2941/">CVE-2010-2941</cve>
	<bugzilla href="https://bugzilla.suse.com/649256">SUSE bug 649256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654627">SUSE bug 654627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:040" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942</cve>
	<bugzilla href="https://bugzilla.suse.com/632309">SUSE bug 632309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642324">SUSE bug 642324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0723-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<bugzilla href="https://bugzilla.suse.com/631582">SUSE bug 631582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140717" comment="libHX28-3.18-1.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140718" comment="libHX28-32bit-3.18-1.19 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954</cve>
	<bugzilla href="https://bugzilla.suse.com/636112">SUSE bug 636112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2955" ref_url="https://www.suse.com/security/cve/CVE-2010-2955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2955/">CVE-2010-2955</cve>
	<bugzilla href="https://bugzilla.suse.com/635413">SUSE bug 635413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2993" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2993" ref_url="https://www.suse.com/security/cve/CVE-2010-2993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The IPMI dissector in Wireshark 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2993/">CVE-2010-2993</cve>
	<bugzilla href="https://bugzilla.suse.com/630599">SUSE bug 630599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3053" ref_url="https://www.suse.com/security/cve/CVE-2010-3053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00015.html" source="SUSE-SU"/>
    <description>
    bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3053/">CVE-2010-3053</cve>
	<bugzilla href="https://bugzilla.suse.com/633938">SUSE bug 633938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645982">SUSE bug 645982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3054" ref_url="https://www.suse.com/security/cve/CVE-2010-3054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3054/">CVE-2010-3054</cve>
	<bugzilla href="https://bugzilla.suse.com/633943">SUSE bug 633943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645982">SUSE bug 645982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3069" ref_url="https://www.suse.com/security/cve/CVE-2010-3069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:018" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0653-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0658-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0659-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-09/msg00044.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3069/">CVE-2010-3069</cve>
	<bugzilla href="https://bugzilla.suse.com/637218">SUSE bug 637218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081</cve>
	<bugzilla href="https://bugzilla.suse.com/639709">SUSE bug 639709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641575">SUSE bug 641575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3166" ref_url="https://www.suse.com/security/cve/CVE-2010-3166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3166/">CVE-2010-3166</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3167" ref_url="https://www.suse.com/security/cve/CVE-2010-3167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a "dangling pointer vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3167/">CVE-2010-3167</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3168" ref_url="https://www.suse.com/security/cve/CVE-2010-3168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3168/">CVE-2010-3168</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3169" ref_url="https://www.suse.com/security/cve/CVE-2010-3169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:049" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3169/">CVE-2010-3169</cve>
	<bugzilla href="https://bugzilla.suse.com/637303">SUSE bug 637303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/638109">SUSE bug 638109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3170" ref_url="https://www.suse.com/security/cve/CVE-2010-3170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0904-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3170/">CVE-2010-3170</cve>
	<bugzilla href="https://bugzilla.suse.com/637290">SUSE bug 637290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3173" ref_url="https://www.suse.com/security/cve/CVE-2010-3173" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SSL implementation in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly set the minimum key length for Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3173/">CVE-2010-3173</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3174" ref_url="https://www.suse.com/security/cve/CVE-2010-3174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.14, Thunderbird before 3.0.9, and SeaMonkey before 2.0.9 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3174/">CVE-2010-3174</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3175" ref_url="https://www.suse.com/security/cve/CVE-2010-3175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3175/">CVE-2010-3175</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3176" ref_url="https://www.suse.com/security/cve/CVE-2010-3176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3176/">CVE-2010-3176</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3177" ref_url="https://www.suse.com/security/cve/CVE-2010-3177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Gopher parser in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, and SeaMonkey before 2.0.9, allow remote attackers to inject arbitrary web script or HTML via a crafted name of a (1) file or (2) directory on a Gopher server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3177/">CVE-2010-3177</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3178" ref_url="https://www.suse.com/security/cve/CVE-2010-3178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3178/">CVE-2010-3178</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3179" ref_url="https://www.suse.com/security/cve/CVE-2010-3179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3179/">CVE-2010-3179</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3180" ref_url="https://www.suse.com/security/cve/CVE-2010-3180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsBarProp function in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code by accessing the locationbar property of a closed window.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3180/">CVE-2010-3180</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3182" ref_url="https://www.suse.com/security/cve/CVE-2010-3182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3182/">CVE-2010-3182</cve>
	<bugzilla href="https://bugzilla.suse.com/642502">SUSE bug 642502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3183" ref_url="https://www.suse.com/security/cve/CVE-2010-3183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3183/">CVE-2010-3183</cve>
	<bugzilla href="https://bugzilla.suse.com/645315">SUSE bug 645315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296</cve>
	<bugzilla href="https://bugzilla.suse.com/639481">SUSE bug 639481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:044" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297</cve>
	<bugzilla href="https://bugzilla.suse.com/639482">SUSE bug 639482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
    <description>
    The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298</cve>
	<bugzilla href="https://bugzilla.suse.com/639483">SUSE bug 639483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:043" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:045" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" source="SUSE-SU"/>
    <description>
    The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301</cve>
	<bugzilla href="https://bugzilla.suse.com/639708">SUSE bug 639708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3310" ref_url="https://www.suse.com/security/cve/CVE-2010-3310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:051" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0720-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00023.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3310/">CVE-2010-3310</cve>
	<bugzilla href="https://bugzilla.suse.com/640721">SUSE bug 640721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3311" ref_url="https://www.suse.com/security/cve/CVE-2010-3311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00015.html" source="SUSE-SU"/>
    <description>
    Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3311/">CVE-2010-3311</cve>
	<bugzilla href="https://bugzilla.suse.com/635692">SUSE bug 635692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641580">SUSE bug 641580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/645982">SUSE bug 645982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3430" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3430" ref_url="https://www.suse.com/security/cve/CVE-2010-3430" source="SUSE CVE"/>
    <description>
    The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3430/">CVE-2010-3430</cve>
	<bugzilla href="https://bugzilla.suse.com/623457">SUSE bug 623457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/631802">SUSE bug 631802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3431" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3431" ref_url="https://www.suse.com/security/cve/CVE-2010-3431" source="SUSE CVE"/>
    <description>
    The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3431/">CVE-2010-3431</cve>
	<bugzilla href="https://bugzilla.suse.com/623457">SUSE bug 623457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3433" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3433" ref_url="https://www.suse.com/security/cve/CVE-2010-3433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0903-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-10/msg00034.html" source="SUSE-SU"/>
    <description>
    The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3433/">CVE-2010-3433</cve>
	<bugzilla href="https://bugzilla.suse.com/643771">SUSE bug 643771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/648140">SUSE bug 648140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3445" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3445" ref_url="https://www.suse.com/security/cve/CVE-2010-3445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3445/">CVE-2010-3445</cve>
	<bugzilla href="https://bugzilla.suse.com/643078">SUSE bug 643078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3609" ref_url="https://www.suse.com/security/cve/CVE-2010-3609" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2010:0992-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00039.html" source="SUSE-SU"/>
    <description>
    The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3609/">CVE-2010-3609</cve>
	<bugzilla href="https://bugzilla.suse.com/642571">SUSE bug 642571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131123" comment="openslp-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131124" comment="openslp-32bit-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131940" comment="openslp-server-2.0.0-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3611" ref_url="https://www.suse.com/security/cve/CVE-2010-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-test-2010:36899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00006.html" source="SUSE-SU"/>
    <description>
    ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3611/">CVE-2010-3611</cve>
	<bugzilla href="https://bugzilla.suse.com/650902">SUSE bug 650902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/667655">SUSE bug 667655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3613" ref_url="https://www.suse.com/security/cve/CVE-2010-3613" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2010:1031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00018.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3613/">CVE-2010-3613</cve>
	<bugzilla href="https://bugzilla.suse.com/657129">SUSE bug 657129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3614" ref_url="https://www.suse.com/security/cve/CVE-2010-3614" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2010:1031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00018.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote attackers to cause a denial of service (DNSSEC validation error) by triggering a rollover.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3614/">CVE-2010-3614</cve>
	<bugzilla href="https://bugzilla.suse.com/657102">SUSE bug 657102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3615" ref_url="https://www.suse.com/security/cve/CVE-2010-3615" source="SUSE CVE"/>
    <description>
    named in ISC BIND 9.7.2-P2 does not check all intended locations for allow-query ACLs, which might allow remote attackers to make successful requests for private DNS records via the standard DNS query mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3615/">CVE-2010-3615</cve>
	<bugzilla href="https://bugzilla.suse.com/657120">SUSE bug 657120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3616" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3616" ref_url="https://www.suse.com/security/cve/CVE-2010-3616" source="SUSE CVE"/>
    <description>
    ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3616/">CVE-2010-3616</cve>
	<bugzilla href="https://bugzilla.suse.com/659059">SUSE bug 659059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3765" ref_url="https://www.suse.com/security/cve/CVE-2010-3765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:056" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2010-3765/">CVE-2010-3765</cve>
	<bugzilla href="https://bugzilla.suse.com/649492">SUSE bug 649492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/652858">SUSE bug 652858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3814" ref_url="https://www.suse.com/security/cve/CVE-2010-3814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0361-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00057.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3814/">CVE-2010-3814</cve>
	<bugzilla href="https://bugzilla.suse.com/647375">SUSE bug 647375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689174">SUSE bug 689174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3853" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3853" ref_url="https://www.suse.com/security/cve/CVE-2010-3853" source="SUSE CVE"/>
    <description>
    pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3853/">CVE-2010-3853</cve>
	<bugzilla href="https://bugzilla.suse.com/647958">SUSE bug 647958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3855" ref_url="https://www.suse.com/security/cve/CVE-2010-3855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0361-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00057.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-3855/">CVE-2010-3855</cve>
	<bugzilla href="https://bugzilla.suse.com/647375">SUSE bug 647375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689174">SUSE bug 689174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3864" ref_url="https://www.suse.com/security/cve/CVE-2010-3864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:0965-2" ref_url="https://lists.opensuse.org/opensuse-updates/2010-11/msg00030.html" source="SUSE-SU"/>
    <description>
    Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-3864/">CVE-2010-3864</cve>
	<bugzilla href="https://bugzilla.suse.com/629905">SUSE bug 629905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651003">SUSE bug 651003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4000" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4000" ref_url="https://www.suse.com/security/cve/CVE-2010-4000" source="SUSE CVE"/>
    <description>
    gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4000/">CVE-2010-4000</cve>
	<bugzilla href="https://bugzilla.suse.com/642827">SUSE bug 642827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140640" comment="gnome-shell-3.20.4-70.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140641" comment="gnome-shell-browser-plugin-3.20.4-70.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140642" comment="gnome-shell-lang-3.20.4-70.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4020" ref_url="https://www.suse.com/security/cve/CVE-2010-4020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7008287" ref_url="https://www.suse.com/support/kb/doc/?id=7008287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1053-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00030.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4020/">CVE-2010-4020</cve>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4021" ref_url="https://www.suse.com/security/cve/CVE-2010-4021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:023" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:024" ref_url="https://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7008287" ref_url="https://www.suse.com/support/kb/doc/?id=7008287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2010:1053-1" ref_url="https://lists.opensuse.org/opensuse-updates/2010-12/msg00030.html" source="SUSE-SU"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4021/">CVE-2010-4021</cve>
	<bugzilla href="https://bugzilla.suse.com/650650">SUSE bug 650650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4022" ref_url="https://www.suse.com/security/cve/CVE-2010-4022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7008007" ref_url="https://www.suse.com/support/kb/doc/?id=7008007" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00009.html" source="SUSE-SU"/>
    <description>
    The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4022/">CVE-2010-4022</cve>
	<bugzilla href="https://bugzilla.suse.com/662665">SUSE bug 662665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4170" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4170" ref_url="https://www.suse.com/security/cve/CVE-2010-4170" source="SUSE CVE"/>
    <description>
    The staprun runtime tool in SystemTap 1.3 does not properly clear the environment before executing modprobe, which allows local users to gain privileges by setting the MODPROBE_OPTIONS environment variable to specify a malicious configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2010-4170/">CVE-2010-4170</cve>
	<bugzilla href="https://bugzilla.suse.com/1085465">SUSE bug 1085465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654201">SUSE bug 654201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338823" comment="systemtap is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4171" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4171" ref_url="https://www.suse.com/security/cve/CVE-2010-4171" source="SUSE CVE"/>
    <description>
    The staprun runtime tool in SystemTap 1.3 does not verify that a module to unload was previously loaded by SystemTap, which allows local users to cause a denial of service (unloading of arbitrary kernel modules).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2010-4171/">CVE-2010-4171</cve>
	<bugzilla href="https://bugzilla.suse.com/1085472">SUSE bug 1085472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/654201">SUSE bug 654201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338823" comment="systemtap is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4267" ref_url="https://www.suse.com/security/cve/CVE-2010-4267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0068-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the hpmud_get_pml function in io/hpmud/pml.c in Hewlett-Packard Linux Imaging and Printing (HPLIP) 1.6.7, 3.9.8, 3.10.9, and probably other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SNMP response with a large length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4267/">CVE-2010-4267</cve>
	<bugzilla href="https://bugzilla.suse.com/336658">SUSE bug 336658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140679" comment="hplip-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140680" comment="hplip-hpijs-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140681" comment="hplip-sane-3.14.6-3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4300" ref_url="https://www.suse.com/security/cve/CVE-2010-4300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4300/">CVE-2010-4300</cve>
	<bugzilla href="https://bugzilla.suse.com/655448">SUSE bug 655448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4301" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4301" ref_url="https://www.suse.com/security/cve/CVE-2010-4301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0010-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00012.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4301/">CVE-2010-4301</cve>
	<bugzilla href="https://bugzilla.suse.com/655448">SUSE bug 655448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4341" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4341" ref_url="https://www.suse.com/security/cve/CVE-2010-4341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0058-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00025.html" source="SUSE-SU"/>
    <description>
    The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4341/">CVE-2010-4341</cve>
	<bugzilla href="https://bugzilla.suse.com/660481">SUSE bug 660481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4352" ref_url="https://www.suse.com/security/cve/CVE-2010-4352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0401-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4352/">CVE-2010-4352</cve>
	<bugzilla href="https://bugzilla.suse.com/659934">SUSE bug 659934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4410" ref_url="https://www.suse.com/security/cve/CVE-2010-4410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0083-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00032.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4410/">CVE-2010-4410</cve>
	<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/660127">SUSE bug 660127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663396">SUSE bug 663396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670476">SUSE bug 670476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4411" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4411" ref_url="https://www.suse.com/security/cve/CVE-2010-4411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0083-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4411/">CVE-2010-4411</cve>
	<bugzilla href="https://bugzilla.suse.com/657343">SUSE bug 657343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/657731">SUSE bug 657731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/663396">SUSE bug 663396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/669245">SUSE bug 669245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/670476">SUSE bug 670476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4494" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4494" ref_url="https://www.suse.com/security/cve/CVE-2010-4494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00036.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4494/">CVE-2010-4494</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/661471">SUSE bug 661471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4523" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4523" ref_url="https://www.suse.com/security/cve/CVE-2010-4523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0049-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4523/">CVE-2010-4523</cve>
	<bugzilla href="https://bugzilla.suse.com/660109">SUSE bug 660109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141044" comment="opensc-0.13.0-1.122 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4530" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4530" ref_url="https://www.suse.com/security/cve/CVE-2010-4530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Signedness error in ccid_serial.c in libccid in the USB Chip/Smart Card Interface Devices (CCID) driver, as used in pcscd in PCSC-Lite 1.5.3 and possibly other products, allows physically proximate attackers to execute arbitrary code via a smart card with a crafted serial number that causes a negative value to be used in a memcpy operation, which triggers a buffer overflow.  NOTE: some sources refer to this issue as an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4530/">CVE-2010-4530</cve>
	<bugzilla href="https://bugzilla.suse.com/661000">SUSE bug 661000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141065" comment="pcsc-ccid-1.4.14-1.45 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4531" ref_url="https://www.suse.com/security/cve/CVE-2010-4531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4531/">CVE-2010-4531</cve>
	<bugzilla href="https://bugzilla.suse.com/661000">SUSE bug 661000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140900" comment="libpcsclite1-1.8.10-3.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140901" comment="pcsc-lite-1.8.10-3.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4538" ref_url="https://www.suse.com/security/cve/CVE-2010-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4538/">CVE-2010-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/662029">SUSE bug 662029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00005.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<bugzilla href="https://bugzilla.suse.com/1093615">SUSE bug 1093615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662957">SUSE bug 662957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4665" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0409-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00079.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<bugzilla href="https://bugzilla.suse.com/687442">SUSE bug 687442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4777" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4777" ref_url="https://www.suse.com/security/cve/CVE-2010-4777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0479-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00025.html" source="SUSE-SU"/>
    <description>
    The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4777/">CVE-2010-4777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5298" ref_url="https://www.suse.com/security/cve/CVE-2010-5298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0592-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5298/">CVE-2010-5298</cve>
	<bugzilla href="https://bugzilla.suse.com/873351">SUSE bug 873351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5328" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5328" ref_url="https://www.suse.com/security/cve/CVE-2010-5328" source="SUSE CVE"/>
    <description>
    include/linux/init_task.h in the Linux kernel before 2.6.35 does not prevent signals with a process group ID of zero from reaching the swapper process, which allows local users to cause a denial of service (system crash) by leveraging access to this process group.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-5328/">CVE-2010-5328</cve>
	<bugzilla href="https://bugzilla.suse.com/1021109">SUSE bug 1021109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5329" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5329" ref_url="https://www.suse.com/security/cve/CVE-2010-5329" source="SUSE CVE"/>
    <description>
    The video_usercopy function in drivers/media/video/v4l2-ioctl.c in the Linux kernel before 2.6.39 relies on the count value of a v4l2_ext_controls data structure to determine a kmalloc size, which might allow local users to cause a denial of service (memory consumption) via a large value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-5329/">CVE-2010-5329</cve>
	<bugzilla href="https://bugzilla.suse.com/1035719">SUSE bug 1035719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0050-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-01/msg00022.html" source="SUSE-SU"/>
    <description>
    check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010</cve>
	<bugzilla href="https://bugzilla.suse.com/663881">SUSE bug 663881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0014" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0014" ref_url="https://www.suse.com/security/cve/CVE-2011-0014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-403" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00022.html" source="SUSE-SU"/>
    <description>
    ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0014/">CVE-2011-0014</cve>
	<bugzilla href="https://bugzilla.suse.com/670526">SUSE bug 670526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0020" ref_url="https://www.suse.com/security/cve/CVE-2011-0020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0221-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00019.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0020/">CVE-2011-0020</cve>
	<bugzilla href="https://bugzilla.suse.com/666101">SUSE bug 666101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140897" comment="libpango-1_0-0-1.40.1-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140898" comment="libpango-1_0-0-32bit-1.40.1-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140899" comment="typelib-1_0-Pango-1_0-1.40.1-9.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0024" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0024" ref_url="https://www.suse.com/security/cve/CVE-2011-0024" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0024/">CVE-2011-0024</cve>
	<bugzilla href="https://bugzilla.suse.com/683335">SUSE bug 683335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0064" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0064" ref_url="https://www.suse.com/security/cve/CVE-2011-0064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0221-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00019.html" source="SUSE-SU"/>
    <description>
    The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted OpenType font data that triggers use of an incorrect index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0064/">CVE-2011-0064</cve>
	<bugzilla href="https://bugzilla.suse.com/666101">SUSE bug 666101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672502">SUSE bug 672502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140897" comment="libpango-1_0-0-1.40.1-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140898" comment="libpango-1_0-0-32bit-1.40.1-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140899" comment="typelib-1_0-Pango-1_0-1.40.1-9.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0068" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0068" ref_url="https://www.suse.com/security/cve/CVE-2011-0068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0068/">CVE-2011-0068</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0069" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0069" ref_url="https://www.suse.com/security/cve/CVE-2011-0069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0070.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0069/">CVE-2011-0069</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0070" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0070" ref_url="https://www.suse.com/security/cve/CVE-2011-0070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0069.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0070/">CVE-2011-0070</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0079" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0079" ref_url="https://www.suse.com/security/cve/CVE-2011-0079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x before 4.0.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to gfx/layers/d3d10/ReadbackManagerD3D10.cpp and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0079/">CVE-2011-0079</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0080" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0080" ref_url="https://www.suse.com/security/cve/CVE-2011-0080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0080/">CVE-2011-0080</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0081" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0081" ref_url="https://www.suse.com/security/cve/CVE-2011-0081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.17 and 4.x before 4.0.1, and Thunderbird 3.1.x before 3.1.10, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-0081/">CVE-2011-0081</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0084" ref_url="https://www.suse.com/security/cve/CVE-2011-0084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0084/">CVE-2011-0084</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<bugzilla href="https://bugzilla.suse.com/672510">SUSE bug 672510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682053">SUSE bug 682053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/682871">SUSE bug 682871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0226" ref_url="https://www.suse.com/security/cve/CVE-2011-0226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0852-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00015.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0226/">CVE-2011-0226</cve>
	<bugzilla href="https://bugzilla.suse.com/704612">SUSE bug 704612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728044">SUSE bug 728044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0281" ref_url="https://www.suse.com/security/cve/CVE-2011-0281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7008008" ref_url="https://www.suse.com/support/kb/doc/?id=7008008" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00009.html" source="SUSE-SU"/>
    <description>
    The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0281/">CVE-2011-0281</cve>
	<bugzilla href="https://bugzilla.suse.com/663619">SUSE bug 663619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0282" ref_url="https://www.suse.com/security/cve/CVE-2011-0282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:004" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7008008" ref_url="https://www.suse.com/support/kb/doc/?id=7008008" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00009.html" source="SUSE-SU"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0282/">CVE-2011-0282</cve>
	<bugzilla href="https://bugzilla.suse.com/663619">SUSE bug 663619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0284" ref_url="https://www.suse.com/security/cve/CVE-2011-0284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="TID7008166" ref_url="https://www.suse.com/support/kb/doc/?id=7008166" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0284/">CVE-2011-0284</cve>
	<bugzilla href="https://bugzilla.suse.com/671717">SUSE bug 671717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0285" ref_url="https://www.suse.com/security/cve/CVE-2011-0285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0348-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00047.html" source="SUSE-SU"/>
    <description>
    The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0285/">CVE-2011-0285</cve>
	<bugzilla href="https://bugzilla.suse.com/687469">SUSE bug 687469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0413" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0413" ref_url="https://www.suse.com/security/cve/CVE-2011-0413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:003" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0098-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0413/">CVE-2011-0413</cve>
	<bugzilla href="https://bugzilla.suse.com/667655">SUSE bug 667655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/680298">SUSE bug 680298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0414" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0414" ref_url="https://www.suse.com/security/cve/CVE-2011-0414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-02/msg00016.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.7.1 through 9.7.2-P3, when configured as an authoritative server, allows remote attackers to cause a denial of service (deadlock and daemon hang) by sending a query at the time of (1) an IXFR transfer or (2) a DDNS update.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0414/">CVE-2011-0414</cve>
	<bugzilla href="https://bugzilla.suse.com/674431">SUSE bug 674431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0419" ref_url="https://www.suse.com/security/cve/CVE-2011-0419" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0419/">CVE-2011-0419</cve>
	<bugzilla href="https://bugzilla.suse.com/693778">SUSE bug 693778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/700212">SUSE bug 700212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140778" comment="libapr1-1.5.1-2.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0449-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<bugzilla href="https://bugzilla.suse.com/681193">SUSE bug 681193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0460" ref_url="https://www.suse.com/security/cve/CVE-2011-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00053.html" source="SUSE-SU"/>
    <description>
    The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0460/">CVE-2011-0460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140693" comment="kbd-1.15.5-8.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0461" ref_url="https://www.suse.com/security/cve/CVE-2011-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0171-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00007.html" source="SUSE-SU"/>
    <description>
    /etc/init.d/boot.localfs in the aaa_base package before 11.2-43.48.1 in SUSE openSUSE 11.2, and before 11.3-8.7.1 in openSUSE 11.3, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/mtab.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0461/">CVE-2011-0461</cve>
	<bugzilla href="https://bugzilla.suse.com/665479">SUSE bug 665479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140437" comment="aaa_base-13.2+git20140911.61c1681-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140438" comment="aaa_base-extras-13.2+git20140911.61c1681-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:016" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0298-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00018.html" source="SUSE-SU"/>
    <description>
    xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<bugzilla href="https://bugzilla.suse.com/674733">SUSE bug 674733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688931">SUSE bug 688931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141169" comment="xorg-x11-7.6_1-14.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141170" comment="xorg-x11-essentials-7.6_1-14.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141171" comment="xrdb-1.1.0-3.58 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0523" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0523" ref_url="https://www.suse.com/security/cve/CVE-2011-0523" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0884-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00034.html" source="SUSE-SU"/>
    <description>
    gypsy 0.8 does not properly restrict the files that can be read while running with root privileges, which allows local users to read otherwise restricted files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0523/">CVE-2011-0523</cve>
	<bugzilla href="https://bugzilla.suse.com/666839">SUSE bug 666839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140676" comment="libgypsy0-0.9-6.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0524" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0524" ref_url="https://www.suse.com/security/cve/CVE-2011-0524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0884-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00034.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the NMEA parser (nmea-gen.c) in gypsy 0.8 allow local users to cause a denial of service (crash) via unspecified vectors related to the sprintf function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0524/">CVE-2011-0524</cve>
	<bugzilla href="https://bugzilla.suse.com/666839">SUSE bug 666839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140676" comment="libgypsy0-0.9-6.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0538" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0538" ref_url="https://www.suse.com/security/cve/CVE-2011-0538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0538/">CVE-2011-0538</cve>
	<bugzilla href="https://bugzilla.suse.com/669908">SUSE bug 669908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0264-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0265-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00039.html" source="SUSE-SU"/>
    <description>
    fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<bugzilla href="https://bugzilla.suse.com/668820">SUSE bug 668820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/685055">SUSE bug 685055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0707" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0707" ref_url="https://www.suse.com/security/cve/CVE-2011-0707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0424-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0707/">CVE-2011-0707</cve>
	<bugzilla href="https://bugzilla.suse.com/671745">SUSE bug 671745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141040" comment="mailman-2.1.17-1.18 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0712" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00083.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712</cve>
	<bugzilla href="https://bugzilla.suse.com/672499">SUSE bug 672499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0713" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0713" ref_url="https://www.suse.com/security/cve/CVE-2011-0713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0713/">CVE-2011-0713</cve>
	<bugzilla href="https://bugzilla.suse.com/672916">SUSE bug 672916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0719" ref_url="https://www.suse.com/security/cve/CVE-2011-0719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0403-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00076.html" source="SUSE-SU"/>
    <description>
    Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0719/">CVE-2011-0719</cve>
	<bugzilla href="https://bugzilla.suse.com/670431">SUSE bug 670431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0904" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0904" ref_url="https://www.suse.com/security/cve/CVE-2011-0904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00027.html" source="SUSE-SU"/>
    <description>
    The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0904/">CVE-2011-0904</cve>
	<bugzilla href="https://bugzilla.suse.com/690238">SUSE bug 690238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691207">SUSE bug 691207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691356">SUSE bug 691356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0905" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0905" ref_url="https://www.suse.com/security/cve/CVE-2011-0905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00027.html" source="SUSE-SU"/>
    <description>
    The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-0905/">CVE-2011-0905</cve>
	<bugzilla href="https://bugzilla.suse.com/690238">SUSE bug 690238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691207">SUSE bug 691207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/691356">SUSE bug 691356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0997" ref_url="https://www.suse.com/security/cve/CVE-2011-0997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0320-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00032.html" source="SUSE-SU"/>
    <description>
    dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0997/">CVE-2011-0997</cve>
	<bugzilla href="https://bugzilla.suse.com/675052">SUSE bug 675052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689182">SUSE bug 689182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/708527">SUSE bug 708527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/715172">SUSE bug 715172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1002" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1002" ref_url="https://www.suse.com/security/cve/CVE-2011-1002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
    <description>
    avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1002/">CVE-2011-1002</cve>
	<bugzilla href="https://bugzilla.suse.com/671797">SUSE bug 671797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140467" comment="avahi-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140468" comment="avahi-lang-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140469" comment="avahi-utils-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140470" comment="libavahi-client3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140471" comment="libavahi-client3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140472" comment="libavahi-common3-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140473" comment="libavahi-common3-32bit-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140474" comment="libavahi-core7-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140475" comment="libdns_sd-0.6.32-30.36 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140476" comment="libdns_sd-32bit-0.6.32-30.36 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1004" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1004" ref_url="https://www.suse.com/security/cve/CVE-2011-1004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00060.html" source="SUSE-SU"/>
    <description>
    The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1004/">CVE-2011-1004</cve>
	<bugzilla href="https://bugzilla.suse.com/673740">SUSE bug 673740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1005" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1005" ref_url="https://www.suse.com/security/cve/CVE-2011-1005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0561-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00060.html" source="SUSE-SU"/>
    <description>
    The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1005/">CVE-2011-1005</cve>
	<bugzilla href="https://bugzilla.suse.com/673750">SUSE bug 673750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783511">SUSE bug 783511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783525">SUSE bug 783525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880899">SUSE bug 880899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1006" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1006" ref_url="https://www.suse.com/security/cve/CVE-2011-1006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0316-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application.  NOTE: it is not clear whether this issue crosses privilege boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1006/">CVE-2011-1006</cve>
	<bugzilla href="https://bugzilla.suse.com/675506">SUSE bug 675506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140792" comment="libcgroup-tools-0.41.rc1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140793" comment="libcgroup1-0.41.rc1-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1018" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1018" ref_url="https://www.suse.com/security/cve/CVE-2011-1018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0242-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-03/msg00032.html" source="SUSE-SU"/>
    <description>
    logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1018/">CVE-2011-1018</cve>
	<bugzilla href="https://bugzilla.suse.com/674984">SUSE bug 674984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141039" comment="logwatch-7.4.3-15.65 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1020" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0860-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00003.html" source="SUSE-SU"/>
    <description>
    The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020</cve>
	<bugzilla href="https://bugzilla.suse.com/674982">SUSE bug 674982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1022" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1022" ref_url="https://www.suse.com/security/cve/CVE-2011-1022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0316-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html" source="SUSE-SU"/>
    <description>
    The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1022/">CVE-2011-1022</cve>
	<bugzilla href="https://bugzilla.suse.com/675048">SUSE bug 675048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140792" comment="libcgroup-tools-0.41.rc1-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140793" comment="libcgroup1-0.41.rc1-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1097" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1097" ref_url="https://www.suse.com/security/cve/CVE-2011-1097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0441-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00007.html" source="SUSE-SU"/>
    <description>
    rsync 3.x before 3.0.8, when certain recursion, deletion, and ownership options are used, allows remote rsync servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via malformed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1097/">CVE-2011-1097</cve>
	<bugzilla href="https://bugzilla.suse.com/684387">SUSE bug 684387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1098" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0536-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00055.html" source="SUSE-SU"/>
    <description>
    Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<bugzilla href="https://bugzilla.suse.com/1007000">SUSE bug 1007000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136195">SUSE bug 1136195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677336">SUSE bug 677336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1138" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1138" ref_url="https://www.suse.com/security/cve/CVE-2011-1138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the dissect_6lowpan_iphc function in packet-6lowpan.c in Wireshark 1.4.0 through 1.4.3 on 32-bit platforms allows remote attackers to cause a denial of service (application crash) via a malformed 6LoWPAN IPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1138/">CVE-2011-1138</cve>
	<bugzilla href="https://bugzilla.suse.com/678567">SUSE bug 678567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1139" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1139" ref_url="https://www.suse.com/security/cve/CVE-2011-1139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00046.html" source="SUSE-SU"/>
    <description>
    wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1139/">CVE-2011-1139</cve>
	<bugzilla href="https://bugzilla.suse.com/678568">SUSE bug 678568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1140" ref_url="https://www.suse.com/security/cve/CVE-2011-1140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1140/">CVE-2011-1140</cve>
	<bugzilla href="https://bugzilla.suse.com/678569">SUSE bug 678569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1143" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1143" ref_url="https://www.suse.com/security/cve/CVE-2011-1143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00046.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1143/">CVE-2011-1143</cve>
	<bugzilla href="https://bugzilla.suse.com/678571">SUSE bug 678571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1145" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00034.html" source="SUSE-SU"/>
    <description>
    The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<bugzilla href="https://bugzilla.suse.com/678796">SUSE bug 678796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764737">SUSE bug 764737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141151" comment="unixODBC-2.3.4-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141152" comment="unixODBC-32bit-2.3.4-6.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1146" ref_url="https://www.suse.com/security/cve/CVE-2011-1146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0311-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0578-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0580-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00066.html" source="SUSE-SU"/>
    <description>
    libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1146/">CVE-2011-1146</cve>
	<bugzilla href="https://bugzilla.suse.com/678406">SUSE bug 678406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1154" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0536-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00055.html" source="SUSE-SU"/>
    <description>
    The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679661">SUSE bug 679661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681984">SUSE bug 681984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1155" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0536-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00055.html" source="SUSE-SU"/>
    <description>
    The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679662">SUSE bug 679662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141038" comment="logrotate-3.8.7-3.21 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1164" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1164" ref_url="https://www.suse.com/security/cve/CVE-2011-1164" source="SUSE CVE"/>
    <description>
    Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1164/">CVE-2011-1164</cve>
	<bugzilla href="https://bugzilla.suse.com/680072">SUSE bug 680072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141154" comment="vino-3.20.2-5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141155" comment="vino-lang-3.20.2-5.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0409-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00079.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<bugzilla href="https://bugzilla.suse.com/683337">SUSE bug 683337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1176" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1176" ref_url="https://www.suse.com/security/cve/CVE-2011-1176" source="SUSE CVE"/>
    <description>
    The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1176/">CVE-2011-1176</cve>
	<bugzilla href="https://bugzilla.suse.com/681176">SUSE bug 681176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1187" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1187" ref_url="https://www.suse.com/security/cve/CVE-2011-1187" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1187/">CVE-2011-1187</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1202" ref_url="https://www.suse.com/security/cve/CVE-2011-1202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:022" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00001.html" source="SUSE-SU"/>
    <description>
    The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1202/">CVE-2011-1202</cve>
	<bugzilla href="https://bugzilla.suse.com/689281">SUSE bug 689281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692619">SUSE bug 692619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1485" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1485" ref_url="https://www.suse.com/security/cve/CVE-2011-1485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:008" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0412-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00081.html" source="SUSE-SU"/>
    <description>
    Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1485/">CVE-2011-1485</cve>
	<bugzilla href="https://bugzilla.suse.com/1032717">SUSE bug 1032717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/688788">SUSE bug 688788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1493" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1493" ref_url="https://www.suse.com/security/cve/CVE-2011-1493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00083.html" source="SUSE-SU"/>
    <description>
    Array index error in the rose_parse_national function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by composing FAC_NATIONAL_DIGIS data that specifies a large number of digipeaters, and then sending this data to a ROSE socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1493/">CVE-2011-1493</cve>
	<bugzilla href="https://bugzilla.suse.com/681175">SUSE bug 681175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1521" ref_url="https://www.suse.com/security/cve/CVE-2011-1521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:009" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00030.html" source="SUSE-SU"/>
    <description>
    The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1521/">CVE-2011-1521</cve>
	<bugzilla href="https://bugzilla.suse.com/682554">SUSE bug 682554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1526" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1526" ref_url="https://www.suse.com/security/cve/CVE-2011-1526" source="SUSE CVE"/>
		<reference ref_id="TID7008962" ref_url="https://www.suse.com/support/kb/doc/?id=7008962" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html" source="SUSE-SU"/>
    <description>
    ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1526/">CVE-2011-1526</cve>
	<bugzilla href="https://bugzilla.suse.com/698471">SUSE bug 698471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140712" comment="krb5-appl-servers-1.0.3-1.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1527" ref_url="https://www.suse.com/security/cve/CVE-2011-1527" source="SUSE CVE"/>
    <description>
    The kdb_ldap plugin in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a kinit operation with incorrect string case for the realm, related to the is_principal_in_realm, krb5_set_error_message, krb5_ldap_get_principal, and process_as_req functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1527/">CVE-2011-1527</cve>
	<bugzilla href="https://bugzilla.suse.com/719393">SUSE bug 719393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743742">SUSE bug 743742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1528" ref_url="https://www.suse.com/security/cve/CVE-2011-1528" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html" source="SUSE-SU"/>
    <description>
    The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function.  NOTE: the Berkeley DB vector is covered by CVE-2011-4151.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1528/">CVE-2011-1528</cve>
	<bugzilla href="https://bugzilla.suse.com/719393">SUSE bug 719393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743742">SUSE bug 743742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1529" ref_url="https://www.suse.com/security/cve/CVE-2011-1529" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00009.html" source="SUSE-SU"/>
    <description>
    The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1529/">CVE-2011-1529</cve>
	<bugzilla href="https://bugzilla.suse.com/719393">SUSE bug 719393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743742">SUSE bug 743742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1530" ref_url="https://www.suse.com/security/cve/CVE-2011-1530" source="SUSE CVE"/>
    <description>
    The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1530/">CVE-2011-1530</cve>
	<bugzilla href="https://bugzilla.suse.com/730393">SUSE bug 730393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:042" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-04/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00003.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/687113">SUSE bug 687113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692784">SUSE bug 692784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1585" ref_url="https://www.suse.com/security/cve/CVE-2011-1585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00003.html" source="SUSE-SU"/>
    <description>
    The cifs_find_smb_ses function in fs/cifs/connect.c in the Linux kernel before 2.6.36 does not properly determine the associations between users and sessions, which allows local users to bypass CIFS share authentication by leveraging a mount of a share by a different user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1585/">CVE-2011-1585</cve>
	<bugzilla href="https://bugzilla.suse.com/687812">SUSE bug 687812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1590" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1590" ref_url="https://www.suse.com/security/cve/CVE-2011-1590" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1590/">CVE-2011-1590</cve>
	<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1591" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1591" ref_url="https://www.suse.com/security/cve/CVE-2011-1591" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1591/">CVE-2011-1591</cve>
	<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1592" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1592" ref_url="https://www.suse.com/security/cve/CVE-2011-1592" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0602-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1592/">CVE-2011-1592</cve>
	<bugzilla href="https://bugzilla.suse.com/688109">SUSE bug 688109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1709" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1709" ref_url="https://www.suse.com/security/cve/CVE-2011-1709" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00000.html" source="SUSE-SU"/>
    <description>
    GNOME Display Manager (gdm) before 2.32.2, when glib 2.28 is used, enables execution of a web browser with the uid of the gdm account, which allows local users to gain privileges via vectors involving the x-scheme-handler/http MIME type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1709/">CVE-2011-1709</cve>
	<bugzilla href="https://bugzilla.suse.com/694858">SUSE bug 694858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140601" comment="gdm-3.10.0.1-52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140602" comment="gdm-lang-3.10.0.1-52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140603" comment="gdmflexiserver-3.10.0.1-52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140604" comment="libgdm1-3.10.0.1-52.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140605" comment="typelib-1_0-Gdm-1_0-3.10.0.1-52.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1758" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1758" ref_url="https://www.suse.com/security/cve/CVE-2011-1758" source="SUSE CVE"/>
    <description>
    The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1758/">CVE-2011-1758</cve>
	<bugzilla href="https://bugzilla.suse.com/691135">SUSE bug 691135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1761" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1761" ref_url="https://www.suse.com/security/cve/CVE-2011-1761" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0551-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0943-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00019.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1761/">CVE-2011-1761</cve>
	<bugzilla href="https://bugzilla.suse.com/691137">SUSE bug 691137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/710726">SUSE bug 710726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1831" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to effectively replace any directory with a new filesystem, and consequently gain privileges, via a mount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1832" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly check mountpoint permissions, which allows local users to remove directories via a umount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1221-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1222-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00007.html" source="SUSE-SU"/>
    <description>
    Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1834" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 does not properly maintain the mtab file during error conditions, which allows local users to cause a denial of service (table corruption) or bypass intended unmounting restrictions via a umount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1835" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The encrypted private-directory setup process in utils/ecryptfs-setup-private in ecryptfs-utils before 90 does not properly ensure that the passphrase file is created, which might allow local users to bypass intended access restrictions at a certain time in the new-user creation steps.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1836" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    utils/ecryptfs-recover-private in ecryptfs-utils before 90 does not establish a subdirectory with safe permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations during the recovery process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1837" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The lock-counter implementation in utils/mount.ecryptfs_private.c in ecryptfs-utils before 90 allows local users to overwrite arbitrary files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1898" ref_url="https://www.suse.com/security/cve/CVE-2011-1898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1898/">CVE-2011-1898</cve>
	<bugzilla href="https://bugzilla.suse.com/702025">SUSE bug 702025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/724906">SUSE bug 724906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1907" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1907" ref_url="https://www.suse.com/security/cve/CVE-2011-1907" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0666-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00077.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.8.x before 9.8.0-P1, when Response Policy Zones (RPZ) RRset replacement is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RRSIG query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1907/">CVE-2011-1907</cve>
	<bugzilla href="https://bugzilla.suse.com/692210">SUSE bug 692210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1910" ref_url="https://www.suse.com/security/cve/CVE-2011-1910" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0603-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00014.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1910/">CVE-2011-1910</cve>
	<bugzilla href="https://bugzilla.suse.com/696585">SUSE bug 696585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698286">SUSE bug 698286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1928" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1928" ref_url="https://www.suse.com/security/cve/CVE-2011-1928" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00001.html" source="SUSE-SU"/>
    <description>
    The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used.  NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-1928/">CVE-2011-1928</cve>
	<bugzilla href="https://bugzilla.suse.com/693778">SUSE bug 693778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140778" comment="libapr1-1.5.1-2.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1944" ref_url="https://www.suse.com/security/cve/CVE-2011-1944" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0839-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00035.html" source="SUSE-SU"/>
    <description>
    Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1944/">CVE-2011-1944</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/697372">SUSE bug 697372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1946" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1946" ref_url="https://www.suse.com/security/cve/CVE-2011-1946" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0694-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00041.html" source="SUSE-SU"/>
    <description>
    gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1946/">CVE-2011-1946</cve>
	<bugzilla href="https://bugzilla.suse.com/695627">SUSE bug 695627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140842" comment="libgnomesu-2.0.0-353.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140843" comment="libgnomesu-lang-2.0.0-353.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140844" comment="libgnomesu0-2.0.0-353.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1947" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947" source="SUSE CVE"/>
    <description>
    fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<bugzilla href="https://bugzilla.suse.com/697368">SUSE bug 697368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140570" comment="fetchmailconf-6.3.26-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1957" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1957" ref_url="https://www.suse.com/security/cve/CVE-2011-1957" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1957/">CVE-2011-1957</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1958" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1958" ref_url="https://www.suse.com/security/cve/CVE-2011-1958" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1958/">CVE-2011-1958</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1959" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1959" ref_url="https://www.suse.com/security/cve/CVE-2011-1959" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1959/">CVE-2011-1959</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2054" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2054" ref_url="https://www.suse.com/security/cve/CVE-2011-2054" source="SUSE CVE"/>
    <description>
    A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2054/">CVE-2011-2054</cve>
	<bugzilla href="https://bugzilla.suse.com/709167">SUSE bug 709167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140939" comment="libsoup-2_4-1-2.54.1-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140940" comment="libsoup-2_4-1-32bit-2.54.1-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140941" comment="libsoup-lang-2.54.1-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140942" comment="typelib-1_0-Soup-2_4-2.54.1-4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2174" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2174" ref_url="https://www.suse.com/security/cve/CVE-2011-2174" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2174/">CVE-2011-2174</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2175" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2175" ref_url="https://www.suse.com/security/cve/CVE-2011-2175" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2175/">CVE-2011-2175</cve>
	<bugzilla href="https://bugzilla.suse.com/697516">SUSE bug 697516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2186" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2186" ref_url="https://www.suse.com/security/cve/CVE-2011-2186" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0705-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-06/msg00043.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2186/">CVE-2011-2186</cve>
	<bugzilla href="https://bugzilla.suse.com/698456">SUSE bug 698456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124820" comment="git-core-1.8.5.6-18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2199" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2199" ref_url="https://www.suse.com/security/cve/CVE-2011-2199" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in tftp-hpa before 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the utimeout option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2199/">CVE-2011-2199</cve>
	<bugzilla href="https://bugzilla.suse.com/699714">SUSE bug 699714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141141" comment="tftp-5.2-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203</cve>
	<bugzilla href="https://bugzilla.suse.com/699709">SUSE bug 699709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2366" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2366" ref_url="https://www.suse.com/security/cve/CVE-2011-2366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Gecko before 5.0, as used in Firefox before 5.0 and Thunderbird before 5.0, does not block use of a cross-domain image as a WebGL texture, which allows remote attackers to obtain approximate copies of arbitrary images via a timing attack involving a crafted WebGL fragment shader.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2366/">CVE-2011-2366</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2367" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2367" ref_url="https://www.suse.com/security/cve/CVE-2011-2367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict read operations, which allows remote attackers to obtain sensitive information from GPU memory associated with an arbitrary process, or cause a denial of service (application crash), via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2367/">CVE-2011-2367</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2368" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2368" ref_url="https://www.suse.com/security/cve/CVE-2011-2368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict write operations, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2368/">CVE-2011-2368</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2369" ref_url="https://www.suse.com/security/cve/CVE-2011-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 4.0.1 allows remote attackers to inject arbitrary web script or HTML via an SVG element containing an HTML-encoded entity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2369/">CVE-2011-2369</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2370" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2370" ref_url="https://www.suse.com/security/cve/CVE-2011-2370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 5.0 does not properly enforce the whitelist for the xpinstall functionality, which allows remote attackers to trigger an installation dialog for a (1) add-on or (2) theme via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2370/">CVE-2011-2370</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2371" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2371" ref_url="https://www.suse.com/security/cve/CVE-2011-2371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2371/">CVE-2011-2371</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2372" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2372" ref_url="https://www.suse.com/security/cve/CVE-2011-2372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2372/">CVE-2011-2372</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2373" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2373" ref_url="https://www.suse.com/security/cve/CVE-2011-2373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2373/">CVE-2011-2373</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2374" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2374" ref_url="https://www.suse.com/security/cve/CVE-2011-2374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2374/">CVE-2011-2374</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2375" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2375" ref_url="https://www.suse.com/security/cve/CVE-2011-2375" source="SUSE CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2375/">CVE-2011-2375</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2377" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2377" ref_url="https://www.suse.com/security/cve/CVE-2011-2377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:028" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2377/">CVE-2011-2377</cve>
	<bugzilla href="https://bugzilla.suse.com/701296">SUSE bug 701296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2464" ref_url="https://www.suse.com/security/cve/CVE-2011-2464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:029" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-07/msg00006.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2464/">CVE-2011-2464</cve>
	<bugzilla href="https://bugzilla.suse.com/703907">SUSE bug 703907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:035" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0921-2" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0972-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1137-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1138-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1670-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1676-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00028.html" source="SUSE-SU"/>
    <description>
    crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<bugzilla href="https://bugzilla.suse.com/700876">SUSE bug 700876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/701491">SUSE bug 701491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713727">SUSE bug 713727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738221">SUSE bug 738221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141138" comment="sysvinit-tools-2.88+-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141139" comment="whois-5.1.1-1.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141176" comment="yast2-core-3.1.23-6.38 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2485" ref_url="https://www.suse.com/security/cve/CVE-2011-2485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000174.html" source="SUSE-SU"/>
    <description>
    The gdk_pixbuf__gif_image_load function in gdk-pixbuf/io-gif.c in gdk-pixbuf before 2.23.5 does not properly handle certain return values, which allows remote attackers to cause a denial of service (memory consumption) via a crafted GIF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2485/">CVE-2011-2485</cve>
	<bugzilla href="https://bugzilla.suse.com/702028">SUSE bug 702028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2489" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0848-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Multiple off-by-one errors in opiesu.c in opiesu in OPIE 2.4.1-test1 and earlier might allow local users to gain privileges via a crafted command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489</cve>
	<bugzilla href="https://bugzilla.suse.com/698772">SUSE bug 698772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141054" comment="opie-2.4-724.65 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141055" comment="opie-32bit-2.4-724.65 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2490" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0848-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00039.html" source="SUSE-SU"/>
    <description>
    opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490</cve>
	<bugzilla href="https://bugzilla.suse.com/698772">SUSE bug 698772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141054" comment="opie-2.4-724.65 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141055" comment="opie-32bit-2.4-724.65 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2501" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<bugzilla href="https://bugzilla.suse.com/702578">SUSE bug 702578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2511" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2511" ref_url="https://www.suse.com/security/cve/CVE-2011-2511" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00019.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2511/">CVE-2011-2511</cve>
	<bugzilla href="https://bugzilla.suse.com/703084">SUSE bug 703084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2522" ref_url="https://www.suse.com/security/cve/CVE-2011-2522" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0998-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2522/">CVE-2011-2522</cve>
	<bugzilla href="https://bugzilla.suse.com/705241">SUSE bug 705241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2597" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2597" ref_url="https://www.suse.com/security/cve/CVE-2011-2597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00022.html" source="SUSE-SU"/>
    <description>
    The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2597/">CVE-2011-2597</cve>
	<bugzilla href="https://bugzilla.suse.com/706728">SUSE bug 706728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2690" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2690" ref_url="https://www.suse.com/security/cve/CVE-2011-2690" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2690/">CVE-2011-2690</cve>
	<bugzilla href="https://bugzilla.suse.com/706387">SUSE bug 706387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706388">SUSE bug 706388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2691" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2691" ref_url="https://www.suse.com/security/cve/CVE-2011-2691" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2691/">CVE-2011-2691</cve>
	<bugzilla href="https://bugzilla.suse.com/706388">SUSE bug 706388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2692" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2692" ref_url="https://www.suse.com/security/cve/CVE-2011-2692" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2692/">CVE-2011-2692</cve>
	<bugzilla href="https://bugzilla.suse.com/706389">SUSE bug 706389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2694" ref_url="https://www.suse.com/security/cve/CVE-2011-2694" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0998-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2694/">CVE-2011-2694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0854-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libsndfile before 1.0.25 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PARIS Audio Format (PAF) file that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<bugzilla href="https://bugzilla.suse.com/705681">SUSE bug 705681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2697" ref_url="https://www.suse.com/security/cve/CVE-2011-2697" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0892-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00017.html" source="SUSE-SU"/>
    <description>
    foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2697/">CVE-2011-2697</cve>
	<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140679" comment="hplip-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140680" comment="hplip-hpijs-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140681" comment="hplip-sane-3.14.6-3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2698" ref_url="https://www.suse.com/security/cve/CVE-2011-2698" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2698/">CVE-2011-2698</cve>
	<bugzilla href="https://bugzilla.suse.com/706728">SUSE bug 706728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2707</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2707" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2707" ref_url="https://www.suse.com/security/cve/CVE-2011-2707" source="SUSE CVE"/>
    <description>
    The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2707/">CVE-2011-2707</cve>
	<bugzilla href="https://bugzilla.suse.com/707337">SUSE bug 707337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2709" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2709" ref_url="https://www.suse.com/security/cve/CVE-2011-2709" source="SUSE CVE"/>
    <description>
    libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2709/">CVE-2011-2709</cve>
	<bugzilla href="https://bugzilla.suse.com/694598">SUSE bug 694598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140845" comment="libgssglue1-0.4-3.83 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140846" comment="libgssglue1-32bit-0.4-3.83 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2721" ref_url="https://www.suse.com/security/cve/CVE-2011-2721" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:0940-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-08/msg00033.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2721/">CVE-2011-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/708263">SUSE bug 708263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2722" ref_url="https://www.suse.com/security/cve/CVE-2011-2722" source="SUSE CVE"/>
    <description>
    The send_data_to_stdout function in prnt/hpijs/hpcupsfax.cpp in HP Linux Imaging and Printing (HPLIP) 3.x before 3.11.10 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hpcupsfax.out temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-2722/">CVE-2011-2722</cve>
	<bugzilla href="https://bugzilla.suse.com/59233">SUSE bug 59233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698451">SUSE bug 698451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/704608">SUSE bug 704608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713717">SUSE bug 713717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140679" comment="hplip-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140680" comment="hplip-hpijs-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140681" comment="hplip-sane-3.14.6-3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2729" ref_url="https://www.suse.com/security/cve/CVE-2011-2729" source="SUSE CVE"/>
		<reference ref_id="TID7009193" ref_url="https://www.suse.com/support/kb/doc/?id=7009193" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00024.html" source="SUSE-SU"/>
    <description>
    native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2729/">CVE-2011-2729</cve>
	<bugzilla href="https://bugzilla.suse.com/715656">SUSE bug 715656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140450" comment="apache-commons-daemon-1.0.15-4.221 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140451" comment="apache-commons-daemon-javadoc-1.0.15-4.221 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2748" ref_url="https://www.suse.com/security/cve/CVE-2011-2748" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html" source="SUSE-SU"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2748/">CVE-2011-2748</cve>
	<bugzilla href="https://bugzilla.suse.com/712653">SUSE bug 712653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2749" ref_url="https://www.suse.com/security/cve/CVE-2011-2749" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00014.html" source="SUSE-SU"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2749/">CVE-2011-2749</cve>
	<bugzilla href="https://bugzilla.suse.com/712653">SUSE bug 712653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1035-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00004.html" source="SUSE-SU"/>
    <description>
    The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<bugzilla href="https://bugzilla.suse.com/709851">SUSE bug 709851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711487">SUSE bug 711487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141172" comment="xorg-x11-libs-7.6-45.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2985" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2985" ref_url="https://www.suse.com/security/cve/CVE-2011-2985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2985/">CVE-2011-2985</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2986" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2986" ref_url="https://www.suse.com/security/cve/CVE-2011-2986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products, when the Direct2D (aka D2D) API is used on Windows, allows remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2986/">CVE-2011-2986</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2988" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2988" ref_url="https://www.suse.com/security/cve/CVE-2011-2988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2988/">CVE-2011-2988</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2989" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2989" ref_url="https://www.suse.com/security/cve/CVE-2011-2989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement WebGL, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2989/">CVE-2011-2989</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2990" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2990" ref_url="https://www.suse.com/security/cve/CVE-2011-2990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The implementation of Content Security Policy (CSP) violation reports in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not remove proxy-authorization credentials from the listed request headers, which allows attackers to obtain sensitive information by reading a report, related to incorrect host resolution that occurs with certain redirects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2990/">CVE-2011-2990</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2991" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2991" ref_url="https://www.suse.com/security/cve/CVE-2011-2991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement JavaScript, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2991/">CVE-2011-2991</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2992" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2992" ref_url="https://www.suse.com/security/cve/CVE-2011-2992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Ogg reader in the browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2992/">CVE-2011-2992</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2993" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2993" ref_url="https://www.suse.com/security/cve/CVE-2011-2993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:037" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0957-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-08/msg00026.html" source="SUSE-SU"/>
    <description>
    The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2993/">CVE-2011-2993</cve>
	<bugzilla href="https://bugzilla.suse.com/712224">SUSE bug 712224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2995" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2995" ref_url="https://www.suse.com/security/cve/CVE-2011-2995" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00030.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2995/">CVE-2011-2995</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2996" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2996" ref_url="https://www.suse.com/security/cve/CVE-2011-2996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2996/">CVE-2011-2996</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2997" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2997" ref_url="https://www.suse.com/security/cve/CVE-2011-2997" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-2997/">CVE-2011-2997</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3000" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3000" ref_url="https://www.suse.com/security/cve/CVE-2011-3000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3000/">CVE-2011-3000</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3001" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3001" ref_url="https://www.suse.com/security/cve/CVE-2011-3001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3001/">CVE-2011-3001</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3002" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3002" ref_url="https://www.suse.com/security/cve/CVE-2011-3002" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
    <description>
    Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a memory-allocation error and a resulting buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3002/">CVE-2011-3002</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3003" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3003" ref_url="https://www.suse.com/security/cve/CVE-2011-3003" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3003/">CVE-2011-3003</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3004" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3004" ref_url="https://www.suse.com/security/cve/CVE-2011-3004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
    <description>
    The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3004/">CVE-2011-3004</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3005" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3005" ref_url="https://www.suse.com/security/cve/CVE-2011-3005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3005/">CVE-2011-3005</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<bugzilla href="https://bugzilla.suse.com/747311">SUSE bug 747311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747327">SUSE bug 747327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747328">SUSE bug 747328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773612">SUSE bug 773612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3045" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0432-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0466-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045</cve>
	<bugzilla href="https://bugzilla.suse.com/752008">SUSE bug 752008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754456">SUSE bug 754456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00031.html" source="SUSE-SU"/>
    <description>
    The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<bugzilla href="https://bugzilla.suse.com/754745">SUSE bug 754745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854395">SUSE bug 854395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3062" ref_url="https://www.suse.com/security/cve/CVE-2011-3062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the OpenType Sanitizer in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted OpenType file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3062/">CVE-2011-3062</cve>
	<bugzilla href="https://bugzilla.suse.com/754458">SUSE bug 754458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3101" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3101" ref_url="https://www.suse.com/security/cve/CVE-2011-3101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0656-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors.  NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3101/">CVE-2011-3101</cve>
	<bugzilla href="https://bugzilla.suse.com/762481">SUSE bug 762481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3146" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3146" ref_url="https://www.suse.com/security/cve/CVE-2011-3146" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00003.html" source="SUSE-SU"/>
    <description>
    librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3146/">CVE-2011-3146</cve>
	<bugzilla href="https://bugzilla.suse.com/714980">SUSE bug 714980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140597" comment="gdk-pixbuf-loader-rsvg-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140598" comment="librsvg-2-2-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140599" comment="librsvg-2-2-32bit-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140600" comment="rsvg-view-2.40.15-4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3148" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3148" ref_url="https://www.suse.com/security/cve/CVE-2011-3148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1218-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3148/">CVE-2011-3148</cve>
	<bugzilla href="https://bugzilla.suse.com/724480">SUSE bug 724480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3149" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3149" ref_url="https://www.suse.com/security/cve/CVE-2011-3149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1218-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00005.html" source="SUSE-SU"/>
    <description>
    The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3149/">CVE-2011-3149</cve>
	<bugzilla href="https://bugzilla.suse.com/724480">SUSE bug 724480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3172" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004204.html" source="SUSE-SU"/>
    <description>
    A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<bugzilla href="https://bugzilla.suse.com/1149683">SUSE bug 1149683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/707645">SUSE bug 707645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141059" comment="pam-modules-12.1-23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141060" comment="pam-modules-32bit-12.1-23.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3177" ref_url="https://www.suse.com/security/cve/CVE-2011-3177" source="SUSE CVE"/>
    <description>
    The YaST2 network created files with world readable permissions which could have allowed local users to read sensitive material out of network configuration files, like passwords for wireless networks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3177/">CVE-2011-3177</cve>
	<bugzilla href="https://bugzilla.suse.com/713661">SUSE bug 713661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141175" comment="yast2-3.1.206-37.1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141176" comment="yast2-core-3.1.23-6.38 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3192" ref_url="https://www.suse.com/security/cve/CVE-2011-3192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7009308" ref_url="https://www.suse.com/support/kb/doc/?id=7009308" source="SUSE-SU"/>
		<reference ref_id="TID7009621" ref_url="https://www.suse.com/support/kb/doc/?id=7009621" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00009.html" source="SUSE-SU"/>
    <description>
    The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3192/">CVE-2011-3192</cve>
	<bugzilla href="https://bugzilla.suse.com/713966">SUSE bug 713966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/714306">SUSE bug 714306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/716634">SUSE bug 716634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/718106">SUSE bug 718106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726139">SUSE bug 726139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732051">SUSE bug 732051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983778">SUSE bug 983778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3193" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3193" ref_url="https://www.suse.com/security/cve/CVE-2011-3193" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3193/">CVE-2011-3193</cve>
	<bugzilla href="https://bugzilla.suse.com/714984">SUSE bug 714984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3200" ref_url="https://www.suse.com/security/cve/CVE-2011-3200" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00013.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3200/">CVE-2011-3200</cve>
	<bugzilla href="https://bugzilla.suse.com/714658">SUSE bug 714658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141113" comment="rsyslog-diag-tools-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141114" comment="rsyslog-doc-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141115" comment="rsyslog-module-gssapi-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141116" comment="rsyslog-module-gtls-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141117" comment="rsyslog-module-mysql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141118" comment="rsyslog-module-pgsql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141119" comment="rsyslog-module-relp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141120" comment="rsyslog-module-snmp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141121" comment="rsyslog-module-udpspoof-8.4.0-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3207" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3207" ref_url="https://www.suse.com/security/cve/CVE-2011-3207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1144-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00018.html" source="SUSE-SU"/>
    <description>
    crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3207/">CVE-2011-3207</cve>
	<bugzilla href="https://bugzilla.suse.com/716143">SUSE bug 716143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3210" ref_url="https://www.suse.com/security/cve/CVE-2011-3210" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1144-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00018.html" source="SUSE-SU"/>
    <description>
    The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3210/">CVE-2011-3210</cve>
	<bugzilla href="https://bugzilla.suse.com/716144">SUSE bug 716144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3232" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3232" ref_url="https://www.suse.com/security/cve/CVE-2011-3232" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3232/">CVE-2011-3232</cve>
	<bugzilla href="https://bugzilla.suse.com/720264">SUSE bug 720264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3256" ref_url="https://www.suse.com/security/cve/CVE-2011-3256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3256/">CVE-2011-3256</cve>
	<bugzilla href="https://bugzilla.suse.com/728044">SUSE bug 728044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/730124">SUSE bug 730124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748083">SUSE bug 748083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3266" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3266" ref_url="https://www.suse.com/security/cve/CVE-2011-3266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00022.html" source="SUSE-SU"/>
    <description>
    The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3266/">CVE-2011-3266</cve>
	<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3328" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3328" ref_url="https://www.suse.com/security/cve/CVE-2011-3328" source="SUSE CVE"/>
    <description>
    The png_handle_cHRM function in pngrutil.c in libpng 1.5.4, when color-correction support is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a malformed PNG image containing a cHRM chunk associated with a certain zero value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3328/">CVE-2011-3328</cve>
	<bugzilla href="https://bugzilla.suse.com/720017">SUSE bug 720017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3360" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3360" ref_url="https://www.suse.com/security/cve/CVE-2011-3360" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3360/">CVE-2011-3360</cve>
	<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3368" ref_url="https://www.suse.com/security/cve/CVE-2011-3368" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0243-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00065.html" source="SUSE-SU"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3368/">CVE-2011-3368</cve>
	<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/723308">SUSE bug 723308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754831">SUSE bug 754831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0114-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0122-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7001524" ref_url="https://www.suse.com/support/kb/doc/?id=7001524" source="SUSE-SU"/>
		<reference ref_id="TID7009901" ref_url="https://www.suse.com/support/kb/doc/?id=7009901" source="SUSE-SU"/>
		<reference ref_id="TID7015841" ref_url="https://www.suse.com/support/kb/doc/?id=7015841" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7022397" ref_url="https://www.suse.com/support/kb/doc/?id=7022397" source="SUSE-SU"/>
		<reference ref_id="TID7022454" ref_url="https://www.suse.com/support/kb/doc/?id=7022454" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0063-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<bugzilla href="https://bugzilla.suse.com/716002">SUSE bug 716002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/719047">SUSE bug 719047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/725167">SUSE bug 725167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/726096">SUSE bug 726096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739248">SUSE bug 739248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/739256">SUSE bug 739256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742306">SUSE bug 742306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/759666">SUSE bug 759666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763598">SUSE bug 763598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140570" comment="fetchmailconf-6.3.26-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3439" ref_url="https://www.suse.com/security/cve/CVE-2011-3439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00012.html" source="SUSE-SU"/>
    <description>
    FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3439/">CVE-2011-3439</cve>
	<bugzilla href="https://bugzilla.suse.com/730124">SUSE bug 730124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/748083">SUSE bug 748083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3464" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3464" ref_url="https://www.suse.com/security/cve/CVE-2011-3464" source="SUSE CVE"/>
    <description>
    Off-by-one error in the png_formatted_warning function in pngerror.c in libpng 1.5.4 through 1.5.7 might allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unspecified vectors, which trigger a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3464/">CVE-2011-3464</cve>
	<bugzilla href="https://bugzilla.suse.com/745029">SUSE bug 745029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3483" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3483" ref_url="https://www.suse.com/security/cve/CVE-2011-3483" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1142-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3483/">CVE-2011-3483</cve>
	<bugzilla href="https://bugzilla.suse.com/718032">SUSE bug 718032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3563" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3563" ref_url="https://www.suse.com/security/cve/CVE-2011-3563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3563/">CVE-2011-3563</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3571" ref_url="https://www.suse.com/security/cve/CVE-2011-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1323-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00041.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Virtual Desktop Infrastructure (VDI) component in Oracle Virtualization 3.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Session.  NOTE: this CVE identifier was accidentally used for a Concurrency issue in Java Runtime Environment, but that issue has been reassigned to CVE-2012-0507.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3571/">CVE-2011-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/742115">SUSE bug 742115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3602" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name.  NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<bugzilla href="https://bugzilla.suse.com/721968">SUSE bug 721968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141103" comment="radvd-1.9.7-2.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3607" ref_url="https://www.suse.com/security/cve/CVE-2011-3607" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00044.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3607/">CVE-2011-3607</cve>
	<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729183">SUSE bug 729183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806721">SUSE bug 806721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3627" ref_url="https://www.suse.com/security/cve/CVE-2011-3627" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-10/msg00030.html" source="SUSE-SU"/>
    <description>
    The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3627/">CVE-2011-3627</cve>
	<bugzilla href="https://bugzilla.suse.com/724856">SUSE bug 724856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809945">SUSE bug 809945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3630" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630" source="SUSE CVE"/>
    <description>
    Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3631" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631" source="SUSE CVE"/>
    <description>
    Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3632" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632" source="SUSE CVE"/>
    <description>
    Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140678" comment="hardlink-1.0-6.45 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3640" ref_url="https://www.suse.com/security/cve/CVE-2011-3640" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1241-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0063-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00021.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used in Google Chrome before 17 on Windows and Mac OS X, might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory.  NOTE: the vendor's response was "Strange behavior, but we're not treating this as a security bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3640/">CVE-2011-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/726096">SUSE bug 726096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3648" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3648" ref_url="https://www.suse.com/security/cve/CVE-2011-3648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3648/">CVE-2011-3648</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3650" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3650" ref_url="https://www.suse.com/security/cve/CVE-2011-3650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3650/">CVE-2011-3650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3651" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3651" ref_url="https://www.suse.com/security/cve/CVE-2011-3651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3651/">CVE-2011-3651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3652" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3652" ref_url="https://www.suse.com/security/cve/CVE-2011-3652" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3652/">CVE-2011-3652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3654" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3654" ref_url="https://www.suse.com/security/cve/CVE-2011-3654" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly handle links from SVG mpath elements to non-SVG elements, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3654/">CVE-2011-3654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3655" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3655" ref_url="https://www.suse.com/security/cve/CVE-2011-3655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1256-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform access control without checking for use of the NoWaiverWrapper wrapper, which allows remote attackers to gain privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3655/">CVE-2011-3655</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3658" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3658" ref_url="https://www.suse.com/security/cve/CVE-2011-3658" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3658/">CVE-2011-3658</cve>
	<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3659" ref_url="https://www.suse.com/security/cve/CVE-2011-3659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3659/">CVE-2011-3659</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3660" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3660" ref_url="https://www.suse.com/security/cve/CVE-2011-3660" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3660/">CVE-2011-3660</cve>
	<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3661" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3661" ref_url="https://www.suse.com/security/cve/CVE-2011-3661" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3661/">CVE-2011-3661</cve>
	<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3663" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3663" ref_url="https://www.suse.com/security/cve/CVE-2011-3663" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0039-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page, even when JavaScript is disabled, by using SVG animation accessKey events within that web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3663/">CVE-2011-3663</cve>
	<bugzilla href="https://bugzilla.suse.com/737533">SUSE bug 737533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3922" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3922" ref_url="https://www.suse.com/security/cve/CVE-2011-3922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00021.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3922/">CVE-2011-3922</cve>
	<bugzilla href="https://bugzilla.suse.com/739904">SUSE bug 739904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740493">SUSE bug 740493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4108" ref_url="https://www.suse.com/security/cve/CVE-2011-4108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4108/">CVE-2011-4108</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742821">SUSE bug 742821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4128" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4128" ref_url="https://www.suse.com/security/cve/CVE-2011-4128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0215-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00018.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4128/">CVE-2011-4128</cve>
	<bugzilla href="https://bugzilla.suse.com/729486">SUSE bug 729486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4182" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4182" ref_url="https://www.suse.com/security/cve/CVE-2011-4182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0242-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00035.html" source="SUSE-SU"/>
    <description>
    Missing escaping of ESSID values in sysconfig of SUSE Linux Enterprise allows attackers controlling an access point to cause execute arbitrary code. Affected releases are sysconfig prior to 0.83.7-2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4182/">CVE-2011-4182</cve>
	<bugzilla href="https://bugzilla.suse.com/735394">SUSE bug 735394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141132" comment="sysconfig-0.84.0-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141133" comment="sysconfig-netconfig-0.84.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4313" ref_url="https://www.suse.com/security/cve/CVE-2011-4313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2011:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1270-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1270-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2011-11/msg00029.html" source="SUSE-SU"/>
    <description>
    query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4313/">CVE-2011-4313</cve>
	<bugzilla href="https://bugzilla.suse.com/730995">SUSE bug 730995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/738156">SUSE bug 738156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4317" ref_url="https://www.suse.com/security/cve/CVE-2011-4317" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0243-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html" source="SUSE-SU"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4317/">CVE-2011-4317</cve>
	<bugzilla href="https://bugzilla.suse.com/722545">SUSE bug 722545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/728876">SUSE bug 728876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/729181">SUSE bug 729181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791794">SUSE bug 791794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4349" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349" source="SUSE CVE"/>
    <description>
    Multiple SQL injection vulnerabilities in (1) cd-mapping-db.c and (2) cd-device-db.c in colord before 0.1.15 allow local users to execute arbitrary SQL commands via vectors related to color devices and (a) device id, (b) property, or (c) profile id.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<bugzilla href="https://bugzilla.suse.com/698250">SUSE bug 698250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/732996">SUSE bug 732996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140490" comment="colord-gtk-lang-0.1.26-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140491" comment="libcolord-gtk1-0.1.26-6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140492" comment="libcolord2-1.3.3-10.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140493" comment="libcolord2-32bit-1.3.3-10.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140494" comment="libcolorhug2-1.3.3-10.14 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4405" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1331-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1331-2" ref_url="https://lists.opensuse.org/opensuse-updates/2012-01/msg00028.html" source="SUSE-SU"/>
    <description>
    The cupshelpers scripts in system-config-printer in Ubuntu 11.04 and 11.10, as used by the automatic printer driver download service, uses an "insecure connection" for queries to the OpenPrinting database, which allows remote attackers to execute arbitrary code via a man-in-the-middle (MITM) attack that modifies packages or repositories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<bugzilla href="https://bugzilla.suse.com/733542">SUSE bug 733542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/735322">SUSE bug 735322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141076" comment="python-cupshelpers-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141077" comment="system-config-printer-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141078" comment="system-config-printer-common-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141079" comment="system-config-printer-common-lang-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141080" comment="system-config-printer-dbus-service-1.5.7-7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141081" comment="udev-configure-printer-1.5.7-7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4539" ref_url="https://www.suse.com/security/cve/CVE-2011-4539" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2011:1318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2011-12/msg00006.html" source="SUSE-SU"/>
    <description>
    dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4539/">CVE-2011-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/735610">SUSE bug 735610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/741239">SUSE bug 741239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4576" ref_url="https://www.suse.com/security/cve/CVE-2011-4576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021400" ref_url="https://www.suse.com/support/kb/doc/?id=7021400" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021736" ref_url="https://www.suse.com/support/kb/doc/?id=7021736" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021991" ref_url="https://www.suse.com/support/kb/doc/?id=7021991" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4576/">CVE-2011-4576</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4577" ref_url="https://www.suse.com/security/cve/CVE-2011-4577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4577/">CVE-2011-4577</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4600" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4600" ref_url="https://www.suse.com/security/cve/CVE-2011-4600" source="SUSE CVE"/>
    <description>
    The networkReloadIptablesRules function in network/bridge_driver.c in libvirt before 0.9.9 does not properly handle firewall rules on bridge networks when libvirtd is restarted, which might allow remote attackers to bypass intended access restrictions via a (1) DNS or (2) DHCP query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-4600/">CVE-2011-4600</cve>
	<bugzilla href="https://bugzilla.suse.com/736082">SUSE bug 736082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4619" ref_url="https://www.suse.com/security/cve/CVE-2011-4619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4619/">CVE-2011-4619</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/799454">SUSE bug 799454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4815" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4815" ref_url="https://www.suse.com/security/cve/CVE-2011-4815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4815/">CVE-2011-4815</cve>
	<bugzilla href="https://bugzilla.suse.com/739122">SUSE bug 739122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141123" comment="ruby-2.1-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4862" ref_url="https://www.suse.com/security/cve/CVE-2011-4862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00014.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4862/">CVE-2011-4862</cve>
	<bugzilla href="https://bugzilla.suse.com/738632">SUSE bug 738632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140711" comment="krb5-appl-clients-1.0.3-1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140712" comment="krb5-appl-servers-1.0.3-1.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4868" ref_url="https://www.suse.com/security/cve/CVE-2011-4868" source="SUSE CVE"/>
    <description>
    The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4868/">CVE-2011-4868</cve>
	<bugzilla href="https://bugzilla.suse.com/741239">SUSE bug 741239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4944" ref_url="https://www.suse.com/security/cve/CVE-2011-4944" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-4944/">CVE-2011-4944</cve>
	<bugzilla href="https://bugzilla.suse.com/754447">SUSE bug 754447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4971</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4971" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4971" ref_url="https://www.suse.com/security/cve/CVE-2011-4971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0867-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0951-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4971/">CVE-2011-4971</cve>
	<bugzilla href="https://bugzilla.suse.com/817781">SUSE bug 817781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-5035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-5035" ref_url="https://www.suse.com/security/cve/CVE-2011-5035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5035/">CVE-2011-5035</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757762">SUSE bug 757762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0021" ref_url="https://www.suse.com/security/cve/CVE-2012-0021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0021/">CVE-2012-0021</cve>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/743744">SUSE bug 743744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0027" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0027" ref_url="https://www.suse.com/security/cve/CVE-2012-0027" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0027/">CVE-2012-0027</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0029" ref_url="https://www.suse.com/security/cve/CVE-2012-0029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0267-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0347-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00055.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0029/">CVE-2012-0029</cve>
	<bugzilla href="https://bugzilla.suse.com/740165">SUSE bug 740165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747331">SUSE bug 747331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0031" ref_url="https://www.suse.com/security/cve/CVE-2012-0031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html" source="SUSE-SU"/>
    <description>
    scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0031/">CVE-2012-0031</cve>
	<bugzilla href="https://bugzilla.suse.com/741243">SUSE bug 741243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806721">SUSE bug 806721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0035" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035" source="SUSE CVE"/>
    <description>
    Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<bugzilla href="https://bugzilla.suse.com/740447">SUSE bug 740447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140550" comment="emacs-el-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140552" comment="emacs-nox-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0037" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0428-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0433-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00052.html" source="SUSE-SU"/>
    <description>
    Redland Raptor (aka libraptor) before 2.0.7, as used by OpenOffice 3.3 and 3.4 Beta, LibreOffice before 3.4.6 and 3.5.x before 3.5.1, and other products, allows user-assisted remote attackers to read arbitrary files via a crafted XML external entity (XXE) declaration and reference in an RDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<bugzilla href="https://bugzilla.suse.com/37195">SUSE bug 37195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/734781">SUSE bug 734781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/740453">SUSE bug 740453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/745298">SUSE bug 745298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140928" comment="libraptor2-0-2.0.10-3.67 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0050" ref_url="https://www.suse.com/security/cve/CVE-2012-0050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0266-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0050/">CVE-2012-0050</cve>
	<bugzilla href="https://bugzilla.suse.com/739719">SUSE bug 739719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742821">SUSE bug 742821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0053" ref_url="https://www.suse.com/security/cve/CVE-2012-0053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html" source="SUSE-SU"/>
    <description>
    protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0053/">CVE-2012-0053</cve>
	<bugzilla href="https://bugzilla.suse.com/743743">SUSE bug 743743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0056" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00064.html" source="SUSE-SU"/>
    <description>
    The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/&lt;pid&gt;/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056</cve>
	<bugzilla href="https://bugzilla.suse.com/1171985">SUSE bug 1171985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742028">SUSE bug 742028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742279">SUSE bug 742279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0217" ref_url="https://www.suse.com/security/cve/CVE-2012-0217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0886-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application.  NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0217/">CVE-2012-0217</cve>
	<bugzilla href="https://bugzilla.suse.com/757537">SUSE bug 757537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/764077">SUSE bug 764077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0247" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0247" ref_url="https://www.suse.com/security/cve/CVE-2012-0247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0692-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0247/">CVE-2012-0247</cve>
	<bugzilla href="https://bugzilla.suse.com/746880">SUSE bug 746880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0248" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0248" ref_url="https://www.suse.com/security/cve/CVE-2012-0248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0692-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0248/">CVE-2012-0248</cve>
	<bugzilla href="https://bugzilla.suse.com/746880">SUSE bug 746880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0390" ref_url="https://www.suse.com/security/cve/CVE-2012-0390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00010.html" source="SUSE-SU"/>
    <description>
    The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0390/">CVE-2012-0390</cve>
	<bugzilla href="https://bugzilla.suse.com/739898">SUSE bug 739898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0441" ref_url="https://www.suse.com/security/cve/CVE-2012-0441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0441/">CVE-2012-0441</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0442" ref_url="https://www.suse.com/security/cve/CVE-2012-0442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0198-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0442/">CVE-2012-0442</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0443" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0443" ref_url="https://www.suse.com/security/cve/CVE-2012-0443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0443/">CVE-2012-0443</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747912">SUSE bug 747912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140997" comment="libvorbis-doc-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140998" comment="libvorbis0-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140999" comment="libvorbis0-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141000" comment="libvorbisenc2-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141001" comment="libvorbisenc2-32bit-1.3.3-8.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141002" comment="libvorbisfile3-1.3.3-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141003" comment="libvorbisfile3-32bit-1.3.3-8.23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0445" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0445" ref_url="https://www.suse.com/security/cve/CVE-2012-0445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to bypass the HTML5 frame-navigation policy and replace arbitrary sub-frames by creating a form submission target with a sub-frame's name attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0445/">CVE-2012-0445</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0446" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0446" ref_url="https://www.suse.com/security/cve/CVE-2012-0446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to inject arbitrary web script or HTML via a (1) web page or (2) Firefox extension, related to improper enforcement of XPConnect security restrictions for frame scripts that call untrusted objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0446/">CVE-2012-0446</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0447" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0447" ref_url="https://www.suse.com/security/cve/CVE-2012-0447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize data for image/vnd.microsoft.icon images, which allows remote attackers to obtain potentially sensitive information by reading a PNG image that was created through conversion from an ICO image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0447/">CVE-2012-0447</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0449" ref_url="https://www.suse.com/security/cve/CVE-2012-0449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a malformed XSLT stylesheet that is embedded in a document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0449/">CVE-2012-0449</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0451" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0451" ref_url="https://www.suse.com/security/cve/CVE-2012-0451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0451/">CVE-2012-0451</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0452" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0452" ref_url="https://www.suse.com/security/cve/CVE-2012-0452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0452/">CVE-2012-0452</cve>
	<bugzilla href="https://bugzilla.suse.com/746616">SUSE bug 746616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746663">SUSE bug 746663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0455" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0455" ref_url="https://www.suse.com/security/cve/CVE-2012-0455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0455/">CVE-2012-0455</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0456" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0456" ref_url="https://www.suse.com/security/cve/CVE-2012-0456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0456/">CVE-2012-0456</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0457" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0457" ref_url="https://www.suse.com/security/cve/CVE-2012-0457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeContainer function in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to execute arbitrary code via an SVG animation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0457/">CVE-2012-0457</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0458" ref_url="https://www.suse.com/security/cve/CVE-2012-0458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0458/">CVE-2012-0458</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0459" ref_url="https://www.suse.com/security/cve/CVE-2012-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via dynamic modification of a keyframe followed by access to the cssText of the keyframe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0459/">CVE-2012-0459</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0460" ref_url="https://www.suse.com/security/cve/CVE-2012-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict write access to the window.fullScreen object, which allows remote attackers to spoof the user interface via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0460/">CVE-2012-0460</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0461" ref_url="https://www.suse.com/security/cve/CVE-2012-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0461/">CVE-2012-0461</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0462" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0462" ref_url="https://www.suse.com/security/cve/CVE-2012-0462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0462/">CVE-2012-0462</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0463" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0463" ref_url="https://www.suse.com/security/cve/CVE-2012-0463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsWindow implementation in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 does not check the validity of an instance after event dispatching, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, as demonstrated by Mobile Firefox on Android.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0463/">CVE-2012-0463</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0464" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0464" ref_url="https://www.suse.com/security/cve/CVE-2012-0464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0417-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0464/">CVE-2012-0464</cve>
	<bugzilla href="https://bugzilla.suse.com/746591">SUSE bug 746591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750044">SUSE bug 750044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752168">SUSE bug 752168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0467" ref_url="https://www.suse.com/security/cve/CVE-2012-0467" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0467/">CVE-2012-0467</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0468" ref_url="https://www.suse.com/security/cve/CVE-2012-0468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (assertion failure and memory corruption) or possibly execute arbitrary code via vectors related to jsval.h and the js::array_shift function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0468/">CVE-2012-0468</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0469" ref_url="https://www.suse.com/security/cve/CVE-2012-0469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::indexedDB::IDBKeyRange::cycleCollection::Trace function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to execute arbitrary code via vectors related to crafted IndexedDB data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0469/">CVE-2012-0469</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0470" ref_url="https://www.suse.com/security/cve/CVE-2012-0470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0470/">CVE-2012-0470</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0471" ref_url="https://www.suse.com/security/cve/CVE-2012-0471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via a multibyte character set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0471/">CVE-2012-0471</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0472" ref_url="https://www.suse.com/security/cve/CVE-2012-0472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0472/">CVE-2012-0472</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0473" ref_url="https://www.suse.com/security/cve/CVE-2012-0473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The WebGLBuffer::FindMaxUshortElement function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 calls the FindMaxElementInSubArray function with incorrect template arguments, which allows remote attackers to obtain sensitive information from video memory via a crafted WebGL.drawElements call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0473/">CVE-2012-0473</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0474" ref_url="https://www.suse.com/security/cve/CVE-2012-0474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the docshell implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via vectors related to short-circuited page loads, aka "Universal XSS (UXSS)."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0474/">CVE-2012-0474</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0475" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0475" ref_url="https://www.suse.com/security/cve/CVE-2012-0475" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0475/">CVE-2012-0475</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0477" ref_url="https://www.suse.com/security/cve/CVE-2012-0477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0477/">CVE-2012-0477</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0478" ref_url="https://www.suse.com/security/cve/CVE-2012-0478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0478/">CVE-2012-0478</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0479" ref_url="https://www.suse.com/security/cve/CVE-2012-0479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to spoof the address bar via an https URL for invalid (1) RSS or (2) Atom XML content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0479/">CVE-2012-0479</cve>
	<bugzilla href="https://bugzilla.suse.com/758408">SUSE bug 758408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0497" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0497" ref_url="https://www.suse.com/security/cve/CVE-2012-0497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0497/">CVE-2012-0497</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0501" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0501" ref_url="https://www.suse.com/security/cve/CVE-2012-0501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0501/">CVE-2012-0501</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0502" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0502" ref_url="https://www.suse.com/security/cve/CVE-2012-0502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0502/">CVE-2012-0502</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0503" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0503" ref_url="https://www.suse.com/security/cve/CVE-2012-0503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0503/">CVE-2012-0503</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0505" ref_url="https://www.suse.com/security/cve/CVE-2012-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0505/">CVE-2012-0505</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0506" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0506" ref_url="https://www.suse.com/security/cve/CVE-2012-0506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0506/">CVE-2012-0506</cve>
	<bugzilla href="https://bugzilla.suse.com/747208">SUSE bug 747208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/758470">SUSE bug 758470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763805">SUSE bug 763805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0547" ref_url="https://www.suse.com/security/cve/CVE-2012-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and "a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited." NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "toolkit internals references."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0547/">CVE-2012-0547</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0759" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0759" ref_url="https://www.suse.com/security/cve/CVE-2012-0759" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-0771.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-0759/">CVE-2012-0759</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000961.html" source="SUSE-SU"/>
    <description>
    The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140461" comment="augeas-1.2.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140462" comment="augeas-lenses-1.2.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140463" comment="libaugeas0-1.2.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-02/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the proxy_connect function in src/client.c in CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<bugzilla href="https://bugzilla.suse.com/744059">SUSE bug 744059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140516" comment="cvs-1.12.12-181.63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140517" comment="cvs-doc-1.12.12-181.63 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0817" ref_url="https://www.suse.com/security/cve/CVE-2012-0817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" source="SUSE-SU"/>
    <description>
    Memory leak in smbd in Samba 3.6.x before 3.6.3 allows remote attackers to cause a denial of service (memory and CPU consumption) by making many connection requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0817/">CVE-2012-0817</cve>
	<bugzilla href="https://bugzilla.suse.com/743986">SUSE bug 743986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0845" ref_url="https://www.suse.com/security/cve/CVE-2012-0845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0845/">CVE-2012-0845</cve>
	<bugzilla href="https://bugzilla.suse.com/747125">SUSE bug 747125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0862" ref_url="https://www.suse.com/security/cve/CVE-2012-0862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00034.html" source="SUSE-SU"/>
    <description>
    builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0862/">CVE-2012-0862</cve>
	<bugzilla href="https://bugzilla.suse.com/762294">SUSE bug 762294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0866" ref_url="https://www.suse.com/security/cve/CVE-2012-0866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html" source="SUSE-SU"/>
    <description>
    CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0866/">CVE-2012-0866</cve>
	<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0867" ref_url="https://www.suse.com/security/cve/CVE-2012-0867" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0867/">CVE-2012-0867</cve>
	<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0868" ref_url="https://www.suse.com/security/cve/CVE-2012-0868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-0868/">CVE-2012-0868</cve>
	<bugzilla href="https://bugzilla.suse.com/701489">SUSE bug 701489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749299">SUSE bug 749299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749301">SUSE bug 749301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749303">SUSE bug 749303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0870" ref_url="https://www.suse.com/security/cve/CVE-2012-0870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-0870/">CVE-2012-0870</cve>
	<bugzilla href="https://bugzilla.suse.com/747934">SUSE bug 747934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00046.html" source="SUSE-SU"/>
    <description>
    The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531736" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549064" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549065" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549066" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549067" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549068" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596194" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596195" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596196" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596197" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596198" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0884" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0884" ref_url="https://www.suse.com/security/cve/CVE-2012-0884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0547-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0884/">CVE-2012-0884</cve>
	<bugzilla href="https://bugzilla.suse.com/749210">SUSE bug 749210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749735">SUSE bug 749735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751977">SUSE bug 751977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754640">SUSE bug 754640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761819">SUSE bug 761819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1012" ref_url="https://www.suse.com/security/cve/CVE-2012-1012" source="SUSE CVE"/>
    <description>
    server/server_stubs.c in the kadmin protocol implementation in MIT Kerberos 5 (aka krb5) 1.10 before 1.10.1 does not properly restrict access to (1) SET_STRING and (2) GET_STRINGS operations, which might allow remote authenticated administrators to modify or read string attributes by leveraging the global list privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1012/">CVE-2012-1012</cve>
	<bugzilla href="https://bugzilla.suse.com/766109">SUSE bug 766109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1013" ref_url="https://www.suse.com/security/cve/CVE-2012-1013" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0834-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00014.html" source="SUSE-SU"/>
    <description>
    The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1013/">CVE-2012-1013</cve>
	<bugzilla href="https://bugzilla.suse.com/765485">SUSE bug 765485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1014" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1014" ref_url="https://www.suse.com/security/cve/CVE-2012-1014" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0967-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html" source="SUSE-SU"/>
    <description>
    The process_as_req function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.10.x before 1.10.3 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a malformed AS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1014/">CVE-2012-1014</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1015" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1015" ref_url="https://www.suse.com/security/cve/CVE-2012-1015" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0967-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00016.html" source="SUSE-SU"/>
    <description>
    The kdc_handle_protected_negotiation function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x before 1.9.5, and 1.10.x before 1.10.3 attempts to calculate a checksum before verifying that the key type is appropriate for a checksum, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free, heap memory corruption, and daemon crash) via a crafted AS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1015/">CVE-2012-1015</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1016" ref_url="https://www.suse.com/security/cve/CVE-2012-1016" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00069.html" source="SUSE-SU"/>
    <description>
    The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1016/">CVE-2012-1016</cve>
	<bugzilla href="https://bugzilla.suse.com/807556">SUSE bug 807556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1096" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1096" ref_url="https://www.suse.com/security/cve/CVE-2012-1096" source="SUSE CVE"/>
    <description>
    NetworkManager 0.9 and earlier allows local users to use other users' certificates or private keys when making a connection via the file path when adding a new connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2012-1096/">CVE-2012-1096</cve>
	<bugzilla href="https://bugzilla.suse.com/738073">SUSE bug 738073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334334" comment="NetworkManager is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1126" ref_url="https://www.suse.com/security/cve/CVE-2012-1126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1126/">CVE-2012-1126</cve>
	<bugzilla href="https://bugzilla.suse.com/750937">SUSE bug 750937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1127" ref_url="https://www.suse.com/security/cve/CVE-2012-1127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1127/">CVE-2012-1127</cve>
	<bugzilla href="https://bugzilla.suse.com/750947">SUSE bug 750947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1128" ref_url="https://www.suse.com/security/cve/CVE-2012-1128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1128/">CVE-2012-1128</cve>
	<bugzilla href="https://bugzilla.suse.com/750942">SUSE bug 750942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1129" ref_url="https://www.suse.com/security/cve/CVE-2012-1129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1129/">CVE-2012-1129</cve>
	<bugzilla href="https://bugzilla.suse.com/750952">SUSE bug 750952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1130" ref_url="https://www.suse.com/security/cve/CVE-2012-1130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1130/">CVE-2012-1130</cve>
	<bugzilla href="https://bugzilla.suse.com/750951">SUSE bug 750951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1131" ref_url="https://www.suse.com/security/cve/CVE-2012-1131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1131/">CVE-2012-1131</cve>
	<bugzilla href="https://bugzilla.suse.com/750953">SUSE bug 750953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1132" ref_url="https://www.suse.com/security/cve/CVE-2012-1132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1132/">CVE-2012-1132</cve>
	<bugzilla href="https://bugzilla.suse.com/750950">SUSE bug 750950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1133" ref_url="https://www.suse.com/security/cve/CVE-2012-1133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1133/">CVE-2012-1133</cve>
	<bugzilla href="https://bugzilla.suse.com/750940">SUSE bug 750940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1134" ref_url="https://www.suse.com/security/cve/CVE-2012-1134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1134/">CVE-2012-1134</cve>
	<bugzilla href="https://bugzilla.suse.com/750945">SUSE bug 750945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1135" ref_url="https://www.suse.com/security/cve/CVE-2012-1135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1135/">CVE-2012-1135</cve>
	<bugzilla href="https://bugzilla.suse.com/750946">SUSE bug 750946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1136" ref_url="https://www.suse.com/security/cve/CVE-2012-1136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1136/">CVE-2012-1136</cve>
	<bugzilla href="https://bugzilla.suse.com/750939">SUSE bug 750939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1137" ref_url="https://www.suse.com/security/cve/CVE-2012-1137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1137/">CVE-2012-1137</cve>
	<bugzilla href="https://bugzilla.suse.com/750943">SUSE bug 750943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1138" ref_url="https://www.suse.com/security/cve/CVE-2012-1138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1138/">CVE-2012-1138</cve>
	<bugzilla href="https://bugzilla.suse.com/750941">SUSE bug 750941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1139" ref_url="https://www.suse.com/security/cve/CVE-2012-1139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1139/">CVE-2012-1139</cve>
	<bugzilla href="https://bugzilla.suse.com/750938">SUSE bug 750938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1140" ref_url="https://www.suse.com/security/cve/CVE-2012-1140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1140/">CVE-2012-1140</cve>
	<bugzilla href="https://bugzilla.suse.com/750954">SUSE bug 750954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1141" ref_url="https://www.suse.com/security/cve/CVE-2012-1141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1141/">CVE-2012-1141</cve>
	<bugzilla href="https://bugzilla.suse.com/750955">SUSE bug 750955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1142" ref_url="https://www.suse.com/security/cve/CVE-2012-1142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1142/">CVE-2012-1142</cve>
	<bugzilla href="https://bugzilla.suse.com/750948">SUSE bug 750948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1143" ref_url="https://www.suse.com/security/cve/CVE-2012-1143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0483-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1143/">CVE-2012-1143</cve>
	<bugzilla href="https://bugzilla.suse.com/750949">SUSE bug 750949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1144" ref_url="https://www.suse.com/security/cve/CVE-2012-1144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00004.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1144/">CVE-2012-1144</cve>
	<bugzilla href="https://bugzilla.suse.com/750944">SUSE bug 750944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1147" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1147" ref_url="https://www.suse.com/security/cve/CVE-2012-1147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00046.html" source="SUSE-SU"/>
    <description>
    readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1147/">CVE-2012-1147</cve>
	<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1148" ref_url="https://www.suse.com/security/cve/CVE-2012-1148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1148/">CVE-2012-1148</cve>
	<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1150" ref_url="https://www.suse.com/security/cve/CVE-2012-1150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-1150/">CVE-2012-1150</cve>
	<bugzilla href="https://bugzilla.suse.com/751718">SUSE bug 751718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/755383">SUSE bug 755383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826682">SUSE bug 826682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1152" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1000-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" source="SUSE-SU"/>
    <description>
    Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152</cve>
	<bugzilla href="https://bugzilla.suse.com/751503">SUSE bug 751503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1162" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a zip archive with the number of directories set to 0, related to an "incorrect loop construct."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<bugzilla href="https://bugzilla.suse.com/751829">SUSE bug 751829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751830">SUSE bug 751830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1163" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0416-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to execute arbitrary code via the size and offset values for the central directory in a zip archive, which triggers "improper restrictions of operations within the bounds of a memory buffer" and an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<bugzilla href="https://bugzilla.suse.com/751829">SUSE bug 751829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751830">SUSE bug 751830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1165" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1165" ref_url="https://www.suse.com/security/cve/CVE-2012-1165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0474-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1165/">CVE-2012-1165</cve>
	<bugzilla href="https://bugzilla.suse.com/749210">SUSE bug 749210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749213">SUSE bug 749213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751946">SUSE bug 751946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754640">SUSE bug 754640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1173" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0539-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<bugzilla href="https://bugzilla.suse.com/753362">SUSE bug 753362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767852">SUSE bug 767852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1174" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1174" ref_url="https://www.suse.com/security/cve/CVE-2012-1174" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-03/msg00030.html" source="SUSE-SU"/>
    <description>
    The rm_rf_children function in util.c in the systemd-logind login manager in systemd before 44, when logging out, allows local users to delete arbitrary files via a symlink attack on unspecified files, related to "particular records related with user session."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1174/">CVE-2012-1174</cve>
	<bugzilla href="https://bugzilla.suse.com/752281">SUSE bug 752281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140954" comment="libsystemd0-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140955" comment="libsystemd0-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140956" comment="libudev1-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140957" comment="libudev1-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140958" comment="systemd-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140959" comment="systemd-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140960" comment="systemd-bash-completion-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140961" comment="systemd-sysvinit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140962" comment="udev-228-117.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1182" ref_url="https://www.suse.com/security/cve/CVE-2012-1182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0501-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1182/">CVE-2012-1182</cve>
	<bugzilla href="https://bugzilla.suse.com/747934">SUSE bug 747934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/752797">SUSE bug 752797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1185" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1185" ref_url="https://www.suse.com/security/cve/CVE-2012-1185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0692-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in (1) magick/profile.c or (2) magick/property.c in ImageMagick 6.7.5 and earlier allow remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset value in the ResolutionUnit tag in the EXIF IFD0 of an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0247.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1185/">CVE-2012-1185</cve>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1186" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1186" ref_url="https://www.suse.com/security/cve/CVE-2012-1186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0692-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1186/">CVE-2012-1186</cve>
	<bugzilla href="https://bugzilla.suse.com/752879">SUSE bug 752879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1457" ref_url="https://www.suse.com/security/cve/CVE-2012-1457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000176.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1457/">CVE-2012-1457</cve>
	<bugzilla href="https://bugzilla.suse.com/753611">SUSE bug 753611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1458" ref_url="https://www.suse.com/security/cve/CVE-2012-1458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000176.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1458/">CVE-2012-1458</cve>
	<bugzilla href="https://bugzilla.suse.com/753613">SUSE bug 753613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1459" ref_url="https://www.suse.com/security/cve/CVE-2012-1459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000176.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html" source="SUSE-SU"/>
    <description>
    The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1459/">CVE-2012-1459</cve>
	<bugzilla href="https://bugzilla.suse.com/753610">SUSE bug 753610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/767574">SUSE bug 767574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1569" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1569" ref_url="https://www.suse.com/security/cve/CVE-2012-1569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00021.html" source="SUSE-SU"/>
    <description>
    The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1569/">CVE-2012-1569</cve>
	<bugzilla href="https://bugzilla.suse.com/752193">SUSE bug 752193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/753301">SUSE bug 753301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924966">SUSE bug 924966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1571" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1571" ref_url="https://www.suse.com/security/cve/CVE-2012-1571" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-04/msg00028.html" source="SUSE-SU"/>
    <description>
    file before 5.11 and libmagic allow remote attackers to cause a denial of service (crash) via a crafted Composite Document File (CDF) file that triggers (1) an out-of-bounds read or (2) an invalid pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1571/">CVE-2012-1571</cve>
	<bugzilla href="https://bugzilla.suse.com/753303">SUSE bug 753303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883306">SUSE bug 883306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/884986">SUSE bug 884986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987530">SUSE bug 987530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1573" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1573" ref_url="https://www.suse.com/security/cve/CVE-2012-1573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00021.html" source="SUSE-SU"/>
    <description>
    gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1573/">CVE-2012-1573</cve>
	<bugzilla href="https://bugzilla.suse.com/752193">SUSE bug 752193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/754223">SUSE bug 754223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1586" ref_url="https://www.suse.com/security/cve/CVE-2012-1586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0607-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00011.html" source="SUSE-SU"/>
    <description>
    mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1586/">CVE-2012-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140488" comment="cifs-utils-6.5-8.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1667" ref_url="https://www.suse.com/security/cve/CVE-2012-1667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-5" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0741-6" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1667/">CVE-2012-1667</cve>
	<bugzilla href="https://bugzilla.suse.com/765315">SUSE bug 765315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1682" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1682" ref_url="https://www.suse.com/security/cve/CVE-2012-1682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "XMLDecoder security issue via ClassFinder."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1682/">CVE-2012-1682</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1711" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1711" ref_url="https://www.suse.com/security/cve/CVE-2012-1711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1711/">CVE-2012-1711</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1713" ref_url="https://www.suse.com/security/cve/CVE-2012-1713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000293.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1713/">CVE-2012-1713</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1716" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1716" ref_url="https://www.suse.com/security/cve/CVE-2012-1716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1716/">CVE-2012-1716</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1717" ref_url="https://www.suse.com/security/cve/CVE-2012-1717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000293.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1717/">CVE-2012-1717</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1718" ref_url="https://www.suse.com/security/cve/CVE-2012-1718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000293.html" source="SUSE-SU"/>
		<reference ref_id="TID7011405" ref_url="https://www.suse.com/support/kb/doc/?id=7011405" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1718/">CVE-2012-1718</cve>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1719" ref_url="https://www.suse.com/security/cve/CVE-2012-1719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000293.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1719/">CVE-2012-1719</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1723" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1723" ref_url="https://www.suse.com/security/cve/CVE-2012-1723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7011405" ref_url="https://www.suse.com/support/kb/doc/?id=7011405" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1723/">CVE-2012-1723</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1724" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1724" ref_url="https://www.suse.com/security/cve/CVE-2012-1724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7011405" ref_url="https://www.suse.com/support/kb/doc/?id=7011405" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1724/">CVE-2012-1724</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1725" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1725" ref_url="https://www.suse.com/security/cve/CVE-2012-1725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="TID7011405" ref_url="https://www.suse.com/support/kb/doc/?id=7011405" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1725/">CVE-2012-1725</cve>
	<bugzilla href="https://bugzilla.suse.com/766802">SUSE bug 766802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1726" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1726" ref_url="https://www.suse.com/security/cve/CVE-2012-1726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1726/">CVE-2012-1726</cve>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1937" ref_url="https://www.suse.com/security/cve/CVE-2012-1937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1937/">CVE-2012-1937</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1938" ref_url="https://www.suse.com/security/cve/CVE-2012-1938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp, and unknown other components.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1938/">CVE-2012-1938</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1940" ref_url="https://www.suse.com/security/cve/CVE-2012-1940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by changing the size of a container of absolutely positioned elements in a column.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1940/">CVE-2012-1940</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1941" ref_url="https://www.suse.com/security/cve/CVE-2012-1941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1941/">CVE-2012-1941</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1944" ref_url="https://www.suse.com/security/cve/CVE-2012-1944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1944/">CVE-2012-1944</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1945" ref_url="https://www.suse.com/security/cve/CVE-2012-1945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1945/">CVE-2012-1945</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1946" ref_url="https://www.suse.com/security/cve/CVE-2012-1946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 might allow remote attackers to execute arbitrary code via document changes involving replacement or insertion of a node.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1946/">CVE-2012-1946</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1947" ref_url="https://www.suse.com/security/cve/CVE-2012-1947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1947/">CVE-2012-1947</cve>
	<bugzilla href="https://bugzilla.suse.com/765204">SUSE bug 765204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1948" ref_url="https://www.suse.com/security/cve/CVE-2012-1948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1948/">CVE-2012-1948</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1949" ref_url="https://www.suse.com/security/cve/CVE-2012-1949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1949/">CVE-2012-1949</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1950" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1950" ref_url="https://www.suse.com/security/cve/CVE-2012-1950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
    <description>
    The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1950/">CVE-2012-1950</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1951" ref_url="https://www.suse.com/security/cve/CVE-2012-1951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsSMILTimeValueSpec::IsEventBased function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code by interacting with objects used for SMIL Timing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1951/">CVE-2012-1951</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1952" ref_url="https://www.suse.com/security/cve/CVE-2012-1952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsTableFrame::InsertFrames function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly perform a cast of a frame variable during processing of mixed row-group and column-group frames, which might allow remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1952/">CVE-2012-1952</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1953" ref_url="https://www.suse.com/security/cve/CVE-2012-1953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The ElementAnimations::EnsureStyleRuleFor function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (buffer over-read, incorrect pointer dereference, and heap-based buffer overflow) or possibly execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1953/">CVE-2012-1953</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1954" ref_url="https://www.suse.com/security/cve/CVE-2012-1954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsDocument::AdoptNode function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors involving multiple adoptions and empty documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1954/">CVE-2012-1954</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1955" ref_url="https://www.suse.com/security/cve/CVE-2012-1955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to spoof the address bar via vectors involving history.forward and history.back calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1955/">CVE-2012-1955</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1956" ref_url="https://www.suse.com/security/cve/CVE-2012-1956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 do not prevent use of the Object.defineProperty method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1956/">CVE-2012-1956</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1957" ref_url="https://www.suse.com/security/cve/CVE-2012-1957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    An unspecified parser-utility class in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly handle EMBED elements within description elements in RSS feeds, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a feed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1957/">CVE-2012-1957</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1958" ref_url="https://www.suse.com/security/cve/CVE-2012-1958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsGlobalWindow::PageHidden function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 might allow remote attackers to execute arbitrary code via vectors related to focused content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1958/">CVE-2012-1958</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1959" ref_url="https://www.suse.com/security/cve/CVE-2012-1959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not consider the presence of same-compartment security wrappers (SCSW) during the cross-compartment wrapping of objects, which allows remote attackers to bypass intended XBL access restrictions via crafted content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1959/">CVE-2012-1959</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1960" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1960" ref_url="https://www.suse.com/security/cve/CVE-2012-1960" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The qcms_transform_data_rgb_out_lut_sse2 function in the QCMS implementation in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 might allow remote attackers to obtain sensitive information from process memory via a crafted color profile that triggers an out-of-bounds read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-1960/">CVE-2012-1960</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1961" ref_url="https://www.suse.com/security/cve/CVE-2012-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly handle duplicate values in X-Frame-Options headers, which makes it easier for remote attackers to conduct clickjacking attacks via a FRAME element referencing a web site that produces these duplicate values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1961/">CVE-2012-1961</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1962" ref_url="https://www.suse.com/security/cve/CVE-2012-1962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the JSDependentString::undepend function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors involving strings with multiple dependencies.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1962/">CVE-2012-1962</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1963" ref_url="https://www.suse.com/security/cve/CVE-2012-1963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Content Security Policy (CSP) functionality in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly restrict the strings placed into the blocked-uri parameter of a violation report, which allows remote web servers to capture OpenID credentials and OAuth 2.0 access tokens by triggering a violation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1963/">CVE-2012-1963</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1965" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1965" ref_url="https://www.suse.com/security/cve/CVE-2012-1965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1965/">CVE-2012-1965</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1966" ref_url="https://www.suse.com/security/cve/CVE-2012-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not have the same context-menu restrictions for data: URLs as for javascript: URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1966/">CVE-2012-1966</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1967" ref_url="https://www.suse.com/security/cve/CVE-2012-1967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0895-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0899-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly implement the JavaScript sandbox utility, which allows remote attackers to execute arbitrary JavaScript code with improper privileges via a javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1967/">CVE-2012-1967</cve>
	<bugzilla href="https://bugzilla.suse.com/771583">SUSE bug 771583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1970" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1970" ref_url="https://www.suse.com/security/cve/CVE-2012-1970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-1970/">CVE-2012-1970</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1972" ref_url="https://www.suse.com/security/cve/CVE-2012-1972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1972/">CVE-2012-1972</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1973" ref_url="https://www.suse.com/security/cve/CVE-2012-1973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1973/">CVE-2012-1973</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1974" ref_url="https://www.suse.com/security/cve/CVE-2012-1974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1974/">CVE-2012-1974</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1975" ref_url="https://www.suse.com/security/cve/CVE-2012-1975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1975/">CVE-2012-1975</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1976" ref_url="https://www.suse.com/security/cve/CVE-2012-1976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-1976/">CVE-2012-1976</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2110" ref_url="https://www.suse.com/security/cve/CVE-2012-2110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1149-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021456" ref_url="https://www.suse.com/support/kb/doc/?id=7021456" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021736" ref_url="https://www.suse.com/support/kb/doc/?id=7021736" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021874" ref_url="https://www.suse.com/support/kb/doc/?id=7021874" source="SUSE-SU"/>
		<reference ref_id="TID7021991" ref_url="https://www.suse.com/support/kb/doc/?id=7021991" source="SUSE-SU"/>
		<reference ref_id="TID7022023" ref_url="https://www.suse.com/support/kb/doc/?id=7022023" source="SUSE-SU"/>
		<reference ref_id="TID7022090" ref_url="https://www.suse.com/support/kb/doc/?id=7022090" source="SUSE-SU"/>
		<reference ref_id="TID7022091" ref_url="https://www.suse.com/support/kb/doc/?id=7022091" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2110/">CVE-2012-2110</cve>
	<bugzilla href="https://bugzilla.suse.com/758060">SUSE bug 758060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778825">SUSE bug 778825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2111" ref_url="https://www.suse.com/security/cve/CVE-2012-2111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html" source="SUSE-SU"/>
    <description>
    The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2111/">CVE-2012-2111</cve>
	<bugzilla href="https://bugzilla.suse.com/754443">SUSE bug 754443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757576">SUSE bug 757576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0829-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00009.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<bugzilla href="https://bugzilla.suse.com/767852">SUSE bug 767852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2141" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2141" ref_url="https://www.suse.com/security/cve/CVE-2012-2141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0659-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00042.html" source="SUSE-SU"/>
    <description>
    Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2141/">CVE-2012-2141</cve>
	<bugzilla href="https://bugzilla.suse.com/759352">SUSE bug 759352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826684">SUSE bug 826684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2143" ref_url="https://www.suse.com/security/cve/CVE-2012-2143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1299-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2143/">CVE-2012-2143</cve>
	<bugzilla href="https://bugzilla.suse.com/766797">SUSE bug 766797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766798">SUSE bug 766798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/766799">SUSE bug 766799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2150" ref_url="https://www.suse.com/security/cve/CVE-2012-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1429-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00007.html" source="SUSE-SU"/>
    <description>
    xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2150/">CVE-2012-2150</cve>
	<bugzilla href="https://bugzilla.suse.com/939367">SUSE bug 939367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141166" comment="xfsprogs-4.3.0-8.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2337" ref_url="https://www.suse.com/security/cve/CVE-2012-2337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0652-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00036.html" source="SUSE-SU"/>
    <description>
    sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2337/">CVE-2012-2337</cve>
	<bugzilla href="https://bugzilla.suse.com/762327">SUSE bug 762327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826687">SUSE bug 826687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2388" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2388" ref_url="https://www.suse.com/security/cve/CVE-2012-2388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-06/msg00002.html" source="SUSE-SU"/>
    <description>
    The GMP Plugin in strongSwan 4.2.0 through 4.6.3 allows remote attackers to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka "RSA signature verification vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2388/">CVE-2012-2388</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761325">SUSE bug 761325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815236">SUSE bug 815236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2392" ref_url="https://www.suse.com/security/cve/CVE-2012-2392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0657-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00041.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allows remote attackers to cause a denial of service (infinite loop) via vectors related to the (1) ANSI MAP, (2) ASF, (3) IEEE 802.11, (4) IEEE 802.3, and (5) LTP dissectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2392/">CVE-2012-2392</cve>
	<bugzilla href="https://bugzilla.suse.com/763634">SUSE bug 763634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763855">SUSE bug 763855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/769578">SUSE bug 769578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2393" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2393" ref_url="https://www.suse.com/security/cve/CVE-2012-2393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0657-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00041.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2393/">CVE-2012-2393</cve>
	<bugzilla href="https://bugzilla.suse.com/763634">SUSE bug 763634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763855">SUSE bug 763855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763857">SUSE bug 763857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2394" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2394" ref_url="https://www.suse.com/security/cve/CVE-2012-2394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0657-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00041.html" source="SUSE-SU"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2394/">CVE-2012-2394</cve>
	<bugzilla href="https://bugzilla.suse.com/763634">SUSE bug 763634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/763859">SUSE bug 763859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2396" ref_url="https://www.suse.com/security/cve/CVE-2012-2396" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0615-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-05/msg00017.html" source="SUSE-SU"/>
    <description>
    VideoLAN VLC media player 2.0.1 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted MP4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2396/">CVE-2012-2396</cve>
	<bugzilla href="https://bugzilla.suse.com/760496">SUSE bug 760496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140963" comment="libtag1-1.9.1-1.265 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140964" comment="libtag_c0-1.9.1-1.265 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140965" comment="taglib-1.9.1-1.265 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2451" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451" source="SUSE CVE"/>
    <description>
    The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack.  NOTE: some of these details are obtained from third party information.  NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451</cve>
	<bugzilla href="https://bugzilla.suse.com/760459">SUSE bug 760459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141066" comment="perl-Config-IniFiles-2.82-3.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2625" ref_url="https://www.suse.com/security/cve/CVE-2012-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2625/">CVE-2012-2625</cve>
	<bugzilla href="https://bugzilla.suse.com/762484">SUSE bug 762484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2655" ref_url="https://www.suse.com/security/cve/CVE-2012-2655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1299-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4 allows remote authenticated users to cause a denial of service (server crash) by adding the (1) SECURITY DEFINER or (2) SET attributes to a procedural language's call handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2655/">CVE-2012-2655</cve>
	<bugzilla href="https://bugzilla.suse.com/765069">SUSE bug 765069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2669" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000166.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1526-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669</cve>
	<bugzilla href="https://bugzilla.suse.com/761200">SUSE bug 761200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140682" comment="hyper-v-7-13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2673" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<bugzilla href="https://bugzilla.suse.com/765444">SUSE bug 765444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140590" comment="libgc1-7.2d-3.77 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2686" ref_url="https://www.suse.com/security/cve/CVE-2012-2686" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00072.html" source="SUSE-SU"/>
    <description>
    crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2686/">CVE-2012-2686</cve>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2687" ref_url="https://www.suse.com/security/cve/CVE-2012-2687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000464.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0243-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0632-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00065.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2687/">CVE-2012-2687</cve>
	<bugzilla href="https://bugzilla.suse.com/777260">SUSE bug 777260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2737" ref_url="https://www.suse.com/security/cve/CVE-2012-2737" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0845-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00016.html" source="SUSE-SU"/>
    <description>
    The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2737/">CVE-2012-2737</cve>
	<bugzilla href="https://bugzilla.suse.com/768807">SUSE bug 768807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140439" comment="accountsservice-0.6.42-14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140440" comment="accountsservice-lang-0.6.42-14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140441" comment="libaccountsservice0-0.6.42-14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140442" comment="typelib-1_0-AccountsService-1_0-0.6.42-14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2738" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2738" ref_url="https://www.suse.com/security/cve/CVE-2012-2738" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0931-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0933-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00003.html" source="SUSE-SU"/>
    <description>
    The VteTerminal in gnome-terminal (vte) before 0.32.2 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2738/">CVE-2012-2738</cve>
	<bugzilla href="https://bugzilla.suse.com/772761">SUSE bug 772761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141004" comment="libvte9-0.28.2-19.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141005" comment="python-vte-0.28.2-19.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141006" comment="vte2-lang-0.28.2-19.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    The exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    The exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the exif_entry_format_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    The exif_data_load_data function in exif-data.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    The mnote_olympus_entry_get_value function in olympus/mnote-olympus-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (divide-by-zero error) via an image with crafted EXIF tags that are not properly handled during the formatting of EXIF maker note tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0914-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-07/msg00048.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 might allow remote attackers to execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<bugzilla href="https://bugzilla.suse.com/771229">SUSE bug 771229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831515">SUSE bug 831515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140840" comment="libexif12-0.6.21-6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140841" comment="libexif12-32bit-0.6.21-6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1077-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000239.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1069-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00049.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944</cve>
	<bugzilla href="https://bugzilla.suse.com/764699">SUSE bug 764699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140972" comment="libupsclient1-2.7.1-4.84 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140973" comment="nut-2.7.1-4.84 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140974" comment="nut-drivers-net-2.7.1-4.84 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3136" ref_url="https://www.suse.com/security/cve/CVE-2012-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-1682.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3136/">CVE-2012-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3174" ref_url="https://www.suse.com/security/cve/CVE-2012-3174" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java 7 before Update 11 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0422.  NOTE: some parties have mapped CVE-2012-3174 to an issue involving recursive use of the Reflection API, but that issue is already covered as part of CVE-2013-0422.  This identifier is for a different vulnerability whose details are not public as of 20130114.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3174/">CVE-2012-3174</cve>
	<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798521">SUSE bug 798521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3216" ref_url="https://www.suse.com/security/cve/CVE-2012-3216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3216/">CVE-2012-3216</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000578.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1519-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00038.html" source="SUSE-SU"/>
    <description>
    The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<bugzilla href="https://bugzilla.suse.com/770618">SUSE bug 770618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786745">SUSE bug 786745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140671" comment="gv-3.7.4-1.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140672" comment="wdiff-1.2.1-3.64 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3401" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0955-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00011.html" source="SUSE-SU"/>
    <description>
    The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<bugzilla href="https://bugzilla.suse.com/770816">SUSE bug 770816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000539.html" source="SUSE-SU"/>
    <description>
    The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<bugzilla href="https://bugzilla.suse.com/770891">SUSE bug 770891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3432" ref_url="https://www.suse.com/security/cve/CVE-2012-3432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
    <description>
    The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3432/">CVE-2012-3432</cve>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3433" ref_url="https://www.suse.com/security/cve/CVE-2012-3433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
    <description>
    Xen 4.0 and 4.1 allows local HVM guest OS kernels to cause a denial of service (domain 0 VCPU hang and kernel panic) by modifying the physical address space in a way that triggers excessive shared page search time during the p2m teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3433/">CVE-2012-3433</cve>
	<bugzilla href="https://bugzilla.suse.com/773393">SUSE bug 773393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/773401">SUSE bug 773401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3445" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3445" ref_url="https://www.suse.com/security/cve/CVE-2012-3445" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0991-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00023.html" source="SUSE-SU"/>
    <description>
    The virTypedParameterArrayClear function in libvirt 0.9.13 does not properly handle virDomain* API calls with typed parameters, which might allow remote authenticated users to cause a denial of service (libvirtd crash) via an RPC command with nparams set to zero, which triggers an out-of-bounds read or a free of an invalid pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3445/">CVE-2012-3445</cve>
	<bugzilla href="https://bugzilla.suse.com/773955">SUSE bug 773955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3449" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3449" ref_url="https://www.suse.com/security/cve/CVE-2012-3449" source="SUSE CVE"/>
    <description>
    Open vSwitch 1.4.2 uses world writable permissions for (1) /var/lib/openvswitch/pki/controllerca/incoming/ and (2) /var/lib/openvswitch/pki/switchca/incoming/, which allows local users to delete and overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3449/">CVE-2012-3449</cve>
	<bugzilla href="https://bugzilla.suse.com/774332">SUSE bug 774332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141050" comment="openvswitch-2.5.1-24.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141051" comment="openvswitch-dpdk-2.5.1-24.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141052" comment="openvswitch-dpdk-switch-2.5.1-24.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141053" comment="openvswitch-switch-2.5.1-24.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3466" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3466" ref_url="https://www.suse.com/security/cve/CVE-2012-3466" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00037.html" source="SUSE-SU"/>
    <description>
    GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3466/">CVE-2012-3466</cve>
	<bugzilla href="https://bugzilla.suse.com/775235">SUSE bug 775235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140630" comment="gnome-keyring-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140631" comment="gnome-keyring-32bit-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140632" comment="gnome-keyring-lang-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140633" comment="gnome-keyring-pam-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140634" comment="gnome-keyring-pam-32bit-3.20.0-27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140635" comment="libgck-modules-gnome-keyring-3.20.0-27.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001966.html" source="SUSE-SU"/>
    <description>
    Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<bugzilla href="https://bugzilla.suse.com/775988">SUSE bug 775988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140569" comment="fetchmail-6.3.26-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140570" comment="fetchmailconf-6.3.26-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3488" ref_url="https://www.suse.com/security/cve/CVE-2012-3488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1299-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The libxslt support in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3488/">CVE-2012-3488</cve>
	<bugzilla href="https://bugzilla.suse.com/776523">SUSE bug 776523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3489" ref_url="https://www.suse.com/security/cve/CVE-2012-3489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1299-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3489/">CVE-2012-3489</cve>
	<bugzilla href="https://bugzilla.suse.com/776524">SUSE bug 776524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3499" ref_url="https://www.suse.com/security/cve/CVE-2012-3499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0648-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000464.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0632-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00049.html" source="SUSE-SU"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3499/">CVE-2012-3499</cve>
	<bugzilla href="https://bugzilla.suse.com/806458">SUSE bug 806458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807511">SUSE bug 807511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3502" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3502" ref_url="https://www.suse.com/security/cve/CVE-2012-3502" source="SUSE CVE"/>
    <description>
    The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3502/">CVE-2012-3502</cve>
	<bugzilla href="https://bugzilla.suse.com/777119">SUSE bug 777119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3515" ref_url="https://www.suse.com/security/cve/CVE-2012-3515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1203-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3515/">CVE-2012-3515</cve>
	<bugzilla href="https://bugzilla.suse.com/777084">SUSE bug 777084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3524" ref_url="https://www.suse.com/security/cve/CVE-2012-3524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00051.html" source="SUSE-SU"/>
    <description>
    libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3524/">CVE-2012-3524</cve>
	<bugzilla href="https://bugzilla.suse.com/697105">SUSE bug 697105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852781">SUSE bug 852781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912016">SUSE bug 912016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140606" comment="glib2-lang-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140607" comment="glib2-tools-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140608" comment="libgio-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140609" comment="libgio-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140610" comment="libglib-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140611" comment="libglib-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140612" comment="libgmodule-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140613" comment="libgmodule-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140614" comment="libgobject-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140615" comment="libgobject-2_0-0-32bit-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140616" comment="libgthread-2_0-0-2.48.2-10.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140617" comment="libgthread-2_0-0-32bit-2.48.2-10.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3547" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3547" ref_url="https://www.suse.com/security/cve/CVE-2012-3547" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00023.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3547/">CVE-2012-3547</cve>
	<bugzilla href="https://bugzilla.suse.com/777834">SUSE bug 777834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140576" comment="freeradius-server-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140577" comment="freeradius-server-doc-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140578" comment="freeradius-server-krb5-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140579" comment="freeradius-server-ldap-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140580" comment="freeradius-server-libs-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140581" comment="freeradius-server-mysql-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140582" comment="freeradius-server-perl-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140583" comment="freeradius-server-postgresql-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140584" comment="freeradius-server-python-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140585" comment="freeradius-server-sqlite-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140586" comment="freeradius-server-utils-3.0.3-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3548" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3548" ref_url="https://www.suse.com/security/cve/CVE-2012-3548" source="SUSE CVE"/>
    <description>
    The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x through 1.6.10 and 1.8.x through 1.8.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field in a capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3548/">CVE-2012-3548</cve>
	<bugzilla href="https://bugzilla.suse.com/778000">SUSE bug 778000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3570" ref_url="https://www.suse.com/security/cve/CVE-2012-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3570/">CVE-2012-3570</cve>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3571" ref_url="https://www.suse.com/security/cve/CVE-2012-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3571/">CVE-2012-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3817" ref_url="https://www.suse.com/security/cve/CVE-2012-3817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1048-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1048-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0969-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0971-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3817/">CVE-2012-3817</cve>
	<bugzilla href="https://bugzilla.suse.com/772945">SUSE bug 772945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3868" ref_url="https://www.suse.com/security/cve/CVE-2012-3868" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0666-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00077.html" source="SUSE-SU"/>
    <description>
    Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3868/">CVE-2012-3868</cve>
	<bugzilla href="https://bugzilla.suse.com/772946">SUSE bug 772946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3954" ref_url="https://www.suse.com/security/cve/CVE-2012-3954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3954/">CVE-2012-3954</cve>
	<bugzilla href="https://bugzilla.suse.com/772924">SUSE bug 772924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3955" ref_url="https://www.suse.com/security/cve/CVE-2012-3955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1234-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-09/msg00105.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3955/">CVE-2012-3955</cve>
	<bugzilla href="https://bugzilla.suse.com/780167">SUSE bug 780167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3956" ref_url="https://www.suse.com/security/cve/CVE-2012-3956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3956/">CVE-2012-3956</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3957" ref_url="https://www.suse.com/security/cve/CVE-2012-3957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3957/">CVE-2012-3957</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3958" ref_url="https://www.suse.com/security/cve/CVE-2012-3958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditRules::DeleteNonTableElements function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3958/">CVE-2012-3958</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3959" ref_url="https://www.suse.com/security/cve/CVE-2012-3959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3959/">CVE-2012-3959</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3960" ref_url="https://www.suse.com/security/cve/CVE-2012-3960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3960/">CVE-2012-3960</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3961" ref_url="https://www.suse.com/security/cve/CVE-2012-3961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3961/">CVE-2012-3961</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3962" ref_url="https://www.suse.com/security/cve/CVE-2012-3962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly iterate through the characters in a text run, which allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3962/">CVE-2012-3962</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3963" ref_url="https://www.suse.com/security/cve/CVE-2012-3963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3963/">CVE-2012-3963</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3964" ref_url="https://www.suse.com/security/cve/CVE-2012-3964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3964/">CVE-2012-3964</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3965" ref_url="https://www.suse.com/security/cve/CVE-2012-3965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0 does not properly restrict navigation to the about:newtab page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers creation of a new tab and then a new window.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3965/">CVE-2012-3965</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3966" ref_url="https://www.suse.com/security/cve/CVE-2012-3966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a negative height value in a BMP image within a .ICO file, related to (1) improper handling of the transparency bitmask by the nsICODecoder component and (2) improper processing of the alpha channel by the nsBMPDecoder component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3966/">CVE-2012-3966</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3967" ref_url="https://www.suse.com/security/cve/CVE-2012-3967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3967/">CVE-2012-3967</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3968" ref_url="https://www.suse.com/security/cve/CVE-2012-3968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via vectors related to deletion of a fragment shader by its accessor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3968/">CVE-2012-3968</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3969" ref_url="https://www.suse.com/security/cve/CVE-2012-3969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3969/">CVE-2012-3969</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3970" ref_url="https://www.suse.com/security/cve/CVE-2012-3970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3970/">CVE-2012-3970</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3971" ref_url="https://www.suse.com/security/cve/CVE-2012-3971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Summer Institute of Linguistics (SIL) Graphite 2, as used in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the (1) Silf::readClassMap and (2) Pass::readPass functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3971/">CVE-2012-3971</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3972" ref_url="https://www.suse.com/security/cve/CVE-2012-3972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3972/">CVE-2012-3972</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3973" ref_url="https://www.suse.com/security/cve/CVE-2012-3973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
    <description>
    The debugger in the developer-tools subsystem in Mozilla Firefox before 15.0, when remote debugging is disabled, does not properly restrict access to the remote-debugging service, which allows remote attackers to execute arbitrary code by leveraging the presence of the HTTPMonitor extension and connecting to that service through the HTTPMonitor port.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3973/">CVE-2012-3973</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3975" ref_url="https://www.suse.com/security/cve/CVE-2012-3975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The DOMParser component in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 loads subresources during parsing of text/html data within an extension, which allows remote attackers to obtain sensitive information by providing crafted data to privileged extension code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-3975/">CVE-2012-3975</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3976" ref_url="https://www.suse.com/security/cve/CVE-2012-3976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3976/">CVE-2012-3976</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3978" ref_url="https://www.suse.com/security/cve/CVE-2012-3978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 does not properly follow the security model of the location object, which allows remote attackers to bypass intended content-loading restrictions or possibly have unspecified other impact via vectors involving chrome code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3978/">CVE-2012-3978</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3980" ref_url="https://www.suse.com/security/cve/CVE-2012-3980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The web console in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that injects this code and triggers an eval operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-3980/">CVE-2012-3980</cve>
	<bugzilla href="https://bugzilla.suse.com/777588">SUSE bug 777588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3982" ref_url="https://www.suse.com/security/cve/CVE-2012-3982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3982/">CVE-2012-3982</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3983" ref_url="https://www.suse.com/security/cve/CVE-2012-3983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3983/">CVE-2012-3983</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3984" ref_url="https://www.suse.com/security/cve/CVE-2012-3984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3984/">CVE-2012-3984</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3985" ref_url="https://www.suse.com/security/cve/CVE-2012-3985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly implement the HTML5 Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging initial-origin access after document.domain has been set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3985/">CVE-2012-3985</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3986" ref_url="https://www.suse.com/security/cve/CVE-2012-3986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3986/">CVE-2012-3986</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3988" ref_url="https://www.suse.com/security/cve/CVE-2012-3988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3988/">CVE-2012-3988</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3989" ref_url="https://www.suse.com/security/cve/CVE-2012-3989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly perform a cast of an unspecified variable during use of the instanceof operator on a JavaScript object, which allows remote attackers to execute arbitrary code or cause a denial of service (assertion failure) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-3989/">CVE-2012-3989</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3990" ref_url="https://www.suse.com/security/cve/CVE-2012-3990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3990/">CVE-2012-3990</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3991" ref_url="https://www.suse.com/security/cve/CVE-2012-3991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3991/">CVE-2012-3991</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3992" ref_url="https://www.suse.com/security/cve/CVE-2012-3992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3992/">CVE-2012-3992</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3993" ref_url="https://www.suse.com/security/cve/CVE-2012-3993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3993/">CVE-2012-3993</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3994" ref_url="https://www.suse.com/security/cve/CVE-2012-3994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3994/">CVE-2012-3994</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3995" ref_url="https://www.suse.com/security/cve/CVE-2012-3995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3995/">CVE-2012-3995</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4024" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option).  NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024</cve>
	<bugzilla href="https://bugzilla.suse.com/773015">SUSE bug 773015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141126" comment="squashfs-4.3-6.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4025" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025" source="SUSE CVE"/>
    <description>
    Integer overflow in the queue_init function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted block_log field in the superblock of a .sqsh file, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025</cve>
	<bugzilla href="https://bugzilla.suse.com/773015">SUSE bug 773015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141126" comment="squashfs-4.3-6.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4048" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4048" ref_url="https://www.suse.com/security/cve/CVE-2012-4048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html" source="SUSE-SU"/>
    <description>
    The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4048/">CVE-2012-4048</cve>
	<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4049" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4049" ref_url="https://www.suse.com/security/cve/CVE-2012-4049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4049/">CVE-2012-4049</cve>
	<bugzilla href="https://bugzilla.suse.com/772738">SUSE bug 772738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4179" ref_url="https://www.suse.com/security/cve/CVE-2012-4179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4179/">CVE-2012-4179</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4180" ref_url="https://www.suse.com/security/cve/CVE-2012-4180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4180/">CVE-2012-4180</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4181" ref_url="https://www.suse.com/security/cve/CVE-2012-4181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4181/">CVE-2012-4181</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4182" ref_url="https://www.suse.com/security/cve/CVE-2012-4182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4182/">CVE-2012-4182</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4183" ref_url="https://www.suse.com/security/cve/CVE-2012-4183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4183/">CVE-2012-4183</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4184" ref_url="https://www.suse.com/security/cve/CVE-2012-4184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4184/">CVE-2012-4184</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4185" ref_url="https://www.suse.com/security/cve/CVE-2012-4185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4185/">CVE-2012-4185</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4186" ref_url="https://www.suse.com/security/cve/CVE-2012-4186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4186/">CVE-2012-4186</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4187" ref_url="https://www.suse.com/security/cve/CVE-2012-4187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4187/">CVE-2012-4187</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4188" ref_url="https://www.suse.com/security/cve/CVE-2012-4188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4188/">CVE-2012-4188</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4191" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4191" ref_url="https://www.suse.com/security/cve/CVE-2012-4191" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The mozilla::net::FailDelayManager::Lookup function in the WebSockets implementation in Mozilla Firefox before 16.0.1, Thunderbird before 16.0.1, and SeaMonkey before 2.13.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4191/">CVE-2012-4191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4192" ref_url="https://www.suse.com/security/cve/CVE-2012-4192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox 16.0, Thunderbird 16.0, and SeaMonkey 2.13 allow remote attackers to bypass the Same Origin Policy and read the properties of a Location object via a crafted web site, a related issue to CVE-2012-4193.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4192/">CVE-2012-4192</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4193" ref_url="https://www.suse.com/security/cve/CVE-2012-4193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4193/">CVE-2012-4193</cve>
	<bugzilla href="https://bugzilla.suse.com/783533">SUSE bug 783533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4194" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4194" ref_url="https://www.suse.com/security/cve/CVE-2012-4194" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4194/">CVE-2012-4194</cve>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4195" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4195" ref_url="https://www.suse.com/security/cve/CVE-2012-4195" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4195/">CVE-2012-4195</cve>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4196" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4196" ref_url="https://www.suse.com/security/cve/CVE-2012-4196" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4196/">CVE-2012-4196</cve>
	<bugzilla href="https://bugzilla.suse.com/786522">SUSE bug 786522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4201" ref_url="https://www.suse.com/security/cve/CVE-2012-4201" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4201/">CVE-2012-4201</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4202" ref_url="https://www.suse.com/security/cve/CVE-2012-4202" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4202/">CVE-2012-4202</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4203" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4203" ref_url="https://www.suse.com/security/cve/CVE-2012-4203" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
    <description>
    The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4203/">CVE-2012-4203</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4204" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4204" ref_url="https://www.suse.com/security/cve/CVE-2012-4204" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The str_unescape function in the JavaScript engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4204/">CVE-2012-4204</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4205" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4205" ref_url="https://www.suse.com/security/cve/CVE-2012-4205" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4205/">CVE-2012-4205</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4207" ref_url="https://www.suse.com/security/cve/CVE-2012-4207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4207/">CVE-2012-4207</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4208" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4208" ref_url="https://www.suse.com/security/cve/CVE-2012-4208" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 does not consider the compartment during property filtering, which allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4208/">CVE-2012-4208</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4209" ref_url="https://www.suse.com/security/cve/CVE-2012-4209" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4209/">CVE-2012-4209</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4210" ref_url="https://www.suse.com/security/cve/CVE-2012-4210" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
    <description>
    The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4210/">CVE-2012-4210</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4212" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4212" ref_url="https://www.suse.com/security/cve/CVE-2012-4212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4212/">CVE-2012-4212</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4213" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4213" ref_url="https://www.suse.com/security/cve/CVE-2012-4213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEditor::FindNextLeafNode function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4213/">CVE-2012-4213</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4214" ref_url="https://www.suse.com/security/cve/CVE-2012-4214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-5840.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4214/">CVE-2012-4214</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4215" ref_url="https://www.suse.com/security/cve/CVE-2012-4215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4215/">CVE-2012-4215</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4216" ref_url="https://www.suse.com/security/cve/CVE-2012-4216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4216/">CVE-2012-4216</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4217" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4217" ref_url="https://www.suse.com/security/cve/CVE-2012-4217" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4217/">CVE-2012-4217</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4218" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4218" ref_url="https://www.suse.com/security/cve/CVE-2012-4218" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-4218/">CVE-2012-4218</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4244" ref_url="https://www.suse.com/security/cve/CVE-2012-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4244/">CVE-2012-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/780157">SUSE bug 780157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4285" ref_url="https://www.suse.com/security/cve/CVE-2012-4285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4285/">CVE-2012-4285</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4286" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4286" ref_url="https://www.suse.com/security/cve/CVE-2012-4286" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The pcapng_read_packet_block function in wiretap/pcapng.c in the pcap-ng file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted pcap-ng file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-4286/">CVE-2012-4286</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4287" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4287" ref_url="https://www.suse.com/security/cve/CVE-2012-4287" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-mongo.c in the MongoDB dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a small value for a BSON document length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4287/">CVE-2012-4287</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4288" ref_url="https://www.suse.com/security/cve/CVE-2012-4288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4288/">CVE-2012-4288</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4289" ref_url="https://www.suse.com/security/cve/CVE-2012-4289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4289/">CVE-2012-4289</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4290" ref_url="https://www.suse.com/security/cve/CVE-2012-4290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4290/">CVE-2012-4290</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4291" ref_url="https://www.suse.com/security/cve/CVE-2012-4291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4291/">CVE-2012-4291</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4292" ref_url="https://www.suse.com/security/cve/CVE-2012-4292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4292/">CVE-2012-4292</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4293" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4293" ref_url="https://www.suse.com/security/cve/CVE-2012-4293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4293/">CVE-2012-4293</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4294" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4294" ref_url="https://www.suse.com/security/cve/CVE-2012-4294" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4294/">CVE-2012-4294</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4295" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4295" ref_url="https://www.suse.com/security/cve/CVE-2012-4295" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Array index error in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 might allow remote attackers to cause a denial of service (application crash) via a crafted speed (aka rate) value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4295/">CVE-2012-4295</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4296" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4296" ref_url="https://www.suse.com/security/cve/CVE-2012-4296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-September/000256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4296/">CVE-2012-4296</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4297" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4297" ref_url="https://www.suse.com/security/cve/CVE-2012-4297" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x before 1.6.10 and 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4297/">CVE-2012-4297</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4298" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4298" ref_url="https://www.suse.com/security/cve/CVE-2012-4298" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4298/">CVE-2012-4298</cve>
	<bugzilla href="https://bugzilla.suse.com/776083">SUSE bug 776083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4398" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4398" ref_url="https://www.suse.com/security/cve/CVE-2012-4398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4398/">CVE-2012-4398</cve>
	<bugzilla href="https://bugzilla.suse.com/778463">SUSE bug 778463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779488">SUSE bug 779488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4411" ref_url="https://www.suse.com/security/cve/CVE-2012-4411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor.  NOTE: this might be a duplicate of CVE-2007-0998.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4411/">CVE-2012-4411</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<bugzilla href="https://bugzilla.suse.com/779320">SUSE bug 779320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848783">SUSE bug 848783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920169">SUSE bug 920169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4414</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4414" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4414" ref_url="https://www.suse.com/security/cve/CVE-2012-4414" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html" source="SUSE-SU"/>
    <description>
    Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log.  NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4414/">CVE-2012-4414</cve>
	<bugzilla href="https://bugzilla.suse.com/779476">SUSE bug 779476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4416" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4416" ref_url="https://www.suse.com/security/cve/CVE-2012-4416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4416/">CVE-2012-4416</cve>
	<bugzilla href="https://bugzilla.suse.com/779714">SUSE bug 779714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4425" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4425" ref_url="https://www.suse.com/security/cve/CVE-2012-4425" source="SUSE CVE"/>
    <description>
    libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4425/">CVE-2012-4425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140943" comment="libspice-client-glib-2_0-8-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140944" comment="libspice-client-glib-helper-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140945" comment="libspice-client-gtk-2_0-4-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140946" comment="libspice-client-gtk-3_0-4-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140947" comment="libspice-controller0-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140948" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140949" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4453" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4453" ref_url="https://www.suse.com/security/cve/CVE-2012-4453" source="SUSE CVE"/>
    <description>
    dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other products, creates initramfs images with world-readable permissions, which might allow local users to obtain sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4453/">CVE-2012-4453</cve>
	<bugzilla href="https://bugzilla.suse.com/1008340">SUSE bug 1008340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/782734">SUSE bug 782734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140546" comment="dracut-044-87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140547" comment="dracut-fips-044-87.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4502" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4502" ref_url="https://www.suse.com/security/cve/CVE-2012-4502" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6) RPY_MANUAL_LIST command reply to the PKL_ReplyLength function, which triggers an out-of-bounds read or buffer overflow.  NOTE: versions 1.27 and 1.28 do not require authentication to exploit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4502/">CVE-2012-4502</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140487" comment="chrony-2.3-3.110 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4503" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4503" ref_url="https://www.suse.com/security/cve/CVE-2012-4503" source="SUSE CVE"/>
    <description>
    cmdmon.c in Chrony before 1.29 allows remote attackers to obtain potentially sensitive information from stack memory via vectors related to (1) an invalid subnet in a RPY_SUBNETS_ACCESSED command to the handle_subnets_accessed function or (2) a RPY_CLIENT_ACCESSES command to the handle_client_accesses function when client logging is disabled, which causes uninitialized data to be included in a reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4503/">CVE-2012-4503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140487" comment="chrony-2.3-3.110 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4504" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00065.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<bugzilla href="https://bugzilla.suse.com/784523">SUSE bug 784523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140909" comment="libproxy1-0.4.13-16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140910" comment="libproxy1-32bit-0.4.13-16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140911" comment="libproxy1-config-gnome3-0.4.13-16.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140912" comment="libproxy1-config-gnome3-32bit-0.4.13-16.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140913" comment="libproxy1-networkmanager-0.4.13-16.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140914" comment="libproxy1-pacrunner-webkit-0.4.13-16.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4510" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510" source="SUSE CVE"/>
    <description>
    cups-pk-helper before 0.2.3 does not properly wrap the (1) cupsGetFile and (2) cupsPutFile function calls, which allows user-assisted remote attackers to read or overwrite sensitive files using CUPS resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<bugzilla href="https://bugzilla.suse.com/783488">SUSE bug 783488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140514" comment="cups-pk-helper-0.2.5-3.75 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140515" comment="cups-pk-helper-lang-0.2.5-3.75 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4535" ref_url="https://www.suse.com/security/cve/CVE-2012-4535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4535/">CVE-2012-4535</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4536" ref_url="https://www.suse.com/security/cve/CVE-2012-4536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4536/">CVE-2012-4536</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4537" ref_url="https://www.suse.com/security/cve/CVE-2012-4537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4537/">CVE-2012-4537</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786517">SUSE bug 786517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4538" ref_url="https://www.suse.com/security/cve/CVE-2012-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4538/">CVE-2012-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4539" ref_url="https://www.suse.com/security/cve/CVE-2012-4539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4539/">CVE-2012-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4544" ref_url="https://www.suse.com/security/cve/CVE-2012-4544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1572-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4544/">CVE-2012-4544</cve>
	<bugzilla href="https://bugzilla.suse.com/779212">SUSE bug 779212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786516">SUSE bug 786516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786518">SUSE bug 786518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786519">SUSE bug 786519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/786520">SUSE bug 786520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787163">SUSE bug 787163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0187-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00076.html" source="SUSE-SU"/>
    <description>
    ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<bugzilla href="https://bugzilla.suse.com/781995">SUSE bug 781995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/787892">SUSE bug 787892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791607">SUSE bug 791607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4681" ref_url="https://www.suse.com/security/cve/CVE-2012-4681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-09/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-4681/">CVE-2012-4681</cve>
	<bugzilla href="https://bugzilla.suse.com/777499">SUSE bug 777499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/778629">SUSE bug 778629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/780897">SUSE bug 780897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000289.html" source="SUSE-SU"/>
		<reference ref_id="TID7014254" ref_url="https://www.suse.com/support/kb/doc/?id=7014254" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1420-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0157-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1630-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00005.html" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779952">SUSE bug 779952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793420">SUSE bug 793420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803004">SUSE bug 803004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847895">SUSE bug 847895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141157" comment="w3m-0.5.3-157.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5068" ref_url="https://www.suse.com/security/cve/CVE-2012-5068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5068/">CVE-2012-5068</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5069" ref_url="https://www.suse.com/security/cve/CVE-2012-5069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5069/">CVE-2012-5069</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5070" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5070" ref_url="https://www.suse.com/security/cve/CVE-2012-5070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5070/">CVE-2012-5070</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5071" ref_url="https://www.suse.com/security/cve/CVE-2012-5071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5071/">CVE-2012-5071</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5072" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5072" ref_url="https://www.suse.com/security/cve/CVE-2012-5072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5072/">CVE-2012-5072</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5073" ref_url="https://www.suse.com/security/cve/CVE-2012-5073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5073/">CVE-2012-5073</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5074" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5074" ref_url="https://www.suse.com/security/cve/CVE-2012-5074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality and integrity, related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5074/">CVE-2012-5074</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5075" ref_url="https://www.suse.com/security/cve/CVE-2012-5075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5075/">CVE-2012-5075</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5076" ref_url="https://www.suse.com/security/cve/CVE-2012-5076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5076/">CVE-2012-5076</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5077" ref_url="https://www.suse.com/security/cve/CVE-2012-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5077/">CVE-2012-5077</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5079" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5079" ref_url="https://www.suse.com/security/cve/CVE-2012-5079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5079/">CVE-2012-5079</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5081" ref_url="https://www.suse.com/security/cve/CVE-2012-5081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5081/">CVE-2012-5081</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5084" ref_url="https://www.suse.com/security/cve/CVE-2012-5084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5084/">CVE-2012-5084</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5085" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5085" ref_url="https://www.suse.com/security/cve/CVE-2012-5085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking.  NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5085/">CVE-2012-5085</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5086" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5086" ref_url="https://www.suse.com/security/cve/CVE-2012-5086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5086/">CVE-2012-5086</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5087" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5087" ref_url="https://www.suse.com/security/cve/CVE-2012-5087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5087/">CVE-2012-5087</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5088" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5088" ref_url="https://www.suse.com/security/cve/CVE-2012-5088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5088/">CVE-2012-5088</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5089" ref_url="https://www.suse.com/security/cve/CVE-2012-5089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00024.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5089/">CVE-2012-5089</cve>
	<bugzilla href="https://bugzilla.suse.com/785429">SUSE bug 785429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785433">SUSE bug 785433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/785814">SUSE bug 785814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/788750">SUSE bug 788750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5112" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5112" ref_url="https://www.suse.com/security/cve/CVE-2012-5112" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5112/">CVE-2012-5112</cve>
	<bugzilla href="https://bugzilla.suse.com/786698">SUSE bug 786698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5133" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5133" ref_url="https://www.suse.com/security/cve/CVE-2012-5133" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5133/">CVE-2012-5133</cve>
	<bugzilla href="https://bugzilla.suse.com/791234">SUSE bug 791234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5134" ref_url="https://www.suse.com/security/cve/CVE-2012-5134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5134/">CVE-2012-5134</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/791234">SUSE bug 791234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/793334">SUSE bug 793334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804033">SUSE bug 804033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5166" ref_url="https://www.suse.com/security/cve/CVE-2012-5166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1390-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1390-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5166/">CVE-2012-5166</cve>
	<bugzilla href="https://bugzilla.suse.com/784602">SUSE bug 784602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5237" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5237" ref_url="https://www.suse.com/security/cve/CVE-2012-5237" source="SUSE CVE"/>
    <description>
    The dissect_hsrp function in epan/dissectors/packet-hsrp.c in the HSRP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5237/">CVE-2012-5237</cve>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5238" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5238" ref_url="https://www.suse.com/security/cve/CVE-2012-5238" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.3 uses incorrect OUI data structures during the decoding of (1) PPP and (2) LCP data, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5238/">CVE-2012-5238</cve>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5239" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5239" ref_url="https://www.suse.com/security/cve/CVE-2012-5239" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-3548.  Reason: This candidate is a reservation duplicate of CVE-2012-3548.  Notes: All CVE users should reference CVE-2012-3548 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5239/">CVE-2012-5239</cve>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5240" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5240" ref_url="https://www.suse.com/security/cve/CVE-2012-5240" source="SUSE CVE"/>
    <description>
    Buffer overflow in the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5240/">CVE-2012-5240</cve>
	<bugzilla href="https://bugzilla.suse.com/783275">SUSE bug 783275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5510" ref_url="https://www.suse.com/security/cve/CVE-2012-5510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5510/">CVE-2012-5510</cve>
	<bugzilla href="https://bugzilla.suse.com/789945">SUSE bug 789945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5511" ref_url="https://www.suse.com/security/cve/CVE-2012-5511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5511/">CVE-2012-5511</cve>
	<bugzilla href="https://bugzilla.suse.com/789944">SUSE bug 789944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5513" ref_url="https://www.suse.com/security/cve/CVE-2012-5513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5513/">CVE-2012-5513</cve>
	<bugzilla href="https://bugzilla.suse.com/789951">SUSE bug 789951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5514" ref_url="https://www.suse.com/security/cve/CVE-2012-5514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5514/">CVE-2012-5514</cve>
	<bugzilla href="https://bugzilla.suse.com/789948">SUSE bug 789948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789988">SUSE bug 789988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5515" ref_url="https://www.suse.com/security/cve/CVE-2012-5515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5515/">CVE-2012-5515</cve>
	<bugzilla href="https://bugzilla.suse.com/789950">SUSE bug 789950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html" source="SUSE-SU"/>
    <description>
    CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<bugzilla href="https://bugzilla.suse.com/1180148">SUSE bug 1180148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/789566">SUSE bug 789566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882905">SUSE bug 882905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5525" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5525" ref_url="https://www.suse.com/security/cve/CVE-2012-5525" source="SUSE CVE"/>
    <description>
    The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5525/">CVE-2012-5525</cve>
	<bugzilla href="https://bugzilla.suse.com/789952">SUSE bug 789952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5532" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532" source="SUSE CVE"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532</cve>
	<bugzilla href="https://bugzilla.suse.com/791605">SUSE bug 791605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140682" comment="hyper-v-7-13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5592" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5592" ref_url="https://www.suse.com/security/cve/CVE-2012-5592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6052.  Reason: This candidate is a reservation duplicate of CVE-2012-6052.  Notes: All CVE users should reference CVE-2012-6052 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5592/">CVE-2012-5592</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5593" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5593" ref_url="https://www.suse.com/security/cve/CVE-2012-5593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6053.  Reason: This candidate is a reservation duplicate of CVE-2012-6053.  Notes: All CVE users should reference CVE-2012-6053 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5593/">CVE-2012-5593</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5594" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5594" ref_url="https://www.suse.com/security/cve/CVE-2012-5594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6054.  Reason: This candidate is a reservation duplicate of CVE-2012-6054.  Notes: All CVE users should reference CVE-2012-6054 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5594/">CVE-2012-5594</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5595" ref_url="https://www.suse.com/security/cve/CVE-2012-5595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6056.  Reason: This candidate is a reservation duplicate of CVE-2012-6056.  Notes: All CVE users should reference CVE-2012-6056 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5595/">CVE-2012-5595</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5596" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5596" ref_url="https://www.suse.com/security/cve/CVE-2012-5596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6057.  Reason: This candidate is a reservation duplicate of CVE-2012-6057.  Notes: All CVE users should reference CVE-2012-6057 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5596/">CVE-2012-5596</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5597" ref_url="https://www.suse.com/security/cve/CVE-2012-5597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6059.  Reason: This candidate is a reservation duplicate of CVE-2012-6059.  Notes: All CVE users should reference CVE-2012-6059 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5597/">CVE-2012-5597</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5598" ref_url="https://www.suse.com/security/cve/CVE-2012-5598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6060.  Reason: This candidate is a reservation duplicate of CVE-2012-6060.  Notes: All CVE users should reference CVE-2012-6060 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5598/">CVE-2012-5598</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5599" ref_url="https://www.suse.com/security/cve/CVE-2012-5599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6061.  Reason: This candidate is a reservation duplicate of CVE-2012-6061.  Notes: All CVE users should reference CVE-2012-6061 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5599/">CVE-2012-5599</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5600" ref_url="https://www.suse.com/security/cve/CVE-2012-5600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6062.  Reason: This candidate is a reservation duplicate of CVE-2012-6062.  Notes: All CVE users should reference CVE-2012-6062 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5600/">CVE-2012-5600</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5601" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5601" ref_url="https://www.suse.com/security/cve/CVE-2012-5601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6055.  Reason: This candidate is a reservation duplicate of CVE-2012-6055.  Notes: All CVE users should reference CVE-2012-6055 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5601/">CVE-2012-5601</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5602" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5602" ref_url="https://www.suse.com/security/cve/CVE-2012-5602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1633-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00042.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6058.  Reason: This candidate is a reservation duplicate of CVE-2012-6058.  Notes: All CVE users should reference CVE-2012-6058 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5602/">CVE-2012-5602</cve>
	<bugzilla href="https://bugzilla.suse.com/792005">SUSE bug 792005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5611</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5611" ref_url="https://www.suse.com/security/cve/CVE-2012-5611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0013-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1412-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00010.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5611/">CVE-2012-5611</cve>
	<bugzilla href="https://bugzilla.suse.com/792362">SUSE bug 792362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/792444">SUSE bug 792444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798753">SUSE bug 798753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5612</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5612" ref_url="https://www.suse.com/security/cve/CVE-2012-5612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5612/">CVE-2012-5612</cve>
	<bugzilla href="https://bugzilla.suse.com/792443">SUSE bug 792443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798753">SUSE bug 798753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5615" ref_url="https://www.suse.com/security/cve/CVE-2012-5615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5615/">CVE-2012-5615</cve>
	<bugzilla href="https://bugzilla.suse.com/792440">SUSE bug 792440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5627</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5627" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5627" ref_url="https://www.suse.com/security/cve/CVE-2012-5627" source="SUSE CVE"/>
    <description>
    Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5627/">CVE-2012-5627</cve>
	<bugzilla href="https://bugzilla.suse.com/792679">SUSE bug 792679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5634" ref_url="https://www.suse.com/security/cve/CVE-2012-5634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5634/">CVE-2012-5634</cve>
	<bugzilla href="https://bugzilla.suse.com/794316">SUSE bug 794316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5643" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5643" ref_url="https://www.suse.com/security/cve/CVE-2012-5643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0186-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1436-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1443-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00032.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5643/">CVE-2012-5643</cve>
	<bugzilla href="https://bugzilla.suse.com/794954">SUSE bug 794954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796999">SUSE bug 796999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5668" ref_url="https://www.suse.com/security/cve/CVE-2012-5668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0189-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5668/">CVE-2012-5668</cve>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5669" ref_url="https://www.suse.com/security/cve/CVE-2012-5669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-January/000331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0189-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00078.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5669/">CVE-2012-5669</cve>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5670" ref_url="https://www.suse.com/security/cve/CVE-2012-5670" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0165-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00056.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5670/">CVE-2012-5670</cve>
	<bugzilla href="https://bugzilla.suse.com/795826">SUSE bug 795826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5688" ref_url="https://www.suse.com/security/cve/CVE-2012-5688" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1649-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0666-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00077.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5688/">CVE-2012-5688</cve>
	<bugzilla href="https://bugzilla.suse.com/792926">SUSE bug 792926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5689" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5689" ref_url="https://www.suse.com/security/cve/CVE-2012-5689" source="SUSE CVE"/>
    <description>
    ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5689/">CVE-2012-5689</cve>
	<bugzilla href="https://bugzilla.suse.com/800822">SUSE bug 800822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0622-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00053.html" source="SUSE-SU"/>
    <description>
    Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783</cve>
	<bugzilla href="https://bugzilla.suse.com/1132354">SUSE bug 1132354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803332">SUSE bug 803332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803333">SUSE bug 803333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140452" comment="apache-commons-httpclient-3.1-4.498 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5784" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5784" ref_url="https://www.suse.com/security/cve/CVE-2012-5784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1373-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html" source="SUSE-SU"/>
    <description>
    Apache Axis 1.4 and earlier, as used in PayPal Payments Pro, PayPal Mass Pay, PayPal Transactional Information SOAP, the Java Message Service implementation in Apache ActiveMQ, and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5784/">CVE-2012-5784</cve>
	<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334475" comment="axis is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5829" ref_url="https://www.suse.com/security/cve/CVE-2012-5829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5829/">CVE-2012-5829</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5830" ref_url="https://www.suse.com/security/cve/CVE-2012-5830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5830/">CVE-2012-5830</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5833" ref_url="https://www.suse.com/security/cve/CVE-2012-5833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5833/">CVE-2012-5833</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5835" ref_url="https://www.suse.com/security/cve/CVE-2012-5835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via crafted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5835/">CVE-2012-5835</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5836" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5836" ref_url="https://www.suse.com/security/cve/CVE-2012-5836" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving the setting of Cascading Style Sheets (CSS) properties in conjunction with SVG text.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5836/">CVE-2012-5836</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5837" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5837" ref_url="https://www.suse.com/security/cve/CVE-2012-5837" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web Developer Toolbar in Mozilla Firefox before 17.0 executes script with chrome privileges, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5837/">CVE-2012-5837</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5838" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5838" ref_url="https://www.suse.com/security/cve/CVE-2012-5838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The copyTexImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via large image dimensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5838/">CVE-2012-5838</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5839" ref_url="https://www.suse.com/security/cve/CVE-2012-5839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5839/">CVE-2012-5839</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5840" ref_url="https://www.suse.com/security/cve/CVE-2012-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5840/">CVE-2012-5840</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5841" ref_url="https://www.suse.com/security/cve/CVE-2012-5841" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5841/">CVE-2012-5841</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5842" ref_url="https://www.suse.com/security/cve/CVE-2012-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5842/">CVE-2012-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5843" ref_url="https://www.suse.com/security/cve/CVE-2012-5843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1583-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1584-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1585-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1586-1" ref_url="https://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2012-5843/">CVE-2012-5843</cve>
	<bugzilla href="https://bugzilla.suse.com/790140">SUSE bug 790140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6075" ref_url="https://www.suse.com/security/cve/CVE-2012-6075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6075/">CVE-2012-6075</cve>
	<bugzilla href="https://bugzilla.suse.com/797523">SUSE bug 797523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6093" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6093" ref_url="https://www.suse.com/security/cve/CVE-2012-6093" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0256-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html" source="SUSE-SU"/>
    <description>
    The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6093/">CVE-2012-6093</cve>
	<bugzilla href="https://bugzilla.suse.com/797006">SUSE bug 797006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6094" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6094" ref_url="https://www.suse.com/security/cve/CVE-2012-6094" source="SUSE CVE"/>
    <description>
    cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6094/">CVE-2012-6094</cve>
	<bugzilla href="https://bugzilla.suse.com/795624">SUSE bug 795624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857372">SUSE bug 857372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6150" ref_url="https://www.suse.com/security/cve/CVE-2012-6150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6150/">CVE-2012-6150</cve>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853347">SUSE bug 853347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00071.html" source="SUSE-SU"/>
    <description>
    Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549936" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549937" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547802" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6703</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6703" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6703" ref_url="https://www.suse.com/security/cve/CVE-2012-6703" source="SUSE CVE"/>
    <description>
    Integer overflow in the snd_compr_allocate_buffer function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.6-rc6-next-20120917 allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-6703/">CVE-2012-6703</cve>
	<bugzilla href="https://bugzilla.suse.com/986811">SUSE bug 986811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986941">SUSE bug 986941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6704" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704</cve>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6706" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1658-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
    <description>
    A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<bugzilla href="https://bugzilla.suse.com/1045315">SUSE bug 1045315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045490">SUSE bug 1045490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334655" comment="unrar is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550823" comment="clamav-0.99.4-33.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549409" comment="unrar-5.0.14-3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0151" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0151" ref_url="https://www.suse.com/security/cve/CVE-2013-0151" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings and host OS crash) by leveraging administrative access to an HVM guest in a domain with a large number of VCPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0151/">CVE-2013-0151</cve>
	<bugzilla href="https://bugzilla.suse.com/797285">SUSE bug 797285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0152" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0152" ref_url="https://www.suse.com/security/cve/CVE-2013-0152" source="SUSE CVE"/>
    <description>
    Memory leak in Xen 4.2 and unstable allows local HVM guests to cause a denial of service (host memory consumption) by performing nested virtualization in a way that triggers errors that are not properly handled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0152/">CVE-2013-0152</cve>
	<bugzilla href="https://bugzilla.suse.com/797287">SUSE bug 797287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800798">SUSE bug 800798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0153" ref_url="https://www.suse.com/security/cve/CVE-2013-0153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
    <description>
    The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0153/">CVE-2013-0153</cve>
	<bugzilla href="https://bugzilla.suse.com/800275">SUSE bug 800275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800802">SUSE bug 800802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0157" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0157" ref_url="https://www.suse.com/security/cve/CVE-2013-0157" source="SUSE CVE"/>
    <description>
    (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0157/">CVE-2013-0157</cve>
	<bugzilla href="https://bugzilla.suse.com/797002">SUSE bug 797002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140779" comment="libblkid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140780" comment="libblkid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140781" comment="libfdisk1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140782" comment="libmount1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140783" comment="libmount1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140784" comment="libsmartcols1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140785" comment="libuuid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140786" comment="libuuid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140787" comment="python-libmount-2.28-40.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140788" comment="util-linux-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140789" comment="util-linux-lang-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140790" comment="util-linux-systemd-2.28-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140791" comment="uuidd-2.28-40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0160" ref_url="https://www.suse.com/security/cve/CVE-2013-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0160/">CVE-2013-0160</cve>
	<bugzilla href="https://bugzilla.suse.com/797175">SUSE bug 797175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0166" ref_url="https://www.suse.com/security/cve/CVE-2013-0166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0166/">CVE-2013-0166</cve>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813366">SUSE bug 813366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/833408">SUSE bug 833408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0169" ref_url="https://www.suse.com/security/cve/CVE-2013-0169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0549-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID7017793" ref_url="https://www.suse.com/support/kb/doc/?id=7017793" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0169/">CVE-2013-0169</cve>
	<bugzilla href="https://bugzilla.suse.com/1070148">SUSE bug 1070148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103036">SUSE bug 1103036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103597">SUSE bug 1103597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802648">SUSE bug 802648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802746">SUSE bug 802746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804654">SUSE bug 804654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813366">SUSE bug 813366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821818">SUSE bug 821818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0170" ref_url="https://www.suse.com/security/cve/CVE-2013-0170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0170/">CVE-2013-0170</cve>
	<bugzilla href="https://bugzilla.suse.com/800976">SUSE bug 800976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0172" ref_url="https://www.suse.com/security/cve/CVE-2013-0172" source="SUSE CVE"/>
    <description>
    Samba 4.0.x before 4.0.1, in certain Active Directory domain-controller configurations, does not properly interpret Access Control Entries that are based on an objectClass, which allows remote authenticated users to bypass intended restrictions on modifying LDAP directory objects by leveraging (1) objectClass access by a user, (2) objectClass access by a group, or (3) write access to an attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0172/">CVE-2013-0172</cve>
	<bugzilla href="https://bugzilla.suse.com/798364">SUSE bug 798364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0179</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0179" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0179" ref_url="https://www.suse.com/security/cve/CVE-2013-0179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0867-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0951-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00041.html" source="SUSE-SU"/>
    <description>
    The process_bin_delete function in memcached.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0179/">CVE-2013-0179</cve>
	<bugzilla href="https://bugzilla.suse.com/798458">SUSE bug 798458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0211" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001328.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0568-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<bugzilla href="https://bugzilla.suse.com/800024">SUSE bug 800024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979005">SUSE bug 979005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0213" ref_url="https://www.suse.com/security/cve/CVE-2013-0213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0281-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0213/">CVE-2013-0213</cve>
	<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800982">SUSE bug 800982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0214" ref_url="https://www.suse.com/security/cve/CVE-2013-0214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0281-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html" source="SUSE-SU"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0214/">CVE-2013-0214</cve>
	<bugzilla href="https://bugzilla.suse.com/799641">SUSE bug 799641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0219" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0219" ref_url="https://www.suse.com/security/cve/CVE-2013-0219" source="SUSE CVE"/>
    <description>
    System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0219/">CVE-2013-0219</cve>
	<bugzilla href="https://bugzilla.suse.com/801036">SUSE bug 801036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0220" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0220" ref_url="https://www.suse.com/security/cve/CVE-2013-0220" source="SUSE CVE"/>
    <description>
    The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/autofs/autofssrv_cmd.c and the (3) ssh_cmd_parse_request function in responder/ssh/sshsrv_cmd.c in System Security Services Daemon (SSSD) before 1.9.4 allow remote attackers to cause a denial of service (out-of-bounds read, crash, and restart) via a crafted SSSD packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0220/">CVE-2013-0220</cve>
	<bugzilla href="https://bugzilla.suse.com/801036">SUSE bug 801036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00032.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00032.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0930-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00032.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0231" ref_url="https://www.suse.com/security/cve/CVE-2013-0231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0231/">CVE-2013-0231</cve>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0240" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0240" ref_url="https://www.suse.com/security/cve/CVE-2013-0240" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0301-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00046.html" source="SUSE-SU"/>
    <description>
    Gnome Online Accounts (GOA) 3.4.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.5, does not properly validate SSL certificates when creating accounts such as Windows Live and Facebook accounts, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0240/">CVE-2013-0240</cve>
	<bugzilla href="https://bugzilla.suse.com/802409">SUSE bug 802409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808534">SUSE bug 808534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140636" comment="libgoa-1_0-0-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140637" comment="libgoa-backend-1_0-1-3.20.4-7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<bugzilla href="https://bugzilla.suse.com/801246">SUSE bug 801246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848783">SUSE bug 848783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0249" ref_url="https://www.suse.com/security/cve/CVE-2013-0249" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0249/">CVE-2013-0249</cve>
	<bugzilla href="https://bugzilla.suse.com/802411">SUSE bug 802411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0254" ref_url="https://www.suse.com/security/cve/CVE-2013-0254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0403-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0411-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00019.html" source="SUSE-SU"/>
    <description>
    The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0254/">CVE-2013-0254</cve>
	<bugzilla href="https://bugzilla.suse.com/802634">SUSE bug 802634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0255" ref_url="https://www.suse.com/security/cve/CVE-2013-0255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000395.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00060.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0255/">CVE-2013-0255</cve>
	<bugzilla href="https://bugzilla.suse.com/802679">SUSE bug 802679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803057">SUSE bug 803057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0262</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0262" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0262" ref_url="https://www.suse.com/security/cve/CVE-2013-0262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0338-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0462-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" source="SUSE-SU"/>
    <description>
    rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0262/">CVE-2013-0262</cve>
	<bugzilla href="https://bugzilla.suse.com/802795">SUSE bug 802795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334695" comment="rubygem-rack is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0263</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0263" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0263" ref_url="https://www.suse.com/security/cve/CVE-2013-0263" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0338-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0462-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html" source="SUSE-SU"/>
    <description>
    Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0263/">CVE-2013-0263</cve>
	<bugzilla href="https://bugzilla.suse.com/802794">SUSE bug 802794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809839">SUSE bug 809839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334695" comment="rubygem-rack is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0287" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0287" ref_url="https://www.suse.com/security/cve/CVE-2013-0287" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0559-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00115.html" source="SUSE-SU"/>
    <description>
    The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0287/">CVE-2013-0287</cve>
	<bugzilla href="https://bugzilla.suse.com/809153">SUSE bug 809153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140848" comment="libipa_hbac0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140849" comment="libsss_idmap0-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140850" comment="libsss_sudo-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140851" comment="python-sssd-config-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140852" comment="sssd-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140853" comment="sssd-32bit-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140854" comment="sssd-ad-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140855" comment="sssd-ipa-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140856" comment="sssd-krb5-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140857" comment="sssd-krb5-common-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140858" comment="sssd-ldap-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140859" comment="sssd-proxy-1.13.4-18.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140860" comment="sssd-tools-1.13.4-18.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0292" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292" source="SUSE CVE"/>
    <description>
    The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<bugzilla href="https://bugzilla.suse.com/792095">SUSE bug 792095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804392">SUSE bug 804392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140539" comment="dbus-1-glib-0.100.2-3.58 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140540" comment="dbus-1-glib-32bit-0.100.2-3.58 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0326</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0326" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0326" ref_url="https://www.suse.com/security/cve/CVE-2013-0326" source="SUSE CVE"/>
    <description>
    OpenStack nova base images permissions are world readable
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0326/">CVE-2013-0326</cve>
	<bugzilla href="https://bugzilla.suse.com/837817">SUSE bug 837817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334438" comment="openstack-nova is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0338" ref_url="https://www.suse.com/security/cve/CVE-2013-0338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0552-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0555-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00114.html" source="SUSE-SU"/>
    <description>
    libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0338/">CVE-2013-0338</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/805233">SUSE bug 805233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0401" ref_url="https://www.suse.com/security/cve/CVE-2013-0401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0401/">CVE-2013-0401</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0422" ref_url="https://www.suse.com/security/cve/CVE-2013-0422" source="SUSE CVE"/>
		<reference ref_id="TID7011765" ref_url="https://www.suse.com/support/kb/doc/?id=7011765" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021874" ref_url="https://www.suse.com/support/kb/doc/?id=7021874" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114.  CVE-2013-0422 covers both the JMX/MBean and Reflection API issues.  NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks.  NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11.  If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0422/">CVE-2013-0422</cve>
	<bugzilla href="https://bugzilla.suse.com/798324">SUSE bug 798324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798521">SUSE bug 798521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0424" ref_url="https://www.suse.com/security/cve/CVE-2013-0424" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0424/">CVE-2013-0424</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0425" ref_url="https://www.suse.com/security/cve/CVE-2013-0425" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0425/">CVE-2013-0425</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0426" ref_url="https://www.suse.com/security/cve/CVE-2013-0426" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0426/">CVE-2013-0426</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0427" ref_url="https://www.suse.com/security/cve/CVE-2013-0427" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0427/">CVE-2013-0427</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0428" ref_url="https://www.suse.com/security/cve/CVE-2013-0428" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "incorrect checks for proxy classes" in the Reflection API.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0428/">CVE-2013-0428</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0429" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0429" ref_url="https://www.suse.com/security/cve/CVE-2013-0429" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0429/">CVE-2013-0429</cve>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0431" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0431" ref_url="https://www.suse.com/security/cve/CVE-2013-0431" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0431/">CVE-2013-0431</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0432" ref_url="https://www.suse.com/security/cve/CVE-2013-0432" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient clipboard access premission checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0432/">CVE-2013-0432</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0433" ref_url="https://www.suse.com/security/cve/CVE-2013-0433" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0433/">CVE-2013-0433</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0434" ref_url="https://www.suse.com/security/cve/CVE-2013-0434" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0434/">CVE-2013-0434</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0435" ref_url="https://www.suse.com/security/cve/CVE-2013-0435" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0435/">CVE-2013-0435</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0440" ref_url="https://www.suse.com/security/cve/CVE-2013-0440" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU.  Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0440/">CVE-2013-0440</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0441" ref_url="https://www.suse.com/security/cve/CVE-2013-0441" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka "missing serialization restriction."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0441/">CVE-2013-0441</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0442" ref_url="https://www.suse.com/security/cve/CVE-2013-0442" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0442/">CVE-2013-0442</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0443" ref_url="https://www.suse.com/security/cve/CVE-2013-0443" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a "small subgroup attack" to force the use of weak session keys or obtain sensitive information about the private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0443/">CVE-2013-0443</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0444" ref_url="https://www.suse.com/security/cve/CVE-2013-0444" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient checks for cached results" by the Java Beans MethodFinder, which might allow attackers to access methods that should only be accessible to privileged code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0444/">CVE-2013-0444</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0450" ref_url="https://www.suse.com/security/cve/CVE-2013-0450" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of "access control context" in the JMX RequiredModelMBean class.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0450/">CVE-2013-0450</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0454" ref_url="https://www.suse.com/security/cve/CVE-2013-0454" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0933-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00070.html" source="SUSE-SU"/>
    <description>
    The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or "hide unreadable" parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0454/">CVE-2013-0454</cve>
	<bugzilla href="https://bugzilla.suse.com/811975">SUSE bug 811975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0743" ref_url="https://www.suse.com/security/cve/CVE-2013-0743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team.  The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE.  Compromised or unauthorized SSL certificates are not within CVE's scope.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0743/">CVE-2013-0743</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0744" ref_url="https://www.suse.com/security/cve/CVE-2013-0744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0744/">CVE-2013-0744</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0745" ref_url="https://www.suse.com/security/cve/CVE-2013-0745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The AutoWrapperChanger class in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly interact with garbage collection, which allows remote attackers to execute arbitrary code via a crafted HTML document referencing JavaScript objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0745/">CVE-2013-0745</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0746" ref_url="https://www.suse.com/security/cve/CVE-2013-0746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0746/">CVE-2013-0746</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0747" ref_url="https://www.suse.com/security/cve/CVE-2013-0747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0747/">CVE-2013-0747</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0748" ref_url="https://www.suse.com/security/cve/CVE-2013-0748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0748/">CVE-2013-0748</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0749" ref_url="https://www.suse.com/security/cve/CVE-2013-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0749/">CVE-2013-0749</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0750" ref_url="https://www.suse.com/security/cve/CVE-2013-0750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0750/">CVE-2013-0750</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0751" ref_url="https://www.suse.com/security/cve/CVE-2013-0751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0 on Android and SeaMonkey before 2.15 do not restrict a touch event to a single IFRAME element, which allows remote attackers to obtain sensitive information or possibly conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0751/">CVE-2013-0751</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0752" ref_url="https://www.suse.com/security/cve/CVE-2013-0752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XBL file with multiple bindings that have SVG content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0752/">CVE-2013-0752</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0753" ref_url="https://www.suse.com/security/cve/CVE-2013-0753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0753/">CVE-2013-0753</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0754" ref_url="https://www.suse.com/security/cve/CVE-2013-0754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0754/">CVE-2013-0754</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0755" ref_url="https://www.suse.com/security/cve/CVE-2013-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozVibrate implementation in the Vibrate library in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors related to the domDoc pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0755/">CVE-2013-0755</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0756" ref_url="https://www.suse.com/security/cve/CVE-2013-0756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0756/">CVE-2013-0756</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0757" ref_url="https://www.suse.com/security/cve/CVE-2013-0757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0757/">CVE-2013-0757</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0758" ref_url="https://www.suse.com/security/cve/CVE-2013-0758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0758/">CVE-2013-0758</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0760" ref_url="https://www.suse.com/security/cve/CVE-2013-0760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the CharDistributionAnalysis::HandleOneChar function in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0760/">CVE-2013-0760</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0761" ref_url="https://www.suse.com/security/cve/CVE-2013-0761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::TrackUnionStream::EndTrack implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0761/">CVE-2013-0761</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0762" ref_url="https://www.suse.com/security/cve/CVE-2013-0762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0762/">CVE-2013-0762</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0763" ref_url="https://www.suse.com/security/cve/CVE-2013-0763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0763/">CVE-2013-0763</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0764" ref_url="https://www.suse.com/security/cve/CVE-2013-0764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0764/">CVE-2013-0764</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0765" ref_url="https://www.suse.com/security/cve/CVE-2013-0765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 do not prevent multiple wrapping of WebIDL objects, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0765/">CVE-2013-0765</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0766" ref_url="https://www.suse.com/security/cve/CVE-2013-0766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0766/">CVE-2013-0766</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0767" ref_url="https://www.suse.com/security/cve/CVE-2013-0767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0767/">CVE-2013-0767</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0768" ref_url="https://www.suse.com/security/cve/CVE-2013-0768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0768/">CVE-2013-0768</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0769" ref_url="https://www.suse.com/security/cve/CVE-2013-0769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0769/">CVE-2013-0769</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0770" ref_url="https://www.suse.com/security/cve/CVE-2013-0770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0770/">CVE-2013-0770</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0771" ref_url="https://www.suse.com/security/cve/CVE-2013-0771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the gfxTextRun::ShrinkToLigatureBoundaries function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0771/">CVE-2013-0771</cve>
	<bugzilla href="https://bugzilla.suse.com/796895">SUSE bug 796895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0772" ref_url="https://www.suse.com/security/cve/CVE-2013-0772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0772/">CVE-2013-0772</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0773" ref_url="https://www.suse.com/security/cve/CVE-2013-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) and System Only Wrapper (SOW) implementations in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent modifications to a prototype, which allows remote attackers to obtain sensitive information from chrome objects or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0773/">CVE-2013-0773</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0774" ref_url="https://www.suse.com/security/cve/CVE-2013-0774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent JavaScript workers from reading the browser-profile directory name, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0774/">CVE-2013-0774</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0775" ref_url="https://www.suse.com/security/cve/CVE-2013-0775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via crafted web script.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0775/">CVE-2013-0775</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0776" ref_url="https://www.suse.com/security/cve/CVE-2013-0776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0776/">CVE-2013-0776</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0777" ref_url="https://www.suse.com/security/cve/CVE-2013-0777" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsDisplayBoxShadowOuter::Paint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0777/">CVE-2013-0777</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0778" ref_url="https://www.suse.com/security/cve/CVE-2013-0778" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    The ClusterIterator::NextCluster function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0778/">CVE-2013-0778</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0779" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0779" ref_url="https://www.suse.com/security/cve/CVE-2013-0779" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    The nsCodingStateMachine::NextState function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0779/">CVE-2013-0779</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0780" ref_url="https://www.suse.com/security/cve/CVE-2013-0780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0780/">CVE-2013-0780</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0781" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0781" ref_url="https://www.suse.com/security/cve/CVE-2013-0781" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsPrintEngine::CommonPrint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0781/">CVE-2013-0781</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0782" ref_url="https://www.suse.com/security/cve/CVE-2013-0782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0782/">CVE-2013-0782</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0783" ref_url="https://www.suse.com/security/cve/CVE-2013-0783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0783/">CVE-2013-0783</cve>
	<bugzilla href="https://bugzilla.suse.com/804248">SUSE bug 804248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0787" ref_url="https://www.suse.com/security/cve/CVE-2013-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0465-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0466-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0467-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0787/">CVE-2013-0787</cve>
	<bugzilla href="https://bugzilla.suse.com/808243">SUSE bug 808243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0788" ref_url="https://www.suse.com/security/cve/CVE-2013-0788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0788/">CVE-2013-0788</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0789" ref_url="https://www.suse.com/security/cve/CVE-2013-0789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0789/">CVE-2013-0789</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0791" ref_url="https://www.suse.com/security/cve/CVE-2013-0791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0791/">CVE-2013-0791</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0792" ref_url="https://www.suse.com/security/cve/CVE-2013-0792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0792/">CVE-2013-0792</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0793" ref_url="https://www.suse.com/security/cve/CVE-2013-0793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0793/">CVE-2013-0793</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0794" ref_url="https://www.suse.com/security/cve/CVE-2013-0794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17 do not prevent origin spoofing of tab-modal dialogs, which allows remote attackers to conduct phishing attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0794/">CVE-2013-0794</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0795" ref_url="https://www.suse.com/security/cve/CVE-2013-0795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0795/">CVE-2013-0795</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0796" ref_url="https://www.suse.com/security/cve/CVE-2013-0796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0796/">CVE-2013-0796</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0800" ref_url="https://www.suse.com/security/cve/CVE-2013-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-0800/">CVE-2013-0800</cve>
	<bugzilla href="https://bugzilla.suse.com/813026">SUSE bug 813026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0801" ref_url="https://www.suse.com/security/cve/CVE-2013-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-0801/">CVE-2013-0801</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0809" ref_url="https://www.suse.com/security/cve/CVE-2013-0809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00078.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0809/">CVE-2013-0809</cve>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807487">SUSE bug 807487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809386">SUSE bug 809386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913</cve>
	<bugzilla href="https://bugzilla.suse.com/808829">SUSE bug 808829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1415" ref_url="https://www.suse.com/security/cve/CVE-2013-1415" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0523-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00090.html" source="SUSE-SU"/>
    <description>
    The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1415/">CVE-2013-1415</cve>
	<bugzilla href="https://bugzilla.suse.com/806715">SUSE bug 806715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1416" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1416" ref_url="https://www.suse.com/security/cve/CVE-2013-1416" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0746-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0904-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0967-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html" source="SUSE-SU"/>
    <description>
    The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1416/">CVE-2013-1416</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816413">SUSE bug 816413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1417" ref_url="https://www.suse.com/security/cve/CVE-2013-1417" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00026.html" source="SUSE-SU"/>
    <description>
    do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 before 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-realm referral for a host-based service principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1417/">CVE-2013-1417</cve>
	<bugzilla href="https://bugzilla.suse.com/850660">SUSE bug 850660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879587">SUSE bug 879587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1418" ref_url="https://www.suse.com/security/cve/CVE-2013-1418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1751-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00026.html" source="SUSE-SU"/>
    <description>
    The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1418/">CVE-2013-1418</cve>
	<bugzilla href="https://bugzilla.suse.com/849240">SUSE bug 849240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866059">SUSE bug 866059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879587">SUSE bug 879587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1430" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1430" ref_url="https://www.suse.com/security/cve/CVE-2013-1430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005721.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xrdp before 0.9.1. When successfully logging in using RDP into an xrdp session, the file ~/.vnc/sesman_${username}_passwd is created. Its content is the equivalent of the user's cleartext password, DES encrypted with a known key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-1430/">CVE-2013-1430</cve>
	<bugzilla href="https://bugzilla.suse.com/1015567">SUSE bug 1015567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/442182">SUSE bug 442182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334476" comment="xrdp is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551188" comment="xrdp-0.9.0~git.1456906198.f422461-16.9.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595016" comment="xrdp-0.9.0~git.1456906198.f422461-16.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1442" ref_url="https://www.suse.com/security/cve/CVE-2013-1442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1442/">CVE-2013-1442</cve>
	<bugzilla href="https://bugzilla.suse.com/839596">SUSE bug 839596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1475" ref_url="https://www.suse.com/security/cve/CVE-2013-1475" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "IIOP type reuse management" in ObjectStreamClass.java.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1475/">CVE-2013-1475</cve>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1476" ref_url="https://www.suse.com/security/cve/CVE-2013-1476" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via "certain value handler constructors."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1476/">CVE-2013-1476</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1478" ref_url="https://www.suse.com/security/cve/CVE-2013-1478" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" that can trigger an integer overflow and memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1478/">CVE-2013-1478</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1480" ref_url="https://www.suse.com/security/cve/CVE-2013-1480" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" in awt_parseImage.c, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1480/">CVE-2013-1480</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801972">SUSE bug 801972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1484" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1484" ref_url="https://www.suse.com/security/cve/CVE-2013-1484" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1484/">CVE-2013-1484</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1485" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1485" ref_url="https://www.suse.com/security/cve/CVE-2013-1485" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1485/">CVE-2013-1485</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1486" ref_url="https://www.suse.com/security/cve/CVE-2013-1486" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1486/">CVE-2013-1486</cve>
	<bugzilla href="https://bugzilla.suse.com/798535">SUSE bug 798535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/803379">SUSE bug 803379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804654">SUSE bug 804654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1488" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1488" ref_url="https://www.suse.com/security/cve/CVE-2013-1488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1488/">CVE-2013-1488</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1493" ref_url="https://www.suse.com/security/cve/CVE-2013-1493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0430-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00078.html" source="SUSE-SU"/>
    <description>
    The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1493/">CVE-2013-1493</cve>
	<bugzilla href="https://bugzilla.suse.com/806786">SUSE bug 806786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807487">SUSE bug 807487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/809386">SUSE bug 809386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813939">SUSE bug 813939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1500" ref_url="https://www.suse.com/security/cve/CVE-2013-1500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1500/">CVE-2013-1500</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1518" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1518" ref_url="https://www.suse.com/security/cve/CVE-2013-1518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1518/">CVE-2013-1518</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1537" ref_url="https://www.suse.com/security/cve/CVE-2013-1537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1537/">CVE-2013-1537</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1557" ref_url="https://www.suse.com/security/cve/CVE-2013-1557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1557/">CVE-2013-1557</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1569" ref_url="https://www.suse.com/security/cve/CVE-2013-1569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1569/">CVE-2013-1569</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1571" ref_url="https://www.suse.com/security/cve/CVE-2013-1571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1571/">CVE-2013-1571</cve>
	<bugzilla href="https://bugzilla.suse.com/824397">SUSE bug 824397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140447" comment="ant-1.9.4-1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1572" ref_url="https://www.suse.com/security/cve/CVE-2013-1572" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1572/">CVE-2013-1572</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1573" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1573" ref_url="https://www.suse.com/security/cve/CVE-2013-1573" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1573/">CVE-2013-1573</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1574" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1574" ref_url="https://www.suse.com/security/cve/CVE-2013-1574" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1574/">CVE-2013-1574</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1575" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1575" ref_url="https://www.suse.com/security/cve/CVE-2013-1575" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1575/">CVE-2013-1575</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1576" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1576" ref_url="https://www.suse.com/security/cve/CVE-2013-1576" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1576/">CVE-2013-1576</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1577" ref_url="https://www.suse.com/security/cve/CVE-2013-1577" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1577/">CVE-2013-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1578" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1578" ref_url="https://www.suse.com/security/cve/CVE-2013-1578" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1578/">CVE-2013-1578</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1579" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1579" ref_url="https://www.suse.com/security/cve/CVE-2013-1579" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1579/">CVE-2013-1579</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1580" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1580" ref_url="https://www.suse.com/security/cve/CVE-2013-1580" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1580/">CVE-2013-1580</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1581" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1581" ref_url="https://www.suse.com/security/cve/CVE-2013-1581" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1581/">CVE-2013-1581</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1582" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1582" ref_url="https://www.suse.com/security/cve/CVE-2013-1582" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1582/">CVE-2013-1582</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1583" ref_url="https://www.suse.com/security/cve/CVE-2013-1583" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1583/">CVE-2013-1583</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1584" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1584" ref_url="https://www.suse.com/security/cve/CVE-2013-1584" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1584/">CVE-2013-1584</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1585" ref_url="https://www.suse.com/security/cve/CVE-2013-1585" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1585/">CVE-2013-1585</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1586" ref_url="https://www.suse.com/security/cve/CVE-2013-1586" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1586/">CVE-2013-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1587" ref_url="https://www.suse.com/security/cve/CVE-2013-1587" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1587/">CVE-2013-1587</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1588" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1588" ref_url="https://www.suse.com/security/cve/CVE-2013-1588" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1588/">CVE-2013-1588</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1589" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1589" ref_url="https://www.suse.com/security/cve/CVE-2013-1589" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1589/">CVE-2013-1589</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1590" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1590" ref_url="https://www.suse.com/security/cve/CVE-2013-1590" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0285-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1590/">CVE-2013-1590</cve>
	<bugzilla href="https://bugzilla.suse.com/801131">SUSE bug 801131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1620" ref_url="https://www.suse.com/security/cve/CVE-2013-1620" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1620/">CVE-2013-1620</cve>
	<bugzilla href="https://bugzilla.suse.com/802184">SUSE bug 802184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1667" ref_url="https://www.suse.com/security/cve/CVE-2013-1667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0441-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1667/">CVE-2013-1667</cve>
	<bugzilla href="https://bugzilla.suse.com/804415">SUSE bug 804415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140460" comment="apache2-mod_perl-2.0.8-11.43 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1669" ref_url="https://www.suse.com/security/cve/CVE-2013-1669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1669/">CVE-2013-1669</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1670" ref_url="https://www.suse.com/security/cve/CVE-2013-1670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1670/">CVE-2013-1670</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1671" ref_url="https://www.suse.com/security/cve/CVE-2013-1671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 21.0 does not properly implement the INPUT element, which allows remote attackers to obtain the full pathname via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1671/">CVE-2013-1671</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1674" ref_url="https://www.suse.com/security/cve/CVE-2013-1674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code via vectors involving an onresize event during the playing of a video.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1674/">CVE-2013-1674</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1675" ref_url="https://www.suse.com/security/cve/CVE-2013-1675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1675/">CVE-2013-1675</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1676" ref_url="https://www.suse.com/security/cve/CVE-2013-1676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SelectionIterator::GetNextSegment function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1676/">CVE-2013-1676</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1677" ref_url="https://www.suse.com/security/cve/CVE-2013-1677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The gfxSkipCharsIterator::SetOffsets function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1677/">CVE-2013-1677</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1678" ref_url="https://www.suse.com/security/cve/CVE-2013-1678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The _cairo_xlib_surface_add_glyph function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1678/">CVE-2013-1678</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1679" ref_url="https://www.suse.com/security/cve/CVE-2013-1679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::plugins::child::_geturlnotify function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1679/">CVE-2013-1679</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1680" ref_url="https://www.suse.com/security/cve/CVE-2013-1680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1680/">CVE-2013-1680</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1681" ref_url="https://www.suse.com/security/cve/CVE-2013-1681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0896-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::RemoveScriptBlocker function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1681/">CVE-2013-1681</cve>
	<bugzilla href="https://bugzilla.suse.com/819204">SUSE bug 819204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1682" ref_url="https://www.suse.com/security/cve/CVE-2013-1682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1682/">CVE-2013-1682</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1683" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1683" ref_url="https://www.suse.com/security/cve/CVE-2013-1683" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1683/">CVE-2013-1683</cve>
	<bugzilla href="https://bugzilla.suse.com/1150035">SUSE bug 1150035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1684" ref_url="https://www.suse.com/security/cve/CVE-2013-1684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1684/">CVE-2013-1684</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1685" ref_url="https://www.suse.com/security/cve/CVE-2013-1685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1685/">CVE-2013-1685</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1686" ref_url="https://www.suse.com/security/cve/CVE-2013-1686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1686/">CVE-2013-1686</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1687" ref_url="https://www.suse.com/security/cve/CVE-2013-1687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1687/">CVE-2013-1687</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1688" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1688" ref_url="https://www.suse.com/security/cve/CVE-2013-1688" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    The Profiler implementation in Mozilla Firefox before 22.0 parses untrusted data during UI rendering, which allows user-assisted remote attackers to execute arbitrary JavaScript code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1688/">CVE-2013-1688</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1690" ref_url="https://www.suse.com/security/cve/CVE-2013-1690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1690/">CVE-2013-1690</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1692" ref_url="https://www.suse.com/security/cve/CVE-2013-1692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1692/">CVE-2013-1692</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1693" ref_url="https://www.suse.com/security/cve/CVE-2013-1693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1693/">CVE-2013-1693</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1694" ref_url="https://www.suse.com/security/cve/CVE-2013-1694" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The PreserveWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly handle the lack of a wrapper, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by leveraging unintended clearing of the wrapper cache's preserved-wrapper flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1694/">CVE-2013-1694</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1695" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1695" ref_url="https://www.suse.com/security/cve/CVE-2013-1695" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0 does not properly implement certain DocShell inheritance behavior for the sandbox attribute of an IFRAME element, which allows remote attackers to bypass intended access restrictions via a FRAME element within an IFRAME element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1695/">CVE-2013-1695</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1696" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1696" ref_url="https://www.suse.com/security/cve/CVE-2013-1696" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 22.0 does not properly enforce the X-Frame-Options protection mechanism, which allows remote attackers to conduct clickjacking attacks via a crafted web site that uses the HTTP server push feature with multipart responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1696/">CVE-2013-1696</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1697" ref_url="https://www.suse.com/security/cve/CVE-2013-1697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1697/">CVE-2013-1697</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1698" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1698" ref_url="https://www.suse.com/security/cve/CVE-2013-1698" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1698/">CVE-2013-1698</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1699" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1699" ref_url="https://www.suse.com/security/cve/CVE-2013-1699" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00041.html" source="SUSE-SU"/>
    <description>
    The Internationalized Domain Name (IDN) display algorithm in Mozilla Firefox before 22.0 does not properly handle the .com, .name, and .net top-level domains, which allows remote attackers to spoof the address bar via unspecified homograph characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1699/">CVE-2013-1699</cve>
	<bugzilla href="https://bugzilla.suse.com/825935">SUSE bug 825935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1701" ref_url="https://www.suse.com/security/cve/CVE-2013-1701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1701/">CVE-2013-1701</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1702" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1702" ref_url="https://www.suse.com/security/cve/CVE-2013-1702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1702/">CVE-2013-1702</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1704" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1704" ref_url="https://www.suse.com/security/cve/CVE-2013-1704" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1704/">CVE-2013-1704</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1705" ref_url="https://www.suse.com/security/cve/CVE-2013-1705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1705/">CVE-2013-1705</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1708" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1708" ref_url="https://www.suse.com/security/cve/CVE-2013-1708" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1708/">CVE-2013-1708</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1709" ref_url="https://www.suse.com/security/cve/CVE-2013-1709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1709/">CVE-2013-1709</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1710" ref_url="https://www.suse.com/security/cve/CVE-2013-1710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1710/">CVE-2013-1710</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1711" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1711" ref_url="https://www.suse.com/security/cve/CVE-2013-1711" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 does not properly address the possibility of an XBL scope bypass resulting from non-native arguments in XBL function calls, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging access to an unprivileged object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1711/">CVE-2013-1711</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1713" ref_url="https://www.suse.com/security/cve/CVE-2013-1713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1713/">CVE-2013-1713</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1714" ref_url="https://www.suse.com/security/cve/CVE-2013-1714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1714/">CVE-2013-1714</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1717" ref_url="https://www.suse.com/security/cve/CVE-2013-1717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1717/">CVE-2013-1717</cve>
	<bugzilla href="https://bugzilla.suse.com/833389">SUSE bug 833389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1718" ref_url="https://www.suse.com/security/cve/CVE-2013-1718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1718/">CVE-2013-1718</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1719" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1719" ref_url="https://www.suse.com/security/cve/CVE-2013-1719" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1719/">CVE-2013-1719</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1720" ref_url="https://www.suse.com/security/cve/CVE-2013-1720" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsHtml5TreeBuilder::resetTheInsertionMode function in the HTML5 Tree Builder in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 does not properly maintain the state of the insertion-mode stack for template elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer over-read) by triggering use of this stack in its empty state.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1720/">CVE-2013-1720</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1721" ref_url="https://www.suse.com/security/cve/CVE-2013-1721" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the drawLineLoop function in the libGLESv2 library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 24.0 and SeaMonkey before 2.21, allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1721/">CVE-2013-1721</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1722" ref_url="https://www.suse.com/security/cve/CVE-2013-1722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1722/">CVE-2013-1722</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1723" ref_url="https://www.suse.com/security/cve/CVE-2013-1723" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The NativeKey widget in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 processes key messages after destruction by a dispatched event listener, which allows remote attackers to cause a denial of service (application crash) by leveraging incorrect event usage after widget-memory reallocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1723/">CVE-2013-1723</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1724" ref_url="https://www.suse.com/security/cve/CVE-2013-1724" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1724/">CVE-2013-1724</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1725" ref_url="https://www.suse.com/security/cve/CVE-2013-1725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not ensure that initialization occurs for JavaScript objects with compartments, which allows remote attackers to execute arbitrary code by leveraging incorrect scope handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1725/">CVE-2013-1725</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1728" ref_url="https://www.suse.com/security/cve/CVE-2013-1728" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1728/">CVE-2013-1728</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1730" ref_url="https://www.suse.com/security/cve/CVE-2013-1730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1730/">CVE-2013-1730</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1732" ref_url="https://www.suse.com/security/cve/CVE-2013-1732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1732/">CVE-2013-1732</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1735" ref_url="https://www.suse.com/security/cve/CVE-2013-1735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1735/">CVE-2013-1735</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1736" ref_url="https://www.suse.com/security/cve/CVE-2013-1736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-1736/">CVE-2013-1736</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1737" ref_url="https://www.suse.com/security/cve/CVE-2013-1737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1737/">CVE-2013-1737</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1738" ref_url="https://www.suse.com/security/cve/CVE-2013-1738" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1491-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1493-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the JS_GetGlobalForScopeChain function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code by leveraging incorrect garbage collection in situations involving default compartments and frame-chain restoration.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1738/">CVE-2013-1738</cve>
	<bugzilla href="https://bugzilla.suse.com/840485">SUSE bug 840485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1739" ref_url="https://www.suse.com/security/cve/CVE-2013-1739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1539-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1739/">CVE-2013-1739</cve>
	<bugzilla href="https://bugzilla.suse.com/842979">SUSE bug 842979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1740" ref_url="https://www.suse.com/security/cve/CVE-2013-1740" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1740/">CVE-2013-1740</cve>
	<bugzilla href="https://bugzilla.suse.com/859055">SUSE bug 859055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Various versions of Python do not properly restrict readline calls, which allows remote attackers to cause a denial of service (memory consumption) via a long string, related to (1) httplib - fixed in 2.7.4, 2.6.9, and 3.3.3; (2) ftplib - fixed in 2.7.6, 2.6.9, 3.3.3; (3) imaplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; (4) nntplib - fixed in 2.7.6, 2.6.9, 3.3.3; (5) poplib - not yet fixed in 2.7.x, fixed in 2.6.9, 3.3.3; and (6) smtplib - not yet fixed in 2.7.x, fixed in 2.6.9, not yet fixed in 3.3.x. NOTE: this was REJECTed because it is incompatible with CNT1 "Independently Fixable" in the CVE Counting Decisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1753" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
    <description>
    The gzip_decode function in the xmlrpc client library in Python 3.4 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1762" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1762" ref_url="https://www.suse.com/security/cve/CVE-2013-1762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000431.html" source="SUSE-SU"/>
    <description>
    stunnel 4.21 through 4.54, when CONNECT protocol negotiation and NTLM authentication are enabled, does not correctly perform integer conversion, which allows remote proxy servers to execute arbitrary code via a crafted request that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1762/">CVE-2013-1762</cve>
	<bugzilla href="https://bugzilla.suse.com/807440">SUSE bug 807440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807450">SUSE bug 807450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110494" comment="stunnel-5.00-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1775" ref_url="https://www.suse.com/security/cve/CVE-2013-1775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00074.html" source="SUSE-SU"/>
    <description>
    sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1775/">CVE-2013-1775</cve>
	<bugzilla href="https://bugzilla.suse.com/806919">SUSE bug 806919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815325">SUSE bug 815325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845568">SUSE bug 845568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00074.html" source="SUSE-SU"/>
    <description>
    sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776</cve>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00051.html" source="SUSE-SU"/>
    <description>
    poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00051.html" source="SUSE-SU"/>
    <description>
    splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00051.html" source="SUSE-SU"/>
    <description>
    poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<bugzilla href="https://bugzilla.suse.com/806793">SUSE bug 806793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1799" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1799" ref_url="https://www.suse.com/security/cve/CVE-2013-1799" source="SUSE CVE"/>
    <description>
    Gnome Online Accounts (GOA) 3.6.x before 3.6.3 and 3.7.x before 3.7.91, does not properly validate SSL certificates when creating accounts for providers who use the libsoup library, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network.  NOTE: this issue exists because of an incomplete fix for CVE-2013-0240.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1799/">CVE-2013-1799</cve>
	<bugzilla href="https://bugzilla.suse.com/808534">SUSE bug 808534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140636" comment="libgoa-1_0-0-3.20.4-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140637" comment="libgoa-backend-1_0-1-3.20.4-7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1863" ref_url="https://www.suse.com/security/cve/CVE-2013-1863" source="SUSE CVE"/>
    <description>
    Samba 4.x before 4.0.4, when configured as an Active Directory domain controller, uses world-writable permissions on non-default CIFS shares, which allows remote authenticated users to read, modify, create, or delete arbitrary files via standard filesystem operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1863/">CVE-2013-1863</cve>
	<bugzilla href="https://bugzilla.suse.com/809624">SUSE bug 809624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1881" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1881" ref_url="https://www.suse.com/security/cve/CVE-2013-1881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1786-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00114.html" source="SUSE-SU"/>
    <description>
    GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1881/">CVE-2013-1881</cve>
	<bugzilla href="https://bugzilla.suse.com/840753">SUSE bug 840753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140597" comment="gdk-pixbuf-loader-rsvg-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140598" comment="librsvg-2-2-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140599" comment="librsvg-2-2-32bit-2.40.15-4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140600" comment="rsvg-view-2.40.15-4.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1896" ref_url="https://www.suse.com/security/cve/CVE-2013-1896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1082-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1340-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1341-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00065.html" source="SUSE-SU"/>
    <description>
    mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1896/">CVE-2013-1896</cve>
	<bugzilla href="https://bugzilla.suse.com/829056">SUSE bug 829056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829057">SUSE bug 829057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1899" ref_url="https://www.suse.com/security/cve/CVE-2013-1899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0633-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" source="SUSE-SU"/>
    <description>
    Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1899/">CVE-2013-1899</cve>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1900" ref_url="https://www.suse.com/security/cve/CVE-2013-1900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0633-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1900/">CVE-2013-1900</cve>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1901" ref_url="https://www.suse.com/security/cve/CVE-2013-1901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0633-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-04/msg00012.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1901/">CVE-2013-1901</cve>
	<bugzilla href="https://bugzilla.suse.com/812525">SUSE bug 812525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<bugzilla href="https://bugzilla.suse.com/813121">SUSE bug 813121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826666">SUSE bug 826666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941444">SUSE bug 941444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1917" ref_url="https://www.suse.com/security/cve/CVE-2013-1917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1917/">CVE-2013-1917</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1918" ref_url="https://www.suse.com/security/cve/CVE-2013-1918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1918/">CVE-2013-1918</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816159">SUSE bug 816159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/823011">SUSE bug 823011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826882">SUSE bug 826882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1919" ref_url="https://www.suse.com/security/cve/CVE-2013-1919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0912-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1919/">CVE-2013-1919</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/813675">SUSE bug 813675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1922" ref_url="https://www.suse.com/security/cve/CVE-2013-1922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1922/">CVE-2013-1922</cve>
	<bugzilla href="https://bugzilla.suse.com/814059">SUSE bug 814059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934753">SUSE bug 934753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934768">SUSE bug 934768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1940" ref_url="https://www.suse.com/security/cve/CVE-2013-1940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000844.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0776-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00073.html" source="SUSE-SU"/>
    <description>
    X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1940/">CVE-2013-1940</cve>
	<bugzilla href="https://bugzilla.suse.com/814653">SUSE bug 814653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815870">SUSE bug 815870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1944" ref_url="https://www.suse.com/security/cve/CVE-2013-1944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0879-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-1944/">CVE-2013-1944</cve>
	<bugzilla href="https://bugzilla.suse.com/814655">SUSE bug 814655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1945" ref_url="https://www.suse.com/security/cve/CVE-2013-1945" source="SUSE CVE"/>
    <description>
    ruby193 uses an insecure LD_LIBRARY_PATH setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-1945/">CVE-2013-1945</cve>
	<bugzilla href="https://bugzilla.suse.com/1160788">SUSE bug 1160788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334192" comment="ruby2.1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1952" ref_url="https://www.suse.com/security/cve/CVE-2013-1952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1392-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1952/">CVE-2013-1952</cve>
	<bugzilla href="https://bugzilla.suse.com/813673">SUSE bug 813673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/816163">SUSE bug 816163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-2" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0922-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0812-2" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0922-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00080.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<bugzilla href="https://bugzilla.suse.com/817573">SUSE bug 817573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818117">SUSE bug 818117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1962" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1962" ref_url="https://www.suse.com/security/cve/CVE-2013-1962" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00022.html" source="SUSE-SU"/>
    <description>
    The remoteDispatchStoragePoolListAllVolumes function in the storage pool manager in libvirt 1.0.5 allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of requests "to list all volumes for the particular pool."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1962/">CVE-2013-1962</cve>
	<bugzilla href="https://bugzilla.suse.com/820397">SUSE bug 820397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1969" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1969" ref_url="https://www.suse.com/security/cve/CVE-2013-1969" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0729-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0945-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1969/">CVE-2013-1969</cve>
	<bugzilla href="https://bugzilla.suse.com/815665">SUSE bug 815665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1976" ref_url="https://www.suse.com/security/cve/CVE-2013-1976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1306-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1411-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00009.html" source="SUSE-SU"/>
    <description>
    The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1976/">CVE-2013-1976</cve>
	<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1100-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1099-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1009-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00139.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140748" comment="libXext6-1.3.2-3.61 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140749" comment="libXext6-32bit-1.3.2-3.61 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1097-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000916.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1014-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00144.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821667">SUSE bug 821667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140750" comment="libXfixes3-5.0.1-3.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140751" comment="libXfixes3-32bit-5.0.1-3.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140753" comment="libXi6-1.7.4-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140754" comment="libXi6-32bit-1.7.4-9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00154.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140755" comment="libXinerama1-1.1.3-3.55 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140756" comment="libXinerama1-32bit-1.1.3-3.55 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00156.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXrandr 1.4.0 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRRQueryOutputProperty and (2) XRRQueryProviderProperty functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1095-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00141.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140761" comment="libXrender1-0.9.8-3.56 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140762" comment="libXrender1-32bit-0.9.8-3.56 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00155.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140744" comment="libXRes1-1.0.7-3.54 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140745" comment="libXRes1-32bit-1.0.7-3.54 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140767" comment="libXv1-1.0.10-3.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140768" comment="libXv1-32bit-1.0.10-3.57 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140769" comment="libXvMC1-1.0.8-3.57 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00158.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00157.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140838" comment="libdmx1-1.1.3-3.52 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" source="SUSE-SU"/>
    <description>
    X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140753" comment="libXi6-1.7.4-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140754" comment="libXi6-32bit-1.7.4-9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1100-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002689.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824294">SUSE bug 824294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00161.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140753" comment="libXi6-1.7.4-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140754" comment="libXi6-32bit-1.7.4-9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1025-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00153.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140769" comment="libXvMC1-1.0.8-3.57 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00158.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140773" comment="libXxf86dga1-1.1.4-3.59 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00165.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140774" comment="libXxf86vm1-1.1.3-3.54 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140775" comment="libXxf86vm1-32bit-1.1.3-3.54 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1101-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00159.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140746" comment="libXcursor1-1.1.14-3.60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140747" comment="libXcursor1-32bit-1.1.14-3.60 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1100-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00171.html" source="SUSE-SU"/>
    <description>
    The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821664">SUSE bug 821664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140739" comment="libX11-6-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140740" comment="libX11-6-32bit-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140741" comment="libX11-data-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140742" comment="libX11-xcb1-1.6.2-4.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140743" comment="libX11-xcb1-32bit-1.6.2-4.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1101-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00138.html" source="SUSE-SU"/>
    <description>
    X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821670">SUSE bug 821670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140763" comment="libXt6-1.1.4-3.59 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140764" comment="libXt6-32bit-1.1.4-3.59 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2007" ref_url="https://www.suse.com/security/cve/CVE-2013-2007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2007/">CVE-2013-2007</cve>
	<bugzilla href="https://bugzilla.suse.com/818181">SUSE bug 818181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818182">SUSE bug 818182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/818183">SUSE bug 818183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1102-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1046-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00170.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821668">SUSE bug 821668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140757" comment="libXp6-1.0.2-3.58 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140758" comment="libXp6-32bit-1.0.2-3.58 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1103-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00160.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821663">SUSE bug 821663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140765" comment="libXtst6-1.2.2-3.60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140766" comment="libXtst6-32bit-1.2.2-3.60 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00137.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821584">SUSE bug 821584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141007" comment="libxcb-dri2-0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141008" comment="libxcb-dri2-0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141009" comment="libxcb-dri3-0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141010" comment="libxcb-dri3-0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141011" comment="libxcb-glx0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141012" comment="libxcb-glx0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141013" comment="libxcb-present0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141014" comment="libxcb-present0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141015" comment="libxcb-randr0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141016" comment="libxcb-render0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141017" comment="libxcb-render0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141018" comment="libxcb-shape0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141019" comment="libxcb-shm0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141020" comment="libxcb-shm0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141021" comment="libxcb-sync1-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141022" comment="libxcb-sync1-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141023" comment="libxcb-xf86dri0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141024" comment="libxcb-xfixes0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141025" comment="libxcb-xfixes0-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141026" comment="libxcb-xinerama0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141027" comment="libxcb-xkb1-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141028" comment="libxcb-xkb1-32bit-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141029" comment="libxcb-xv0-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141030" comment="libxcb1-1.10-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141031" comment="libxcb1-32bit-1.10-3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00140.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140767" comment="libXv1-1.0.10-3.57 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140768" comment="libXv1-32bit-1.0.10-3.57 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2067</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2067" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2067" ref_url="https://www.suse.com/security/cve/CVE-2013-2067" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1411-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00009.html" source="SUSE-SU"/>
    <description>
    java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2067/">CVE-2013-2067</cve>
	<bugzilla href="https://bugzilla.suse.com/822177">SUSE bug 822177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831112">SUSE bug 831112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2124" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2124" ref_url="https://www.suse.com/security/cve/CVE-2013-2124" source="SUSE CVE"/>
    <description>
    Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2124/">CVE-2013-2124</cve>
	<bugzilla href="https://bugzilla.suse.com/828006">SUSE bug 828006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140663" comment="guestfs-data-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140664" comment="guestfs-tools-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140665" comment="guestfsd-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140666" comment="libguestfs0-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140667" comment="perl-Sys-Guestfs-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140668" comment="python-libguestfs-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140669" comment="virt-p2v-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140670" comment="virt-v2v-1.32.4-14.18 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2131" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002549.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1646-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0474-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00060.html" source="SUSE-SU"/>
    <description>
    Format string vulnerability in the rrdtool module 1.4.7 for Python, as used in Zenoss, allows context-dependent attackers to cause a denial of service (crash) via format string specifiers to the rrdtool.graph function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131</cve>
	<bugzilla href="https://bugzilla.suse.com/828003">SUSE bug 828003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550048" comment="rrdtool-1.4.7-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550049" comment="rrdtool-cached-1.4.7-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2139" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1258-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00059.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in srtp.c in libsrtp in srtp 1.4.5 and earlier allows remote attackers to cause a denial of service (crash) via vectors related to a length inconsistency in the crypto_policy_set_from_profile_for_rtp and srtp_protect functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139</cve>
	<bugzilla href="https://bugzilla.suse.com/828009">SUSE bug 828009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140951" comment="libsrtp1-1.5.2-2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2142" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2142" ref_url="https://www.suse.com/security/cve/CVE-2013-2142" source="SUSE CVE"/>
    <description>
    userpref.c in libimobiledevice 1.1.4, when $HOME and $XDG_CONFIG_HOME are not set, allows local users to overwrite arbitrary files via a symlink attack on (1) HostCertificate.pem, (2) HostPrivateKey.pem, (3) libimobiledevicerc, (4) RootCertificate.pem, or (5) RootPrivateKey.pem in /tmp/root/.config/libimobiledevice/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2142/">CVE-2013-2142</cve>
	<bugzilla href="https://bugzilla.suse.com/823250">SUSE bug 823250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140847" comment="libimobiledevice6-1.2.0-7.31 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2168" ref_url="https://www.suse.com/security/cve/CVE-2013-2168" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1118-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The _dbus_printf_string_upper_bound function in dbus/dbus-sysdeps-unix.c in D-Bus (aka DBus) 1.4.x before 1.4.26, 1.6.x before 1.6.12, and 1.7.x before 1.7.4 allows local users to cause a denial of service (service crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2168/">CVE-2013-2168</cve>
	<bugzilla href="https://bugzilla.suse.com/824607">SUSE bug 824607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2174" ref_url="https://www.suse.com/security/cve/CVE-2013-2174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1166-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2174/">CVE-2013-2174</cve>
	<bugzilla href="https://bugzilla.suse.com/824517">SUSE bug 824517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917692">SUSE bug 917692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1571-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1596-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00050.html" source="SUSE-SU"/>
    <description>
    The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186</cve>
	<bugzilla href="https://bugzilla.suse.com/846174">SUSE bug 846174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140687" comment="jakarta-commons-fileupload-1.1.1-120.238 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140688" comment="jakarta-commons-fileupload-javadoc-1.1.1-120.238 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<bugzilla href="https://bugzilla.suse.com/830257">SUSE bug 830257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2218" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2218" ref_url="https://www.suse.com/security/cve/CVE-2013-2218" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the virConnectListAllInterfaces method in interface/interface_backend_netcf.c in libvirt 1.0.6 allows remote attackers to cause a denial of service (libvirtd crash) via a filtering flag that causes an interface to be skipped, as demonstrated by the "virsh iface-list --inactive" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2218/">CVE-2013-2218</cve>
	<bugzilla href="https://bugzilla.suse.com/827741">SUSE bug 827741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2230" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2230" ref_url="https://www.suse.com/security/cve/CVE-2013-2230" source="SUSE CVE"/>
    <description>
    The qemu driver (qemu/qemu_driver.c) in libvirt before 1.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via unspecified vectors involving "multiple events registration."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2230/">CVE-2013-2230</cve>
	<bugzilla href="https://bugzilla.suse.com/827801">SUSE bug 827801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2249" ref_url="https://www.suse.com/security/cve/CVE-2013-2249" source="SUSE CVE"/>
    <description>
    mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2249/">CVE-2013-2249</cve>
	<bugzilla href="https://bugzilla.suse.com/831113">SUSE bug 831113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2266" ref_url="https://www.suse.com/security/cve/CVE-2013-2266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0625-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0666-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-04/msg00077.html" source="SUSE-SU"/>
    <description>
    libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2266/">CVE-2013-2266</cve>
	<bugzilla href="https://bugzilla.suse.com/811876">SUSE bug 811876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/811934">SUSE bug 811934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2383" ref_url="https://www.suse.com/security/cve/CVE-2013-2383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "handling of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2383/">CVE-2013-2383</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2384" ref_url="https://www.suse.com/security/cve/CVE-2013-2384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font layout" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2384/">CVE-2013-2384</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2407" ref_url="https://www.suse.com/security/cve/CVE-2013-2407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2407/">CVE-2013-2407</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2412" ref_url="https://www.suse.com/security/cve/CVE-2013-2412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2412/">CVE-2013-2412</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2415" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2415" ref_url="https://www.suse.com/security/cve/CVE-2013-2415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows local users to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "processing of MTOM attachments" and the creation of temporary files with weak permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2415/">CVE-2013-2415</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2417" ref_url="https://www.suse.com/security/cve/CVE-2013-2417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2417/">CVE-2013-2417</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2419" ref_url="https://www.suse.com/security/cve/CVE-2013-2419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font processing errors" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2419/">CVE-2013-2419</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2420" ref_url="https://www.suse.com/security/cve/CVE-2013-2420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2420/">CVE-2013-2420</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2421" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2421" ref_url="https://www.suse.com/security/cve/CVE-2013-2421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect MethodHandle lookups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2421/">CVE-2013-2421</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2422" ref_url="https://www.suse.com/security/cve/CVE-2013-2422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2422/">CVE-2013-2422</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2423" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2423" ref_url="https://www.suse.com/security/cve/CVE-2013-2423" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2423/">CVE-2013-2423</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2424" ref_url="https://www.suse.com/security/cve/CVE-2013-2424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient class access checks" when "creating new instances" using MBeanInstantiator.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2424/">CVE-2013-2424</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2426" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2426" ref_url="https://www.suse.com/security/cve/CVE-2013-2426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect invocation of the defaultReadObject method in the ConcurrentHashMap class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2426/">CVE-2013-2426</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2429" ref_url="https://www.suse.com/security/cve/CVE-2013-2429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageWriter state corruption" when using native code, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2429/">CVE-2013-2429</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2430" ref_url="https://www.suse.com/security/cve/CVE-2013-2430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0835-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageReader state corruption" when using native code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2430/">CVE-2013-2430</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2431" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2431" ref_url="https://www.suse.com/security/cve/CVE-2013-2431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0777-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0993-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00129.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to bypassing the Java sandbox using "method handle intrinsic frames."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2431/">CVE-2013-2431</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817157">SUSE bug 817157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2436" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2436" ref_url="https://www.suse.com/security/cve/CVE-2013-2436" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0745-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0964-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00099.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-1488 and CVE-2013-2426.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "type checks" and "method handle binding" involving Wrapper.convert.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2436/">CVE-2013-2436</cve>
	<bugzilla href="https://bugzilla.suse.com/816720">SUSE bug 816720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819288">SUSE bug 819288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2443" ref_url="https://www.suse.com/security/cve/CVE-2013-2443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect "checking order" within the AccessControlContext class.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2443/">CVE-2013-2443</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2444" ref_url="https://www.suse.com/security/cve/CVE-2013-2444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not "properly manage and restrict certain resources related to the processing of fonts," possibly involving temporary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2444/">CVE-2013-2444</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2445" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2445" ref_url="https://www.suse.com/security/cve/CVE-2013-2445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Hotspot.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "handling of memory allocation errors."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2445/">CVE-2013-2445</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2446" ref_url="https://www.suse.com/security/cve/CVE-2013-2446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2446/">CVE-2013-2446</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2447" ref_url="https://www.suse.com/security/cve/CVE-2013-2447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket's local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2447/">CVE-2013-2447</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2448" ref_url="https://www.suse.com/security/cve/CVE-2013-2448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient "access restrictions" and "robustness of sound classes."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2448/">CVE-2013-2448</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2449" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2449" ref_url="https://www.suse.com/security/cve/CVE-2013-2449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to GnomeFileTypeDetector and a missing check for read permissions for a path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2449/">CVE-2013-2449</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2450" ref_url="https://www.suse.com/security/cve/CVE-2013-2450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2450/">CVE-2013-2450</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2451" ref_url="https://www.suse.com/security/cve/CVE-2013-2451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2451/">CVE-2013-2451</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2452" ref_url="https://www.suse.com/security/cve/CVE-2013-2452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "network address handling in virtual machine identifiers" and the lack of "unique and unpredictable IDs" in the java.rmi.dgc.VMID class.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2452/">CVE-2013-2452</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2453" ref_url="https://www.suse.com/security/cve/CVE-2013-2453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for "package access" by the MBeanServer Introspector.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2453/">CVE-2013-2453</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2454" ref_url="https://www.suse.com/security/cve/CVE-2013-2454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2454/">CVE-2013-2454</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2455" ref_url="https://www.suse.com/security/cve/CVE-2013-2455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2455/">CVE-2013-2455</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2456" ref_url="https://www.suse.com/security/cve/CVE-2013-2456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2456/">CVE-2013-2456</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2457" ref_url="https://www.suse.com/security/cve/CVE-2013-2457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2457/">CVE-2013-2457</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2458" ref_url="https://www.suse.com/security/cve/CVE-2013-2458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via "an error related to method handles."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2458/">CVE-2013-2458</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2459" ref_url="https://www.suse.com/security/cve/CVE-2013-2459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "integer overflow checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2459/">CVE-2013-2459</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2460" ref_url="https://www.suse.com/security/cve/CVE-2013-2460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2460/">CVE-2013-2460</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2461" ref_url="https://www.suse.com/security/cve/CVE-2013-2461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier; the Oracle JRockit component in Oracle Fusion Middleware R27.7.5 and earlier and R28.2.7 and earlier; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June and July 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass verification of XML signatures via vectors related to a "Missing check for [a] valid DOMCanonicalizationMethod canonicalization algorithm."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2461/">CVE-2013-2461</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2463" ref_url="https://www.suse.com/security/cve/CVE-2013-2463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2463/">CVE-2013-2463</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2465" ref_url="https://www.suse.com/security/cve/CVE-2013-2465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2465/">CVE-2013-2465</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2469" ref_url="https://www.suse.com/security/cve/CVE-2013-2469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2469/">CVE-2013-2469</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2470" ref_url="https://www.suse.com/security/cve/CVE-2013-2470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "ImagingLib byte lookup processing."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2470/">CVE-2013-2470</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2471" ref_url="https://www.suse.com/security/cve/CVE-2013-2471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2471/">CVE-2013-2471</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2472" ref_url="https://www.suse.com/security/cve/CVE-2013-2472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2472/">CVE-2013-2472</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2473" ref_url="https://www.suse.com/security/cve/CVE-2013-2473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-2473/">CVE-2013-2473</cve>
	<bugzilla href="https://bugzilla.suse.com/825624">SUSE bug 825624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828665">SUSE bug 828665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829708">SUSE bug 829708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2475" ref_url="https://www.suse.com/security/cve/CVE-2013-2475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2475/">CVE-2013-2475</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2476" ref_url="https://www.suse.com/security/cve/CVE-2013-2476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2476/">CVE-2013-2476</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2477" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2477" ref_url="https://www.suse.com/security/cve/CVE-2013-2477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2477/">CVE-2013-2477</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2478" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2478" ref_url="https://www.suse.com/security/cve/CVE-2013-2478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2478/">CVE-2013-2478</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2479" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2479" ref_url="https://www.suse.com/security/cve/CVE-2013-2479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2479/">CVE-2013-2479</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2480" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2480" ref_url="https://www.suse.com/security/cve/CVE-2013-2480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2480/">CVE-2013-2480</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2481" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2481" ref_url="https://www.suse.com/security/cve/CVE-2013-2481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2481/">CVE-2013-2481</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2482" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2482" ref_url="https://www.suse.com/security/cve/CVE-2013-2482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2482/">CVE-2013-2482</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2483" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2483" ref_url="https://www.suse.com/security/cve/CVE-2013-2483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2483/">CVE-2013-2483</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2484" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2484" ref_url="https://www.suse.com/security/cve/CVE-2013-2484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2484/">CVE-2013-2484</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2485" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2485" ref_url="https://www.suse.com/security/cve/CVE-2013-2485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2485/">CVE-2013-2485</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2486" ref_url="https://www.suse.com/security/cve/CVE-2013-2486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0848-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0911-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0947-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" source="SUSE-SU"/>
    <description>
    The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2486/">CVE-2013-2486</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2487" ref_url="https://www.suse.com/security/cve/CVE-2013-2487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0848-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0911-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0947-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00083.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2487/">CVE-2013-2487</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2488" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2488" ref_url="https://www.suse.com/security/cve/CVE-2013-2488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html" source="SUSE-SU"/>
    <description>
    The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2488/">CVE-2013-2488</cve>
	<bugzilla href="https://bugzilla.suse.com/807942">SUSE bug 807942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2850" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2850" ref_url="https://www.suse.com/security/cve/CVE-2013-2850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2850/">CVE-2013-2850</cve>
	<bugzilla href="https://bugzilla.suse.com/821560">SUSE bug 821560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2869</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2869" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2869" ref_url="https://www.suse.com/security/cve/CVE-2013-2869" source="SUSE CVE"/>
    <description>
    Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted JPEG2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2869/">CVE-2013-2869</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2870</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2870" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2870" ref_url="https://www.suse.com/security/cve/CVE-2013-2870" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote servers to execute arbitrary code via crafted response traffic after a URL request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2870/">CVE-2013-2870</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2871</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2871" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2871" ref_url="https://www.suse.com/security/cve/CVE-2013-2871" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the handling of input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2871/">CVE-2013-2871</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871792">SUSE bug 871792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2872</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2872" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2872" ref_url="https://www.suse.com/security/cve/CVE-2013-2872" source="SUSE CVE"/>
    <description>
    Google Chrome before 28.0.1500.71 on Mac OS X does not ensure a sufficient source of entropy for renderer processes, which might make it easier for remote attackers to defeat cryptographic protection mechanisms in third-party components via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2872/">CVE-2013-2872</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2873</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2873" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2873" ref_url="https://www.suse.com/security/cve/CVE-2013-2873" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a 404 HTTP status code during the loading of resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2873/">CVE-2013-2873</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2874</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2874" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2874" ref_url="https://www.suse.com/security/cve/CVE-2013-2874" source="SUSE CVE"/>
    <description>
    Google Chrome before 28.0.1500.71 on Windows, when an Nvidia GPU is used, allows remote attackers to bypass intended restrictions on access to screen data via vectors involving IPC transmission of GL textures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2874/">CVE-2013-2874</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2875</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2875" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2875" ref_url="https://www.suse.com/security/cve/CVE-2013-2875" source="SUSE CVE"/>
    <description>
    core/rendering/svg/SVGInlineTextBox.cpp in the SVG implementation in Blink, as used in Google Chrome before 28.0.1500.71, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2875/">CVE-2013-2875</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879607">SUSE bug 879607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2876</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2876" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2876" ref_url="https://www.suse.com/security/cve/CVE-2013-2876" source="SUSE CVE"/>
    <description>
    browser/extensions/api/tabs/tabs_api.cc in Google Chrome before 28.0.1500.71 does not properly enforce restrictions on the capture of screenshots by extensions, which allows remote attackers to obtain sensitive information about the content of a previous page via vectors involving an interstitial page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2876/">CVE-2013-2876</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2877</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2877" ref_url="https://www.suse.com/security/cve/CVE-2013-2877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1221-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html" source="SUSE-SU"/>
    <description>
    parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2877/">CVE-2013-2877</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/829077">SUSE bug 829077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854869">SUSE bug 854869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2878</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2878" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2878" ref_url="https://www.suse.com/security/cve/CVE-2013-2878" source="SUSE CVE"/>
    <description>
    Google Chrome before 28.0.1500.71 allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the handling of text.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2878/">CVE-2013-2878</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2879</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2879" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2879" ref_url="https://www.suse.com/security/cve/CVE-2013-2879" source="SUSE CVE"/>
    <description>
    Google Chrome before 28.0.1500.71 does not properly determine the circumstances in which a renderer process can be considered a trusted process for sign-in and subsequent sync operations, which makes it easier for remote attackers to conduct phishing attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2879/">CVE-2013-2879</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2880</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2880" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2880" ref_url="https://www.suse.com/security/cve/CVE-2013-2880" source="SUSE CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2880/">CVE-2013-2880</cve>
	<bugzilla href="https://bugzilla.suse.com/828893">SUSE bug 828893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2888" ref_url="https://www.suse.com/security/cve/CVE-2013-2888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
    <description>
    Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2888/">CVE-2013-2888</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2889" ref_url="https://www.suse.com/security/cve/CVE-2013-2889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2889/">CVE-2013-2889</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2890" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2890" ref_url="https://www.suse.com/security/cve/CVE-2013-2890" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-sony.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SONY is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2890/">CVE-2013-2890</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2891" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2891" ref_url="https://www.suse.com/security/cve/CVE-2013-2891" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-steelseries.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_STEELSERIES is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2891/">CVE-2013-2891</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2892" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2892" ref_url="https://www.suse.com/security/cve/CVE-2013-2892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2892/">CVE-2013-2892</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2894" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2894" ref_url="https://www.suse.com/security/cve/CVE-2013-2894" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2894/">CVE-2013-2894</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2895" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2895" ref_url="https://www.suse.com/security/cve/CVE-2013-2895" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-logitech-dj.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LOGITECH_DJ is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or obtain sensitive information from kernel memory via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2895/">CVE-2013-2895</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2896" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2896" ref_url="https://www.suse.com/security/cve/CVE-2013-2896" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-ntrig.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_NTRIG is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2896/">CVE-2013-2896</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2898" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2898" ref_url="https://www.suse.com/security/cve/CVE-2013-2898" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2898/">CVE-2013-2898</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2899" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2899" ref_url="https://www.suse.com/security/cve/CVE-2013-2899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2899/">CVE-2013-2899</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2944" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2944" ref_url="https://www.suse.com/security/cve/CVE-2013-2944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1237-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1237-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000564.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0774-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0775-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0873-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0985-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00121.html" source="SUSE-SU"/>
    <description>
    strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2944/">CVE-2013-2944</cve>
	<bugzilla href="https://bugzilla.suse.com/815236">SUSE bug 815236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<bugzilla href="https://bugzilla.suse.com/826717">SUSE bug 826717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3555" ref_url="https://www.suse.com/security/cve/CVE-2013-3555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3555/">CVE-2013-3555</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3556" ref_url="https://www.suse.com/security/cve/CVE-2013-3556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3556/">CVE-2013-3556</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3557" ref_url="https://www.suse.com/security/cve/CVE-2013-3557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3557/">CVE-2013-3557</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3558" ref_url="https://www.suse.com/security/cve/CVE-2013-3558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3558/">CVE-2013-3558</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3559" ref_url="https://www.suse.com/security/cve/CVE-2013-3559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3559/">CVE-2013-3559</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3560" ref_url="https://www.suse.com/security/cve/CVE-2013-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3560/">CVE-2013-3560</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3561" ref_url="https://www.suse.com/security/cve/CVE-2013-3561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3561/">CVE-2013-3561</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3562" ref_url="https://www.suse.com/security/cve/CVE-2013-3562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1084-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1086-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3562/">CVE-2013-3562</cve>
	<bugzilla href="https://bugzilla.suse.com/820566">SUSE bug 820566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820973">SUSE bug 820973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
    <description>
    socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/821985">SUSE bug 821985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3829" ref_url="https://www.suse.com/security/cve/CVE-2013-3829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3829/">CVE-2013-3829</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4002" ref_url="https://www.suse.com/security/cve/CVE-2013-4002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1255-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1263-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4002/">CVE-2013-4002</cve>
	<bugzilla href="https://bugzilla.suse.com/829212">SUSE bug 829212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4083" ref_url="https://www.suse.com/security/cve/CVE-2013-4083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000561.html" source="SUSE-SU"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4083/">CVE-2013-4083</cve>
	<bugzilla href="https://bugzilla.suse.com/824900">SUSE bug 824900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4124" ref_url="https://www.suse.com/security/cve/CVE-2013-4124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1349-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4124/">CVE-2013-4124</cve>
	<bugzilla href="https://bugzilla.suse.com/829969">SUSE bug 829969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4143" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4143" ref_url="https://www.suse.com/security/cve/CVE-2013-4143" source="SUSE CVE"/>
    <description>
    The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4143/">CVE-2013-4143</cve>
	<bugzilla href="https://bugzilla.suse.com/829859">SUSE bug 829859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141168" comment="xlockmore-5.43-5.33 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4148" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4148" ref_url="https://www.suse.com/security/cve/CVE-2013-4148" source="SUSE CVE"/>
    <description>
    Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4148/">CVE-2013-4148</cve>
	<bugzilla href="https://bugzilla.suse.com/864812">SUSE bug 864812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964630">SUSE bug 964630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4149" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4149" ref_url="https://www.suse.com/security/cve/CVE-2013-4149" source="SUSE CVE"/>
    <description>
    Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4149/">CVE-2013-4149</cve>
	<bugzilla href="https://bugzilla.suse.com/864649">SUSE bug 864649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964443">SUSE bug 964443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4150" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4150" ref_url="https://www.suse.com/security/cve/CVE-2013-4150" source="SUSE CVE"/>
    <description>
    The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4150/">CVE-2013-4150</cve>
	<bugzilla href="https://bugzilla.suse.com/864650">SUSE bug 864650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4151" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4151" ref_url="https://www.suse.com/security/cve/CVE-2013-4151" source="SUSE CVE"/>
    <description>
    The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4151/">CVE-2013-4151</cve>
	<bugzilla href="https://bugzilla.suse.com/864653">SUSE bug 864653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964636">SUSE bug 964636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4153" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4153" ref_url="https://www.suse.com/security/cve/CVE-2013-4153" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the qemuAgentGetVCPUs function in qemu/qemu_agent.c in libvirt 1.0.6 through 1.1.0 allows remote attackers to cause a denial of service (daemon crash) via a cpu count request, as demonstrated by the "virsh vcpucount dom --guest" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4153/">CVE-2013-4153</cve>
	<bugzilla href="https://bugzilla.suse.com/830497">SUSE bug 830497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/830498">SUSE bug 830498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4154" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4154" ref_url="https://www.suse.com/security/cve/CVE-2013-4154" source="SUSE CVE"/>
    <description>
    The qemuAgentCommand function in libvirt before 1.1.1, when a guest agent is not configured, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to "agent based cpu (un)plug," as demonstrated by the "virsh vcpucount foobar --guest" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4154/">CVE-2013-4154</cve>
	<bugzilla href="https://bugzilla.suse.com/830498">SUSE bug 830498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<bugzilla href="https://bugzilla.suse.com/834477">SUSE bug 834477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4233" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4233" ref_url="https://www.suse.com/security/cve/CVE-2013-4233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00010.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4233/">CVE-2013-4233</cve>
	<bugzilla href="https://bugzilla.suse.com/1022032">SUSE bug 1022032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834483">SUSE bug 834483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4234" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4234" ref_url="https://www.suse.com/security/cve/CVE-2013-4234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00010.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4234/">CVE-2013-4234</cve>
	<bugzilla href="https://bugzilla.suse.com/1022032">SUSE bug 1022032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/834483">SUSE bug 834483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140885" comment="libmodplug1-0.8.8.4-13.69 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<bugzilla href="https://bugzilla.suse.com/834594">SUSE bug 834594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883022">SUSE bug 883022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4238" ref_url="https://www.suse.com/security/cve/CVE-2013-4238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1437-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1438-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1440-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1462-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1463-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2013-4238/">CVE-2013-4238</cve>
	<bugzilla href="https://bugzilla.suse.com/834601">SUSE bug 834601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882915">SUSE bug 882915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130998" comment="python-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131909" comment="python-32bit-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131000" comment="python-curses-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131911" comment="python-demo-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131914" comment="python-gdbm-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131915" comment="python-idle-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131002" comment="python-tk-2.7.9-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141074" comment="python3-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141075" comment="python3-curses-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4239" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4239" ref_url="https://www.suse.com/security/cve/CVE-2013-4239" source="SUSE CVE"/>
    <description>
    The xenDaemonListDefinedDomains function in xen/xend_internal.c in libvirt 1.1.1 allows remote authenticated users to cause a denial of service (memory corruption and crash) via vectors involving the virConnectListDefinedDomains API function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4239/">CVE-2013-4239</cve>
	<bugzilla href="https://bugzilla.suse.com/834598">SUSE bug 834598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4242" ref_url="https://www.suse.com/security/cve/CVE-2013-4242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000829.html" source="SUSE-SU"/>
    <description>
    GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4242/">CVE-2013-4242</cve>
	<bugzilla href="https://bugzilla.suse.com/831359">SUSE bug 831359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131935" comment="libgcrypt20-hmac-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131936" comment="libgcrypt20-hmac-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<bugzilla href="https://bugzilla.suse.com/834779">SUSE bug 834779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1484-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00053.html" source="SUSE-SU"/>
    <description>
    The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/834788">SUSE bug 834788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854393">SUSE bug 854393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4276" ref_url="https://www.suse.com/security/cve/CVE-2013-4276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1547-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in LittleCMS (aka lcms or liblcms) 1.19 and earlier allow remote attackers to cause a denial of service (crash) via a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4276/">CVE-2013-4276</cve>
	<bugzilla href="https://bugzilla.suse.com/843716">SUSE bug 843716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140713" comment="liblcms1-1.19-17.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140714" comment="liblcms1-32bit-1.19-17.31 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4282" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0884-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1750-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<bugzilla href="https://bugzilla.suse.com/848279">SUSE bug 848279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333998" comment="spice is not affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1617-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html" source="SUSE-SU"/>
    <description>
    Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288</cve>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099031">SUSE bug 1099031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836932">SUSE bug 836932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836939">SUSE bug 836939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844967">SUSE bug 844967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854144">SUSE bug 854144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140954" comment="libsystemd0-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140955" comment="libsystemd0-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140956" comment="libudev1-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140957" comment="libudev1-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140958" comment="systemd-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140959" comment="systemd-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140960" comment="systemd-bash-completion-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140961" comment="systemd-sysvinit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140962" comment="udev-228-117.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4296" ref_url="https://www.suse.com/security/cve/CVE-2013-4296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1550-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" source="SUSE-SU"/>
    <description>
    The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4296/">CVE-2013-4296</cve>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4297" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4297" ref_url="https://www.suse.com/security/cve/CVE-2013-4297" source="SUSE CVE"/>
    <description>
    The virFileNBDDeviceAssociate function in util/virfile.c in libvirt 1.1.2 and earlier allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4297/">CVE-2013-4297</cve>
	<bugzilla href="https://bugzilla.suse.com/838642">SUSE bug 838642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1550-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html" source="SUSE-SU"/>
    <description>
    libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311</cve>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4312" ref_url="https://www.suse.com/security/cve/CVE-2013-4312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4312/">CVE-2013-4312</cve>
	<bugzilla href="https://bugzilla.suse.com/839104">SUSE bug 839104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922947">SUSE bug 922947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968014">SUSE bug 968014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4314" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4314" ref_url="https://www.suse.com/security/cve/CVE-2013-4314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1648-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0477-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4314/">CVE-2013-4314</cve>
	<bugzilla href="https://bugzilla.suse.com/839107">SUSE bug 839107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141084" comment="python-pyOpenSSL-16.0.0-2.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4325" ref_url="https://www.suse.com/security/cve/CVE-2013-4325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0188-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1617-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html" source="SUSE-SU"/>
    <description>
    The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4325/">CVE-2013-4325</cve>
	<bugzilla href="https://bugzilla.suse.com/808355">SUSE bug 808355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836932">SUSE bug 836932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140679" comment="hplip-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140680" comment="hplip-hpijs-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140681" comment="hplip-sane-3.14.6-3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4326" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1597-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00051.html" source="SUSE-SU"/>
    <description>
    RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836932">SUSE bug 836932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836939">SUSE bug 836939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141122" comment="rtkit-0.11_git201205151338-8.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00072.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<bugzilla href="https://bugzilla.suse.com/839870">SUSE bug 839870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882910">SUSE bug 882910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4342" ref_url="https://www.suse.com/security/cve/CVE-2013-4342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0517-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00034.html" source="SUSE-SU"/>
    <description>
    xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4342/">CVE-2013-4342</cve>
	<bugzilla href="https://bugzilla.suse.com/844230">SUSE bug 844230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/855685">SUSE bug 855685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882917">SUSE bug 882917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141167" comment="xinetd-2.3.15-7.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4351" ref_url="https://www.suse.com/security/cve/CVE-2013-4351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1494-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1526-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1532-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00006.html" source="SUSE-SU"/>
    <description>
    GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4351/">CVE-2013-4351</cve>
	<bugzilla href="https://bugzilla.suse.com/840510">SUSE bug 840510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4353" ref_url="https://www.suse.com/security/cve/CVE-2013-4353" source="SUSE CVE"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021448" ref_url="https://www.suse.com/support/kb/doc/?id=7021448" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="TID7021992" ref_url="https://www.suse.com/support/kb/doc/?id=7021992" source="SUSE-SU"/>
		<reference ref_id="TID7022038" ref_url="https://www.suse.com/support/kb/doc/?id=7022038" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0094-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0096-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00070.html" source="SUSE-SU"/>
    <description>
    The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4353/">CVE-2013-4353</cve>
	<bugzilla href="https://bugzilla.suse.com/857640">SUSE bug 857640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4355" ref_url="https://www.suse.com/security/cve/CVE-2013-4355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4355/">CVE-2013-4355</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4356" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4356" ref_url="https://www.suse.com/security/cve/CVE-2013-4356" source="SUSE CVE"/>
    <description>
    Xen 4.3.x writes hypervisor mappings to certain shadow pagetables when live migration is performed on hosts with more than 5TB of RAM, which allows local 64-bit PV guests to read or write to invalid memory and cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4356/">CVE-2013-4356</cve>
	<bugzilla href="https://bugzilla.suse.com/840593">SUSE bug 840593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4361" ref_url="https://www.suse.com/security/cve/CVE-2013-4361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4361/">CVE-2013-4361</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841766">SUSE bug 841766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4366" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4366" ref_url="https://www.suse.com/security/cve/CVE-2013-4366" source="SUSE CVE"/>
    <description>
    http/impl/client/HttpClientBuilder.java in Apache HttpClient 4.3.x before 4.3.1 does not ensure that X509HostnameVerifier is not null, which allows attackers to have unspecified impact via vectors involving hostname verification.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4366/">CVE-2013-4366</cve>
	<bugzilla href="https://bugzilla.suse.com/1066013">SUSE bug 1066013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338741" comment="apache-commons-httpclient is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4375" ref_url="https://www.suse.com/security/cve/CVE-2013-4375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-4375/">CVE-2013-4375</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/842515">SUSE bug 842515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4387</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4387" ref_url="https://www.suse.com/security/cve/CVE-2013-4387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
    <description>
    net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4387/">CVE-2013-4387</cve>
	<bugzilla href="https://bugzilla.suse.com/843430">SUSE bug 843430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848042">SUSE bug 848042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4396" ref_url="https://www.suse.com/security/cve/CVE-2013-4396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000844.html" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1610-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1614-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4396/">CVE-2013-4396</cve>
	<bugzilla href="https://bugzilla.suse.com/843652">SUSE bug 843652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4399" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4399" ref_url="https://www.suse.com/security/cve/CVE-2013-4399" source="SUSE CVE"/>
    <description>
    The remoteClientFreeFunc function in daemon/remote.c in libvirt before 1.1.3, when ACLs are used, does not set an identity, which causes event handler removal to be denied and remote attackers to cause a denial of service (use-after-free and crash) by registering an event handler and then closing the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4399/">CVE-2013-4399</cve>
	<bugzilla href="https://bugzilla.suse.com/842300">SUSE bug 842300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844052">SUSE bug 844052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4400" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4400" ref_url="https://www.suse.com/security/cve/CVE-2013-4400" source="SUSE CVE"/>
    <description>
    virt-login-shell in libvirt 1.1.2 through 1.1.3 allows local users to overwrite arbitrary files and possibly gain privileges via unspecified environment variables or command-line arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4400/">CVE-2013-4400</cve>
	<bugzilla href="https://bugzilla.suse.com/837609">SUSE bug 837609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4401" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4401" ref_url="https://www.suse.com/security/cve/CVE-2013-4401" source="SUSE CVE"/>
    <description>
    The virConnectDomainXMLToNative API function in libvirt 1.1.0 through 1.1.3 checks for the connect:read permission instead of the connect:write permission, which allows attackers to gain domain:write privileges and execute Qemu binaries via crafted XML.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4401/">CVE-2013-4401</cve>
	<bugzilla href="https://bugzilla.suse.com/845704">SUSE bug 845704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4402" ref_url="https://www.suse.com/security/cve/CVE-2013-4402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1546-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1552-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-10/msg00025.html" source="SUSE-SU"/>
    <description>
    The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4402/">CVE-2013-4402</cve>
	<bugzilla href="https://bugzilla.suse.com/844175">SUSE bug 844175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941439">SUSE bug 941439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4408" ref_url="https://www.suse.com/security/cve/CVE-2013-4408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4408/">CVE-2013-4408</cve>
	<bugzilla href="https://bugzilla.suse.com/844720">SUSE bug 844720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882906">SUSE bug 882906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4416" ref_url="https://www.suse.com/security/cve/CVE-2013-4416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1953-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00115.html" source="SUSE-SU"/>
    <description>
    The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4416/">CVE-2013-4416</cve>
	<bugzilla href="https://bugzilla.suse.com/840592">SUSE bug 840592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/845520">SUSE bug 845520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4419" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4419" ref_url="https://www.suse.com/security/cve/CVE-2013-4419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1626-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The guestfish command in libguestfs 1.20.12, 1.22.7, and earlier, when using the --remote or --listen option, does not properly check the ownership of /tmp/.guestfish-$UID/ when creating a temporary socket file in this directory, which allows local users to write to the socket and execute arbitrary commands by creating /tmp/.guestfish-$UID/ in advance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-4419/">CVE-2013-4419</cve>
	<bugzilla href="https://bugzilla.suse.com/845720">SUSE bug 845720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140663" comment="guestfs-data-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140664" comment="guestfs-tools-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140665" comment="guestfsd-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140666" comment="libguestfs0-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140667" comment="perl-Sys-Guestfs-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140668" comment="python-libguestfs-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140669" comment="virt-p2v-1.32.4-14.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140670" comment="virt-v2v-1.32.4-14.18 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883217">SUSE bug 883217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941444">SUSE bug 941444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955181">SUSE bug 955181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4473" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<bugzilla href="https://bugzilla.suse.com/847907">SUSE bug 847907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4474" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474" source="SUSE CVE"/>
    <description>
    Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<bugzilla href="https://bugzilla.suse.com/847907">SUSE bug 847907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140905" comment="libpoppler-glib8-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140906" comment="libpoppler-qt4-4-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140907" comment="libpoppler60-0.43.0-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140908" comment="poppler-tools-0.43.0-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4475" ref_url="https://www.suse.com/security/cve/CVE-2013-4475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000886.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1742-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1787-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1790-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
    <description>
    Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4475/">CVE-2013-4475</cve>
	<bugzilla href="https://bugzilla.suse.com/848101">SUSE bug 848101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880220">SUSE bug 880220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4476" ref_url="https://www.suse.com/security/cve/CVE-2013-4476" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1742-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1921-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html" source="SUSE-SU"/>
    <description>
    Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4476/">CVE-2013-4476</cve>
	<bugzilla href="https://bugzilla.suse.com/848103">SUSE bug 848103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4483</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0247-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html" source="SUSE-SU"/>
    <description>
    The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483</cve>
	<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4494" ref_url="https://www.suse.com/security/cve/CVE-2013-4494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4494/">CVE-2013-4494</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4496" ref_url="https://www.suse.com/security/cve/CVE-2013-4496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4496/">CVE-2013-4496</cve>
	<bugzilla href="https://bugzilla.suse.com/849224">SUSE bug 849224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866844">SUSE bug 866844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4509" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1825-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0068-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00045.html" source="SUSE-SU"/>
    <description>
    The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<bugzilla href="https://bugzilla.suse.com/847718">SUSE bug 847718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140683" comment="ibus-chewing-1.4.14-4.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140684" comment="ibus-pinyin-1.5.0-7.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4526" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4526" ref_url="https://www.suse.com/security/cve/CVE-2013-4526" source="SUSE CVE"/>
    <description>
    Buffer overflow in hw/ide/ahci.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via vectors related to migrating ports.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4526/">CVE-2013-4526</cve>
	<bugzilla href="https://bugzilla.suse.com/864671">SUSE bug 864671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4527" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4527" ref_url="https://www.suse.com/security/cve/CVE-2013-4527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/timer/hpet.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via vectors related to the number of timers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4527/">CVE-2013-4527</cve>
	<bugzilla href="https://bugzilla.suse.com/864673">SUSE bug 864673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964746">SUSE bug 964746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4529" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4529" ref_url="https://www.suse.com/security/cve/CVE-2013-4529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4529/">CVE-2013-4529</cve>
	<bugzilla href="https://bugzilla.suse.com/864678">SUSE bug 864678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964929">SUSE bug 964929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4530" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4530" ref_url="https://www.suse.com/security/cve/CVE-2013-4530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4530/">CVE-2013-4530</cve>
	<bugzilla href="https://bugzilla.suse.com/864682">SUSE bug 864682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964950">SUSE bug 964950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4531" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4531" ref_url="https://www.suse.com/security/cve/CVE-2013-4531" source="SUSE CVE"/>
    <description>
    Buffer overflow in target-arm/machine.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative value in cpreg_vmstate_array_len in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4531/">CVE-2013-4531</cve>
	<bugzilla href="https://bugzilla.suse.com/864796">SUSE bug 864796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4533" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4534" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4535" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4535" ref_url="https://www.suse.com/security/cve/CVE-2013-4535" source="SUSE CVE"/>
    <description>
    The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4535/">CVE-2013-4535</cve>
	<bugzilla href="https://bugzilla.suse.com/864665">SUSE bug 864665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964676">SUSE bug 964676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4536" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4536" ref_url="https://www.suse.com/security/cve/CVE-2013-4536" source="SUSE CVE"/>
    <description>
    An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4536/">CVE-2013-4536</cve>
	<bugzilla href="https://bugzilla.suse.com/864665">SUSE bug 864665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964676">SUSE bug 964676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4537" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4541" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4541" ref_url="https://www.suse.com/security/cve/CVE-2013-4541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4541/">CVE-2013-4541</cve>
	<bugzilla href="https://bugzilla.suse.com/864802">SUSE bug 864802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4542" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4542" ref_url="https://www.suse.com/security/cve/CVE-2013-4542" source="SUSE CVE"/>
    <description>
    The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4542/">CVE-2013-4542</cve>
	<bugzilla href="https://bugzilla.suse.com/864804">SUSE bug 864804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4544" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4544" ref_url="https://www.suse.com/security/cve/CVE-2013-4544" source="SUSE CVE"/>
    <description>
    hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4544/">CVE-2013-4544</cve>
	<bugzilla href="https://bugzilla.suse.com/873613">SUSE bug 873613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4545" ref_url="https://www.suse.com/security/cve/CVE-2013-4545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1865-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00053.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4545/">CVE-2013-4545</cve>
	<bugzilla href="https://bugzilla.suse.com/849596">SUSE bug 849596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870444">SUSE bug 870444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924250">SUSE bug 924250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4549" ref_url="https://www.suse.com/security/cve/CVE-2013-4549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000731.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0070-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0125-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0176-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00106.html" source="SUSE-SU"/>
    <description>
    QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4549/">CVE-2013-4549</cve>
	<bugzilla href="https://bugzilla.suse.com/1039291">SUSE bug 1039291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856832">SUSE bug 856832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4551" ref_url="https://www.suse.com/security/cve/CVE-2013-4551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4551/">CVE-2013-4551</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849665">SUSE bug 849665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4553" ref_url="https://www.suse.com/security/cve/CVE-2013-4553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4553/">CVE-2013-4553</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849667">SUSE bug 849667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4554" ref_url="https://www.suse.com/security/cve/CVE-2013-4554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4554/">CVE-2013-4554</cve>
	<bugzilla href="https://bugzilla.suse.com/848657">SUSE bug 848657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849668">SUSE bug 849668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4566" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1956-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00118.html" source="SUSE-SU"/>
    <description>
    mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<bugzilla href="https://bugzilla.suse.com/853039">SUSE bug 853039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131934" comment="apache2-mod_nss-1.0.14-18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4591" ref_url="https://www.suse.com/security/cve/CVE-2013-4591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname on an NFSv4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4591/">CVE-2013-4591</cve>
	<bugzilla href="https://bugzilla.suse.com/851103">SUSE bug 851103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4758" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4758" ref_url="https://www.suse.com/security/cve/CVE-2013-4758" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4758/">CVE-2013-4758</cve>
	<bugzilla href="https://bugzilla.suse.com/828140">SUSE bug 828140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141113" comment="rsyslog-diag-tools-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141114" comment="rsyslog-doc-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141115" comment="rsyslog-module-gssapi-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141116" comment="rsyslog-module-gtls-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141117" comment="rsyslog-module-mysql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141118" comment="rsyslog-module-pgsql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141119" comment="rsyslog-module-relp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141120" comment="rsyslog-module-snmp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141121" comment="rsyslog-module-udpspoof-8.4.0-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4854" ref_url="https://www.suse.com/security/cve/CVE-2013-4854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00018.html" source="SUSE-SU"/>
    <description>
    The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4854/">CVE-2013-4854</cve>
	<bugzilla href="https://bugzilla.suse.com/831899">SUSE bug 831899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4920" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4920" ref_url="https://www.suse.com/security/cve/CVE-2013-4920" source="SUSE CVE"/>
    <description>
    The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4920/">CVE-2013-4920</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4921" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4921" ref_url="https://www.suse.com/security/cve/CVE-2013-4921" source="SUSE CVE"/>
    <description>
    Off-by-one error in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4921/">CVE-2013-4921</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4922" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4922" ref_url="https://www.suse.com/security/cve/CVE-2013-4922" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4922/">CVE-2013-4922</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4923" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4923" ref_url="https://www.suse.com/security/cve/CVE-2013-4923" source="SUSE CVE"/>
    <description>
    Memory leak in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (memory consumption) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4923/">CVE-2013-4923</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4924" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4924" ref_url="https://www.suse.com/security/cve/CVE-2013-4924" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly validate certain index values, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4924/">CVE-2013-4924</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4925" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4925" ref_url="https://www.suse.com/security/cve/CVE-2013-4925" source="SUSE CVE"/>
    <description>
    Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4925/">CVE-2013-4925</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4926" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4926" ref_url="https://www.suse.com/security/cve/CVE-2013-4926" source="SUSE CVE"/>
    <description>
    epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4926/">CVE-2013-4926</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4927" ref_url="https://www.suse.com/security/cve/CVE-2013-4927" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4927/">CVE-2013-4927</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4928" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4928" ref_url="https://www.suse.com/security/cve/CVE-2013-4928" source="SUSE CVE"/>
    <description>
    Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4928/">CVE-2013-4928</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4929" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4929" ref_url="https://www.suse.com/security/cve/CVE-2013-4929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4929/">CVE-2013-4929</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4930" ref_url="https://www.suse.com/security/cve/CVE-2013-4930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4930/">CVE-2013-4930</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4931" ref_url="https://www.suse.com/security/cve/CVE-2013-4931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4931/">CVE-2013-4931</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4932" ref_url="https://www.suse.com/security/cve/CVE-2013-4932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4932/">CVE-2013-4932</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4933" ref_url="https://www.suse.com/security/cve/CVE-2013-4933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4933/">CVE-2013-4933</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4934" ref_url="https://www.suse.com/security/cve/CVE-2013-4934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4934/">CVE-2013-4934</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4935" ref_url="https://www.suse.com/security/cve/CVE-2013-4935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1295-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" source="SUSE-SU"/>
    <description>
    The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4935/">CVE-2013-4935</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4936" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4936" ref_url="https://www.suse.com/security/cve/CVE-2013-4936" source="SUSE CVE"/>
    <description>
    The IsDFP_Frame function in plugins/profinet/packet-pn-rt.c in the PROFINET Real-Time dissector in Wireshark 1.10.x before 1.10.1 does not validate MAC addresses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4936/">CVE-2013-4936</cve>
	<bugzilla href="https://bugzilla.suse.com/831718">SUSE bug 831718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5018" ref_url="https://www.suse.com/security/cve/CVE-2013-5018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1866-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1866-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000675.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1332-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1333-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-08/msg00050.html" source="SUSE-SU"/>
    <description>
    The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5018/">CVE-2013-5018</cve>
	<bugzilla href="https://bugzilla.suse.com/833278">SUSE bug 833278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5123</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5123" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5123" ref_url="https://www.suse.com/security/cve/CVE-2013-5123" source="SUSE CVE"/>
    <description>
    The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2013-5123/">CVE-2013-5123</cve>
	<bugzilla href="https://bugzilla.suse.com/864406">SUSE bug 864406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561562" comment="python-pip-10.0.1-11.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561558" comment="python-ply-3.4-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2014:001" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000934.html" source="SUSE-SU"/>
		<reference ref_id="TID7014543" ref_url="https://www.suse.com/support/kb/doc?id=7014543" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0949-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00031.html" source="SUSE-SU"/>
    <description>
    The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<bugzilla href="https://bugzilla.suse.com/857195">SUSE bug 857195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889447">SUSE bug 889447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5590" ref_url="https://www.suse.com/security/cve/CVE-2013-5590" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5590/">CVE-2013-5590</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5591" ref_url="https://www.suse.com/security/cve/CVE-2013-5591" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5591/">CVE-2013-5591</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5592" ref_url="https://www.suse.com/security/cve/CVE-2013-5592" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5592/">CVE-2013-5592</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5593" ref_url="https://www.suse.com/security/cve/CVE-2013-5593" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5593/">CVE-2013-5593</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5595" ref_url="https://www.suse.com/security/cve/CVE-2013-5595" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5595/">CVE-2013-5595</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5596" ref_url="https://www.suse.com/security/cve/CVE-2013-5596" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5596/">CVE-2013-5596</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5597" ref_url="https://www.suse.com/security/cve/CVE-2013-5597" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5597/">CVE-2013-5597</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5598" ref_url="https://www.suse.com/security/cve/CVE-2013-5598" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
    <description>
    PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRAME element, which allows remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges by using this element within an embedded PDF object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5598/">CVE-2013-5598</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5599" ref_url="https://www.suse.com/security/cve/CVE-2013-5599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5599/">CVE-2013-5599</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5600" ref_url="https://www.suse.com/security/cve/CVE-2013-5600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5600/">CVE-2013-5600</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5601" ref_url="https://www.suse.com/security/cve/CVE-2013-5601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5601/">CVE-2013-5601</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5602" ref_url="https://www.suse.com/security/cve/CVE-2013-5602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5602/">CVE-2013-5602</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5603" ref_url="https://www.suse.com/security/cve/CVE-2013-5603" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5603/">CVE-2013-5603</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5604" ref_url="https://www.suse.com/security/cve/CVE-2013-5604" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1788-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5604/">CVE-2013-5604</cve>
	<bugzilla href="https://bugzilla.suse.com/847708">SUSE bug 847708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5605" ref_url="https://www.suse.com/security/cve/CVE-2013-5605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00080.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5605/">CVE-2013-5605</cve>
	<bugzilla href="https://bugzilla.suse.com/850148">SUSE bug 850148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5609" ref_url="https://www.suse.com/security/cve/CVE-2013-5609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5609/">CVE-2013-5609</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5610" ref_url="https://www.suse.com/security/cve/CVE-2013-5610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5610/">CVE-2013-5610</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5611" ref_url="https://www.suse.com/security/cve/CVE-2013-5611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5611/">CVE-2013-5611</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5612" ref_url="https://www.suse.com/security/cve/CVE-2013-5612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5612/">CVE-2013-5612</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5613" ref_url="https://www.suse.com/security/cve/CVE-2013-5613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5613/">CVE-2013-5613</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5614" ref_url="https://www.suse.com/security/cve/CVE-2013-5614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5614/">CVE-2013-5614</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5615" ref_url="https://www.suse.com/security/cve/CVE-2013-5615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5615/">CVE-2013-5615</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5616" ref_url="https://www.suse.com/security/cve/CVE-2013-5616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5616/">CVE-2013-5616</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5618" ref_url="https://www.suse.com/security/cve/CVE-2013-5618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5618/">CVE-2013-5618</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5619" ref_url="https://www.suse.com/security/cve/CVE-2013-5619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5619/">CVE-2013-5619</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00084.html" source="SUSE-SU"/>
    <description>
    The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<bugzilla href="https://bugzilla.suse.com/1001951">SUSE bug 1001951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004237">SUSE bug 1004237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007816">SUSE bug 1007816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549161" comment="ghostscript-9.15-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549162" comment="ghostscript-x11-9.15-17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00108.html" source="SUSE-SU"/>
    <description>
    The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding.  NOTE: the vendor states "this is not a security issue in httpd as such."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704</cve>
	<bugzilla href="https://bugzilla.suse.com/871310">SUSE bug 871310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914535">SUSE bug 914535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930944">SUSE bug 930944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938728">SUSE bug 938728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5717" ref_url="https://www.suse.com/security/cve/CVE-2013-5717" source="SUSE CVE"/>
    <description>
    The Bluetooth HCI ACL dissector in Wireshark 1.10.x before 1.10.2 does not properly maintain a certain free list, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that is not properly handled by the wmem_block_alloc function in epan/wmem/wmem_allocator_block.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5717/">CVE-2013-5717</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5718" ref_url="https://www.suse.com/security/cve/CVE-2013-5718" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not restrict the dch_id value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5718/">CVE-2013-5718</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5719" ref_url="https://www.suse.com/security/cve/CVE-2013-5719" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5719/">CVE-2013-5719</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5720" ref_url="https://www.suse.com/security/cve/CVE-2013-5720" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the RTPS dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5720/">CVE-2013-5720</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5721" ref_url="https://www.suse.com/security/cve/CVE-2013-5721" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5721/">CVE-2013-5721</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5722" ref_url="https://www.suse.com/security/cve/CVE-2013-5722" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-09/msg00052.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5722/">CVE-2013-5722</cve>
	<bugzilla href="https://bugzilla.suse.com/839607">SUSE bug 839607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5772" ref_url="https://www.suse.com/security/cve/CVE-2013-5772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and earlier and Java SE 6u60 and earlier allows remote attackers to affect integrity via unknown vectors related to jhat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5772/">CVE-2013-5772</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5774" ref_url="https://www.suse.com/security/cve/CVE-2013-5774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5774/">CVE-2013-5774</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5778" ref_url="https://www.suse.com/security/cve/CVE-2013-5778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5778/">CVE-2013-5778</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5780" ref_url="https://www.suse.com/security/cve/CVE-2013-5780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5780/">CVE-2013-5780</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5782" ref_url="https://www.suse.com/security/cve/CVE-2013-5782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5782/">CVE-2013-5782</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5783" ref_url="https://www.suse.com/security/cve/CVE-2013-5783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5783/">CVE-2013-5783</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5784" ref_url="https://www.suse.com/security/cve/CVE-2013-5784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to SCRIPTING.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5784/">CVE-2013-5784</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5790" ref_url="https://www.suse.com/security/cve/CVE-2013-5790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to BEANS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5790/">CVE-2013-5790</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5797" ref_url="https://www.suse.com/security/cve/CVE-2013-5797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and JavaFX 2.2.40 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5797/">CVE-2013-5797</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5800" ref_url="https://www.suse.com/security/cve/CVE-2013-5800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5800/">CVE-2013-5800</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5802" ref_url="https://www.suse.com/security/cve/CVE-2013-5802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5802/">CVE-2013-5802</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5803" ref_url="https://www.suse.com/security/cve/CVE-2013-5803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5803/">CVE-2013-5803</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5804" ref_url="https://www.suse.com/security/cve/CVE-2013-5804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, and JRockit R27.7.6 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5804/">CVE-2013-5804</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5805" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5805" ref_url="https://www.suse.com/security/cve/CVE-2013-5805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5806.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5805/">CVE-2013-5805</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5806" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5806" ref_url="https://www.suse.com/security/cve/CVE-2013-5806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5805.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5806/">CVE-2013-5806</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5809" ref_url="https://www.suse.com/security/cve/CVE-2013-5809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5829.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5809/">CVE-2013-5809</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5814" ref_url="https://www.suse.com/security/cve/CVE-2013-5814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5814/">CVE-2013-5814</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5817" ref_url="https://www.suse.com/security/cve/CVE-2013-5817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5817/">CVE-2013-5817</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5820" ref_url="https://www.suse.com/security/cve/CVE-2013-5820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5820/">CVE-2013-5820</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5823" ref_url="https://www.suse.com/security/cve/CVE-2013-5823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5823/">CVE-2013-5823</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5825" ref_url="https://www.suse.com/security/cve/CVE-2013-5825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5825/">CVE-2013-5825</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5829" ref_url="https://www.suse.com/security/cve/CVE-2013-5829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5809.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5829/">CVE-2013-5829</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5830" ref_url="https://www.suse.com/security/cve/CVE-2013-5830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5830/">CVE-2013-5830</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5840" ref_url="https://www.suse.com/security/cve/CVE-2013-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5840/">CVE-2013-5840</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5842" ref_url="https://www.suse.com/security/cve/CVE-2013-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5842/">CVE-2013-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5849" ref_url="https://www.suse.com/security/cve/CVE-2013-5849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5849/">CVE-2013-5849</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5850" ref_url="https://www.suse.com/security/cve/CVE-2013-5850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5842.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-5850/">CVE-2013-5850</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5851" ref_url="https://www.suse.com/security/cve/CVE-2013-5851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1677-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00128.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5851/">CVE-2013-5851</cve>
	<bugzilla href="https://bugzilla.suse.com/846177">SUSE bug 846177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/846999">SUSE bug 846999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/849212">SUSE bug 849212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852367">SUSE bug 852367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5878" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5878" ref_url="https://www.suse.com/security/cve/CVE-2013-5878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU.  Oracle has not commented on third-party claims that the Security component does not properly handle null XML namespace (xmlns) attributes during XML document canonicalization, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5878/">CVE-2013-5878</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5884" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5884" ref_url="https://www.suse.com/security/cve/CVE-2013-5884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an incorrect check for code permissions by CORBA stub factories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5884/">CVE-2013-5884</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5893" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5893" ref_url="https://www.suse.com/security/cve/CVE-2013-5893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u45 and Java SE Embedded 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to improper handling of methods in MethodHandles in HotSpot JVM, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5893/">CVE-2013-5893</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5896" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5896" ref_url="https://www.suse.com/security/cve/CVE-2013-5896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that com.sun.corba.se and its sub-packages are not included on the restricted package list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5896/">CVE-2013-5896</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5907" ref_url="https://www.suse.com/security/cve/CVE-2013-5907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5907/">CVE-2013-5907</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-5910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5910" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-5910" ref_url="https://www.suse.com/security/cve/CVE-2013-5910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that CanonicalizerBase.java in the XML canonicalizer allows untrusted code to access mutable byte arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5910/">CVE-2013-5910</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6075" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6075" ref_url="https://www.suse.com/security/cve/CVE-2013-6075" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1646-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1651-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00018.html" source="SUSE-SU"/>
    <description>
    The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6075/">CVE-2013-6075</cve>
	<bugzilla href="https://bugzilla.suse.com/847506">SUSE bug 847506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6076" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6076" ref_url="https://www.suse.com/security/cve/CVE-2013-6076" source="SUSE CVE"/>
    <description>
    strongSwan 5.0.2 through 5.1.0 allows remote attackers to cause a denial of service (NULL pointer dereference and charon daemon crash) via a crafted IKEv1 fragmentation packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6076/">CVE-2013-6076</cve>
	<bugzilla href="https://bugzilla.suse.com/847509">SUSE bug 847509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6336" ref_url="https://www.suse.com/security/cve/CVE-2013-6336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6336/">CVE-2013-6336</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6337" ref_url="https://www.suse.com/security/cve/CVE-2013-6337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6337/">CVE-2013-6337</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6338" ref_url="https://www.suse.com/security/cve/CVE-2013-6338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6338/">CVE-2013-6338</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6339" ref_url="https://www.suse.com/security/cve/CVE-2013-6339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6339/">CVE-2013-6339</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6340" ref_url="https://www.suse.com/security/cve/CVE-2013-6340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000653.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6340/">CVE-2013-6340</cve>
	<bugzilla href="https://bugzilla.suse.com/848738">SUSE bug 848738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6369" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0978-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00009.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<bugzilla href="https://bugzilla.suse.com/870855">SUSE bug 870855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140689" comment="libjbig2-2.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140690" comment="libjbig2-32bit-2.0-12.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6370" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0558-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00059.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<bugzilla href="https://bugzilla.suse.com/870147">SUSE bug 870147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141113" comment="rsyslog-diag-tools-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141114" comment="rsyslog-doc-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141115" comment="rsyslog-module-gssapi-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141116" comment="rsyslog-module-gtls-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141117" comment="rsyslog-module-mysql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141118" comment="rsyslog-module-pgsql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141119" comment="rsyslog-module-relp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141120" comment="rsyslog-module-snmp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141121" comment="rsyslog-module-udpspoof-8.4.0-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6371" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0558-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00059.html" source="SUSE-SU"/>
    <description>
    The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<bugzilla href="https://bugzilla.suse.com/870147">SUSE bug 870147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140691" comment="libjson-c2-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140692" comment="libjson-c2-32bit-0.11-2.22 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141113" comment="rsyslog-diag-tools-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141114" comment="rsyslog-doc-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141115" comment="rsyslog-module-gssapi-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141116" comment="rsyslog-module-gtls-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141117" comment="rsyslog-module-mysql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141118" comment="rsyslog-module-pgsql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141119" comment="rsyslog-module-relp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141120" comment="rsyslog-module-snmp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141121" comment="rsyslog-module-udpspoof-8.4.0-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6381</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6381" ref_url="https://www.suse.com/security/cve/CVE-2013-6381" source="SUSE CVE"/>
    <description>
    Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6381/">CVE-2013-6381</cve>
	<bugzilla href="https://bugzilla.suse.com/852552">SUSE bug 852552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6393" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0272-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0381-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" source="SUSE-SU"/>
    <description>
    The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<bugzilla href="https://bugzilla.suse.com/860617">SUSE bug 860617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6394</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6394" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6394" ref_url="https://www.suse.com/security/cve/CVE-2013-6394" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1864-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00044.html" source="SUSE-SU"/>
    <description>
    Percona XtraBackup before 2.1.6 uses a constant string for the initialization vector (IV), which makes it easier for local users to defeat cryptographic protection mechanisms and conduct plaintext attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6394/">CVE-2013-6394</cve>
	<bugzilla href="https://bugzilla.suse.com/1019858">SUSE bug 1019858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852224">SUSE bug 852224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/860488">SUSE bug 860488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339425" comment="xtrabackup is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6399" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6399" ref_url="https://www.suse.com/security/cve/CVE-2013-6399" source="SUSE CVE"/>
    <description>
    Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6399/">CVE-2013-6399</cve>
	<bugzilla href="https://bugzilla.suse.com/864814">SUSE bug 864814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964643">SUSE bug 964643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6401" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6401" ref_url="https://www.suse.com/security/cve/CVE-2013-6401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0394-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00057.html" source="SUSE-SU"/>
    <description>
    Jansson, possibly 2.4 and earlier, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted JSON document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6401/">CVE-2013-6401</cve>
	<bugzilla href="https://bugzilla.suse.com/863301">SUSE bug 863301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140861" comment="libjansson4-2.7-1.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6402" ref_url="https://www.suse.com/security/cve/CVE-2013-6402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0188-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0127-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0146-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00098.html" source="SUSE-SU"/>
    <description>
    base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.11 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hp-pkservice.log temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6402/">CVE-2013-6402</cve>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140679" comment="hplip-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140680" comment="hplip-hpijs-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140681" comment="hplip-sane-3.14.6-3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6418" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000804.html" source="SUSE-SU"/>
    <description>
    PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which allows man-in-the-middle attackers to spoof a peer via an arbitrary certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<bugzilla href="https://bugzilla.suse.com/856323">SUSE bug 856323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141085" comment="python-pywbem-0.7.0-4.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6424" ref_url="https://www.suse.com/security/cve/CVE-2013-6424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0051-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000844.html" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00127.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6424/">CVE-2013-6424</cve>
	<bugzilla href="https://bugzilla.suse.com/853846">SUSE bug 853846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6427" ref_url="https://www.suse.com/security/cve/CVE-2013-6427" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0127-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00087.html" source="SUSE-SU"/>
    <description>
    upgrade.py in the hp-upgrade service in HP Linux Imaging and Printing (HPLIP) 3.x through 3.13.11 launches a program from an http URL, which allows man-in-the-middle attackers to execute arbitrary code by gaining control over the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6427/">CVE-2013-6427</cve>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/853405">SUSE bug 853405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900460">SUSE bug 900460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933191">SUSE bug 933191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140679" comment="hplip-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140680" comment="hplip-hpijs-3.14.6-3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140681" comment="hplip-sane-3.14.6-3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6435" ref_url="https://www.suse.com/security/cve/CVE-2013-6435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1716-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00100.html" source="SUSE-SU"/>
    <description>
    Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6435/">CVE-2013-6435</cve>
	<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141108" comment="rpm-4.11.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141109" comment="rpm-32bit-4.11.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141110" comment="rpm-build-4.11.2-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6436" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6436" ref_url="https://www.suse.com/security/cve/CVE-2013-6436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000707.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0010-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00004.html" source="SUSE-SU"/>
    <description>
    The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the "virsh memtune" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6436/">CVE-2013-6436</cve>
	<bugzilla href="https://bugzilla.suse.com/854486">SUSE bug 854486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6438" ref_url="https://www.suse.com/security/cve/CVE-2013-6438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1082-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1044-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00065.html" source="SUSE-SU"/>
    <description>
    The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6438/">CVE-2013-6438</cve>
	<bugzilla href="https://bugzilla.suse.com/869105">SUSE bug 869105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869106">SUSE bug 869106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6442" ref_url="https://www.suse.com/security/cve/CVE-2013-6442" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0404-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html" source="SUSE-SU"/>
    <description>
    The owner_set function in smbcacls.c in smbcacls in Samba 4.0.x before 4.0.16 and 4.1.x before 4.1.6 removes an ACL during use of a --chown or --chgrp option, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended administrative change.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6442/">CVE-2013-6442</cve>
	<bugzilla href="https://bugzilla.suse.com/855866">SUSE bug 855866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6449" ref_url="https://www.suse.com/security/cve/CVE-2013-6449" source="SUSE CVE"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0012-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0015-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6449/">CVE-2013-6449</cve>
	<bugzilla href="https://bugzilla.suse.com/856687">SUSE bug 856687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6450" ref_url="https://www.suse.com/security/cve/CVE-2013-6450" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0049-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00032.html" source="SUSE-SU"/>
    <description>
    The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6450/">CVE-2013-6450</cve>
	<bugzilla href="https://bugzilla.suse.com/857203">SUSE bug 857203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/861384">SUSE bug 861384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6457" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6457" ref_url="https://www.suse.com/security/cve/CVE-2013-6457" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
    <description>
    The libxlDomainGetNumaParameters function in the libxl driver (libxl/libxl_driver.c) in libvirt before 1.2.1 does not properly initialize the nodemap, which allows local users to cause a denial of service (invalid free operation and crash) or possibly execute arbitrary code via an inactive domain to the virsh numatune command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6457/">CVE-2013-6457</cve>
	<bugzilla href="https://bugzilla.suse.com/858824">SUSE bug 858824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6458" ref_url="https://www.suse.com/security/cve/CVE-2013-6458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0270-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00062.html" source="SUSE-SU"/>
    <description>
    Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6458/">CVE-2013-6458</cve>
	<bugzilla href="https://bugzilla.suse.com/857492">SUSE bug 857492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0073-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0075-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00052.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<bugzilla href="https://bugzilla.suse.com/854915">SUSE bug 854915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882908">SUSE bug 882908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6473" ref_url="https://www.suse.com/security/cve/CVE-2013-6473" source="SUSE CVE"/>
    <description>
    Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6473/">CVE-2013-6473</cve>
	<bugzilla href="https://bugzilla.suse.com/866302">SUSE bug 866302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6474" ref_url="https://www.suse.com/security/cve/CVE-2013-6474" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6474/">CVE-2013-6474</cve>
	<bugzilla href="https://bugzilla.suse.com/866302">SUSE bug 866302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6475" ref_url="https://www.suse.com/security/cve/CVE-2013-6475" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6475/">CVE-2013-6475</cve>
	<bugzilla href="https://bugzilla.suse.com/866302">SUSE bug 866302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6476" ref_url="https://www.suse.com/security/cve/CVE-2013-6476" source="SUSE CVE"/>
    <description>
    The OPVPWrapper::loadDriver function in oprs/OPVPWrapper.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows local users to gain privileges via a Trojan horse driver in the same directory as the PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6476/">CVE-2013-6476</cve>
	<bugzilla href="https://bugzilla.suse.com/866302">SUSE bug 866302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6497" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00023.html" source="SUSE-SU"/>
    <description>
    clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906077">SUSE bug 906077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6629" ref_url="https://www.suse.com/security/cve/CVE-2013-6629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0065-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6629/">CVE-2013-6629</cve>
	<bugzilla href="https://bugzilla.suse.com/850430">SUSE bug 850430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880246">SUSE bug 880246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6630" ref_url="https://www.suse.com/security/cve/CVE-2013-6630" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:1776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0065-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6630/">CVE-2013-6630</cve>
	<bugzilla href="https://bugzilla.suse.com/850430">SUSE bug 850430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6639</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6639" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6639" ref_url="https://www.suse.com/security/cve/CVE-2013-6639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1933-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1962-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0065-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" source="SUSE-SU"/>
    <description>
    The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via JavaScript code that sets the value of an array element with a crafted index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6639/">CVE-2013-6639</cve>
	<bugzilla href="https://bugzilla.suse.com/854473">SUSE bug 854473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6640</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6640" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6640" ref_url="https://www.suse.com/security/cve/CVE-2013-6640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1933-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1962-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0065-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00063.html" source="SUSE-SU"/>
    <description>
    The DehoistArrayIndex function in hydrogen-dehoist.cc (aka hydrogen.cc) in Google V8 before 3.22.24.7, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service (out-of-bounds read) via JavaScript code that sets a variable to the value of an array element with a crafted index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6640/">CVE-2013-6640</cve>
	<bugzilla href="https://bugzilla.suse.com/854473">SUSE bug 854473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6668</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6668" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6668" ref_url="https://www.suse.com/security/cve/CVE-2013-6668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10, as used in Google Chrome before 33.0.1750.146, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6668/">CVE-2013-6668</cve>
	<bugzilla href="https://bugzilla.suse.com/866959">SUSE bug 866959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6671" ref_url="https://www.suse.com/security/cve/CVE-2013-6671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2013-6671/">CVE-2013-6671</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6672" ref_url="https://www.suse.com/security/cve/CVE-2013-6672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6672/">CVE-2013-6672</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6673" ref_url="https://www.suse.com/security/cve/CVE-2013-6673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1919-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2013-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1916-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1917-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1918-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1957-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1959-1" ref_url="https://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6673/">CVE-2013-6673</cve>
	<bugzilla href="https://bugzilla.suse.com/854370">SUSE bug 854370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6954" ref_url="https://www.suse.com/security/cve/CVE-2013-6954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0100-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6954/">CVE-2013-6954</cve>
	<bugzilla href="https://bugzilla.suse.com/856522">SUSE bug 856522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7038" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7038" ref_url="https://www.suse.com/security/cve/CVE-2013-7038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002945.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1676-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00089.html" source="SUSE-SU"/>
    <description>
    The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow remote attackers to obtain sensitive information or cause a denial of service (crash) via unspecified vectors that trigger an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7038/">CVE-2013-7038</cve>
	<bugzilla href="https://bugzilla.suse.com/854443">SUSE bug 854443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550335" comment="libmicrohttpd10-0.9.30-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7039" ref_url="https://www.suse.com/security/cve/CVE-2013-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002945.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1676-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00089.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2013-7039/">CVE-2013-7039</cve>
	<bugzilla href="https://bugzilla.suse.com/854443">SUSE bug 854443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550335" comment="libmicrohttpd10-0.9.30-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7112" ref_url="https://www.suse.com/security/cve/CVE-2013-7112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00014.html" source="SUSE-SU"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7112/">CVE-2013-7112</cve>
	<bugzilla href="https://bugzilla.suse.com/856498">SUSE bug 856498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7113" ref_url="https://www.suse.com/security/cve/CVE-2013-7113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7113/">CVE-2013-7113</cve>
	<bugzilla href="https://bugzilla.suse.com/856495">SUSE bug 856495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7114" ref_url="https://www.suse.com/security/cve/CVE-2013-7114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0013-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0017-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7114/">CVE-2013-7114</cve>
	<bugzilla href="https://bugzilla.suse.com/856496">SUSE bug 856496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7239</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7239" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7239" ref_url="https://www.suse.com/security/cve/CVE-2013-7239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0867-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0951-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00041.html" source="SUSE-SU"/>
    <description>
    memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7239/">CVE-2013-7239</cve>
	<bugzilla href="https://bugzilla.suse.com/857188">SUSE bug 857188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263</cve>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7285</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7285" ref_url="https://www.suse.com/security/cve/CVE-2013-7285" source="SUSE CVE"/>
    <description>
    Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-7285/">CVE-2013-7285</cve>
	<bugzilla href="https://bugzilla.suse.com/1142383">SUSE bug 1142383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193824">SUSE bug 1193824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875241">SUSE bug 875241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7290</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7290" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7290" ref_url="https://www.suse.com/security/cve/CVE-2013-7290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0867-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0951-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00041.html" source="SUSE-SU"/>
    <description>
    The do_item_get function in items.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr, a different vulnerability than CVE-2013-0179.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-7290/">CVE-2013-7290</cve>
	<bugzilla href="https://bugzilla.suse.com/858677">SUSE bug 858677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7291</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7291" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7291" ref_url="https://www.suse.com/security/cve/CVE-2013-7291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0867-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0951-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00041.html" source="SUSE-SU"/>
    <description>
    memcached before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (crash) via a request that triggers an "unbounded key print" during logging, related to an issue that was "quickly grepped out of the source tree," a different vulnerability than CVE-2013-0179 and CVE-2013-7290.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-7291/">CVE-2013-7291</cve>
	<bugzilla href="https://bugzilla.suse.com/858676">SUSE bug 858676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0604-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0618-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<bugzilla href="https://bugzilla.suse.com/873124">SUSE bug 873124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0604-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0618-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<bugzilla href="https://bugzilla.suse.com/873123">SUSE bug 873123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<bugzilla href="https://bugzilla.suse.com/915526">SUSE bug 915526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0747-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0749-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0754-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0756-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446</cve>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002336.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2366-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2374-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00089.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<bugzilla href="https://bugzilla.suse.com/966682">SUSE bug 966682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140555" comment="eog-3.20.4-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140556" comment="eog-lang-3.20.4-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140657" comment="gtk2-data-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140658" comment="gtk2-lang-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140659" comment="gtk2-tools-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140660" comment="gtk2-tools-32bit-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140661" comment="libgtk-2_0-0-2.24.31-7.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140662" comment="libgtk-2_0-0-32bit-2.24.31-7.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7459</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7459" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7459" ref_url="https://www.suse.com/security/cve/CVE-2013-7459" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00022.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7459/">CVE-2013-7459</cve>
	<bugzilla href="https://bugzilla.suse.com/1017420">SUSE bug 1017420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047666">SUSE bug 1047666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087140">SUSE bug 1087140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594272" comment="python-pycrypto-2.6.1-10.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7490" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7490" ref_url="https://www.suse.com/security/cve/CVE-2013-7490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-7490/">CVE-2013-7490</cve>
	<bugzilla href="https://bugzilla.suse.com/1176496">SUSE bug 1176496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531376" comment="perl-DBI-1.628-5.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551754" comment="perl-DBI-1.628-5.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595831" comment="perl-DBI-1.628-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0004" ref_url="https://www.suse.com/security/cve/CVE-2014-0004" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0389-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00053.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in udisks before 1.0.5 and 2.x before 2.1.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long mount point.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0004/">CVE-2014-0004</cve>
	<bugzilla href="https://bugzilla.suse.com/865854">SUSE bug 865854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140969" comment="libudisks2-0-2.1.3-1.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140970" comment="udisks2-2.1.3-1.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140971" comment="udisks2-lang-2.1.3-1.14 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0011" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0011" ref_url="https://www.suse.com/security/cve/CVE-2014-0011" source="SUSE CVE"/>
    <description>
    Multiple heap-based buffer overflows in the ZRLE_DECODE function in common/rfb/zrleDecode.h in TigerVNC before 1.3.1, when NDEBUG is enabled, allow remote VNC servers to cause a denial of service (vncviewer crash) and possibly execute arbitrary code via vectors related to screen image rendering.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0011/">CVE-2014-0011</cve>
	<bugzilla href="https://bugzilla.suse.com/869307">SUSE bug 869307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140770" comment="libXvnc1-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140771" comment="tigervnc-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140772" comment="xorg-x11-Xvnc-1.6.0-12.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0015" ref_url="https://www.suse.com/security/cve/CVE-2014-0015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0175-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0267-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0274-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00066.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0015/">CVE-2014-0015</cve>
	<bugzilla href="https://bugzilla.suse.com/858673">SUSE bug 858673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0016" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0016" ref_url="https://www.suse.com/security/cve/CVE-2014-0016" source="SUSE CVE"/>
    <description>
    stunnel before 5.00, when using fork threading, does not properly update the state of the OpenSSL pseudo-random number generator (PRNG), which causes subsequent children with the same process ID to use the same entropy pool and allows remote attackers to obtain private keys for EC (ECDSA) or DSA certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0016/">CVE-2014-0016</cve>
	<bugzilla href="https://bugzilla.suse.com/866278">SUSE bug 866278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/866286">SUSE bug 866286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110494" comment="stunnel-5.00-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0019" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001850.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0760-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<bugzilla href="https://bugzilla.suse.com/860991">SUSE bug 860991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927161">SUSE bug 927161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0021" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0021" ref_url="https://www.suse.com/security/cve/CVE-2014-0021" source="SUSE CVE"/>
    <description>
    Chrony before 1.29.1 has traffic amplification in cmdmon protocol
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0021/">CVE-2014-0021</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140487" comment="chrony-2.3-3.110 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0028" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0028" ref_url="https://www.suse.com/security/cve/CVE-2014-0028" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
    <description>
    libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0028/">CVE-2014-0028</cve>
	<bugzilla href="https://bugzilla.suse.com/859051">SUSE bug 859051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0038" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0038" ref_url="https://www.suse.com/security/cve/CVE-2014-0038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html" source="SUSE-SU"/>
    <description>
    The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0038/">CVE-2014-0038</cve>
	<bugzilla href="https://bugzilla.suse.com/860993">SUSE bug 860993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0548-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="TID7021937" ref_url="https://www.suse.com/support/kb/doc/?id=7021937" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00041.html" source="SUSE-SU"/>
    <description>
    MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050</cve>
	<bugzilla href="https://bugzilla.suse.com/862781">SUSE bug 862781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140687" comment="jakarta-commons-fileupload-1.1.1-120.238 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140688" comment="jakarta-commons-fileupload-javadoc-1.1.1-120.238 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0060" ref_url="https://www.suse.com/security/cve/CVE-2014-0060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0060/">CVE-2014-0060</cve>
	<bugzilla href="https://bugzilla.suse.com/864845">SUSE bug 864845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0061" ref_url="https://www.suse.com/security/cve/CVE-2014-0061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0061/">CVE-2014-0061</cve>
	<bugzilla href="https://bugzilla.suse.com/864846">SUSE bug 864846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0062" ref_url="https://www.suse.com/security/cve/CVE-2014-0062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0062/">CVE-2014-0062</cve>
	<bugzilla href="https://bugzilla.suse.com/864847">SUSE bug 864847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0063" ref_url="https://www.suse.com/security/cve/CVE-2014-0063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0063/">CVE-2014-0063</cve>
	<bugzilla href="https://bugzilla.suse.com/864850">SUSE bug 864850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0064" ref_url="https://www.suse.com/security/cve/CVE-2014-0064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow.  NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0064/">CVE-2014-0064</cve>
	<bugzilla href="https://bugzilla.suse.com/864851">SUSE bug 864851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871307">SUSE bug 871307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0065" ref_url="https://www.suse.com/security/cve/CVE-2014-0065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0065/">CVE-2014-0065</cve>
	<bugzilla href="https://bugzilla.suse.com/864852">SUSE bug 864852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0066" ref_url="https://www.suse.com/security/cve/CVE-2014-0066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0066/">CVE-2014-0066</cve>
	<bugzilla href="https://bugzilla.suse.com/864853">SUSE bug 864853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0067" ref_url="https://www.suse.com/security/cve/CVE-2014-0067" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html" source="SUSE-SU"/>
    <description>
    The "make check" command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0067/">CVE-2014-0067</cve>
	<bugzilla href="https://bugzilla.suse.com/864856">SUSE bug 864856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872783">SUSE bug 872783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0076" ref_url="https://www.suse.com/security/cve/CVE-2014-0076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0480-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0076/">CVE-2014-0076</cve>
	<bugzilla href="https://bugzilla.suse.com/869945">SUSE bug 869945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0077</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077</cve>
	<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870576">SUSE bug 870576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0092" ref_url="https://www.suse.com/security/cve/CVE-2014-0092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00009.html" source="SUSE-SU"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0092/">CVE-2014-0092</cve>
	<bugzilla href="https://bugzilla.suse.com/865804">SUSE bug 865804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915878">SUSE bug 915878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0098" ref_url="https://www.suse.com/security/cve/CVE-2014-0098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1082-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1044-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00065.html" source="SUSE-SU"/>
    <description>
    The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0098/">CVE-2014-0098</cve>
	<bugzilla href="https://bugzilla.suse.com/869106">SUSE bug 869106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0948-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00038.html" source="SUSE-SU"/>
    <description>
    The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<bugzilla href="https://bugzilla.suse.com/870082">SUSE bug 870082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141158" comment="xalan-j2-2.7.0-264.38 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0114</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0114" ref_url="https://www.suse.com/security/cve/CVE-2014-0114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021937" ref_url="https://www.suse.com/support/kb/doc/?id=7021937" source="SUSE-SU"/>
    <description>
    Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0114/">CVE-2014-0114</cve>
	<bugzilla href="https://bugzilla.suse.com/778464">SUSE bug 778464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875455">SUSE bug 875455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885963">SUSE bug 885963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0117" ref_url="https://www.suse.com/security/cve/CVE-2014-0117" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1044-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0117/">CVE-2014-0117</cve>
	<bugzilla href="https://bugzilla.suse.com/887767">SUSE bug 887767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0118" ref_url="https://www.suse.com/security/cve/CVE-2014-0118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0118/">CVE-2014-0118</cve>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/887769">SUSE bug 887769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0138" ref_url="https://www.suse.com/security/cve/CVE-2014-0138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0530-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0598-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00009.html" source="SUSE-SU"/>
    <description>
    The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0138/">CVE-2014-0138</cve>
	<bugzilla href="https://bugzilla.suse.com/868627">SUSE bug 868627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0530-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0598-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00009.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<bugzilla href="https://bugzilla.suse.com/868629">SUSE bug 868629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880252">SUSE bug 880252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882520">SUSE bug 882520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0142" ref_url="https://www.suse.com/security/cve/CVE-2014-0142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    QEMU, possibly before 2.0.0, allows local users to cause a denial of service (divide-by-zero error and crash) via a zero value in the (1) tracks field to the seek_to_sector function in block/parallels.c or (2) extent_size field in the bochs function in block/bochs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0142/">CVE-2014-0142</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0143" ref_url="https://www.suse.com/security/cve/CVE-2014-0143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0143/">CVE-2014-0143</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0144" ref_url="https://www.suse.com/security/cve/CVE-2014-0144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0144/">CVE-2014-0144</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0145" ref_url="https://www.suse.com/security/cve/CVE-2014-0145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0145/">CVE-2014-0145</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0146" ref_url="https://www.suse.com/security/cve/CVE-2014-0146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    The qcow2_open function in the (block/qcow2.c) in QEMU before 1.7.2 and 2.x before 2.0.0 allows local users to cause a denial of service (NULL pointer dereference) via a crafted image which causes an error, related to the initialization of the snapshot_offset and nb_snapshots fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0146/">CVE-2014-0146</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0147" ref_url="https://www.suse.com/security/cve/CVE-2014-0147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0147/">CVE-2014-0147</cve>
	<bugzilla href="https://bugzilla.suse.com/870439">SUSE bug 870439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0150" ref_url="https://www.suse.com/security/cve/CVE-2014-0150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000876.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0150/">CVE-2014-0150</cve>
	<bugzilla href="https://bugzilla.suse.com/873235">SUSE bug 873235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0160" ref_url="https://www.suse.com/security/cve/CVE-2014-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2014:002" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7014878" ref_url="https://www.suse.com/support/kb/doc/?id=7014878" source="SUSE-SU"/>
		<reference ref_id="TID7014879" ref_url="https://www.suse.com/support/kb/doc?id=7014879" source="SUSE-SU"/>
		<reference ref_id="TID7014920" ref_url="https://www.suse.com/support/kb/doc/?id=7014920" source="SUSE-SU"/>
		<reference ref_id="TID7014929" ref_url="https://www.suse.com/support/kb/doc/?id=7014929" source="SUSE-SU"/>
		<reference ref_id="TID7014961" ref_url="https://www.suse.com/support/kb/doc/?id=7014961" source="SUSE-SU"/>
		<reference ref_id="TID7014998" ref_url="https://www.suse.com/support/kb/doc/?id=7014998" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021434" ref_url="https://www.suse.com/support/kb/doc/?id=7021434" source="SUSE-SU"/>
		<reference ref_id="TID7021489" ref_url="https://www.suse.com/support/kb/doc/?id=7021489" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021738" ref_url="https://www.suse.com/support/kb/doc/?id=7021738" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021874" ref_url="https://www.suse.com/support/kb/doc/?id=7021874" source="SUSE-SU"/>
		<reference ref_id="TID7021901" ref_url="https://www.suse.com/support/kb/doc/?id=7021901" source="SUSE-SU"/>
		<reference ref_id="TID7021974" ref_url="https://www.suse.com/support/kb/doc/?id=7021974" source="SUSE-SU"/>
		<reference ref_id="TID7021992" ref_url="https://www.suse.com/support/kb/doc/?id=7021992" source="SUSE-SU"/>
		<reference ref_id="TID7022038" ref_url="https://www.suse.com/support/kb/doc/?id=7022038" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00079.html" source="SUSE-SU"/>
    <description>
    The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0160/">CVE-2014-0160</cve>
	<bugzilla href="https://bugzilla.suse.com/872299">SUSE bug 872299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0172" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0172" ref_url="https://www.suse.com/security/cve/CVE-2014-0172" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00005.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0172/">CVE-2014-0172</cve>
	<bugzilla href="https://bugzilla.suse.com/872785">SUSE bug 872785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106097" comment="libasm1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0178" ref_url="https://www.suse.com/security/cve/CVE-2014-0178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
    <description>
    Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0178/">CVE-2014-0178</cve>
	<bugzilla href="https://bugzilla.suse.com/872396">SUSE bug 872396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0179" ref_url="https://www.suse.com/security/cve/CVE-2014-0179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000863.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0650-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html" source="SUSE-SU"/>
    <description>
    libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.  NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0179/">CVE-2014-0179</cve>
	<bugzilla href="https://bugzilla.suse.com/873705">SUSE bug 873705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0182" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0182" ref_url="https://www.suse.com/security/cve/CVE-2014-0182" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0182/">CVE-2014-0182</cve>
	<bugzilla href="https://bugzilla.suse.com/874788">SUSE bug 874788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964693">SUSE bug 964693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0190" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0190" ref_url="https://www.suse.com/security/cve/CVE-2014-0190" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html" source="SUSE-SU"/>
    <description>
    The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via invalid width and height values in a GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0190/">CVE-2014-0190</cve>
	<bugzilla href="https://bugzilla.suse.com/875470">SUSE bug 875470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0701-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0716-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0741-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0753-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
    <description>
    The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876652">SUSE bug 876652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996079">SUSE bug 996079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0195" ref_url="https://www.suse.com/security/cve/CVE-2014-0195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0195/">CVE-2014-0195</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="TID7015061" ref_url="https://www.suse.com/support/kb/doc?id=7015061" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196</cve>
	<bugzilla href="https://bugzilla.suse.com/871252">SUSE bug 871252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879878">SUSE bug 879878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933423">SUSE bug 933423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0198" ref_url="https://www.suse.com/security/cve/CVE-2014-0198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0634-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00037.html" source="SUSE-SU"/>
    <description>
    The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0198/">CVE-2014-0198</cve>
	<bugzilla href="https://bugzilla.suse.com/876282">SUSE bug 876282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<bugzilla href="https://bugzilla.suse.com/857544">SUSE bug 857544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0221" ref_url="https://www.suse.com/security/cve/CVE-2014-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0221/">CVE-2014-0221</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0224" ref_url="https://www.suse.com/security/cve/CVE-2014-0224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015158" ref_url="https://www.suse.com/support/kb/doc/?id=7015158" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021432" ref_url="https://www.suse.com/support/kb/doc/?id=7021432" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021739" ref_url="https://www.suse.com/support/kb/doc/?id=7021739" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021990" ref_url="https://www.suse.com/support/kb/doc/?id=7021990" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="TID7022768" ref_url="https://www.suse.com/support/kb/doc/?id=7022768" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0224/">CVE-2014-0224</cve>
	<bugzilla href="https://bugzilla.suse.com/1146657">SUSE bug 1146657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/892403">SUSE bug 892403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903703">SUSE bug 903703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905018">SUSE bug 905018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914447">SUSE bug 914447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0226" ref_url="https://www.suse.com/security/cve/CVE-2014-0226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1082-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1044-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00065.html" source="SUSE-SU"/>
    <description>
    Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0226/">CVE-2014-0226</cve>
	<bugzilla href="https://bugzilla.suse.com/887765">SUSE bug 887765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0231" ref_url="https://www.suse.com/security/cve/CVE-2014-0231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1082-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1044-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1045-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00065.html" source="SUSE-SU"/>
    <description>
    The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0231/">CVE-2014-0231</cve>
	<bugzilla href="https://bugzilla.suse.com/887768">SUSE bug 887768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0239" ref_url="https://www.suse.com/security/cve/CVE-2014-0239" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
    <description>
    The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0239/">CVE-2014-0239</cve>
	<bugzilla href="https://bugzilla.suse.com/878642">SUSE bug 878642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0244" ref_url="https://www.suse.com/security/cve/CVE-2014-0244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00034.html" source="SUSE-SU"/>
    <description>
    The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0244/">CVE-2014-0244</cve>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0245</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0245" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0245" ref_url="https://www.suse.com/security/cve/CVE-2014-0245" source="SUSE CVE"/>
    <description>
    It was found that the implementation of the GTNSubjectCreatingInterceptor class in gatein-wsrp was not thread safe. For a specific WSRP endpoint, under high-concurrency scenarios or scenarios where SOAP messages take long to execute, it was possible for an unauthenticated remote attacker to gain privileged information if WS-Security is enabled for the WSRP Consumer, and the endpoint in question is being used by a privileged user. This affects JBoss Portal 6.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0245/">CVE-2014-0245</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0333" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0333" ref_url="https://www.suse.com/security/cve/CVE-2014-0333" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0358-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00029.html" source="SUSE-SU"/>
    <description>
    The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0333/">CVE-2014-0333</cve>
	<bugzilla href="https://bugzilla.suse.com/866298">SUSE bug 866298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0368" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0368" ref_url="https://www.suse.com/security/cve/CVE-2014-0368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and Java SE Embedded 7u45, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to incorrect permission checks when listening on a socket, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0368/">CVE-2014-0368</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0373" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0373" ref_url="https://www.suse.com/security/cve/CVE-2014-0373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to throwing of an incorrect exception when SnmpStatusException should have been used in the SNMP implementation, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0373/">CVE-2014-0373</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0376" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0376" ref_url="https://www.suse.com/security/cve/CVE-2014-0376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAXP.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an improper check for "code permissions when creating document builder factories."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0376/">CVE-2014-0376</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0408" ref_url="https://www.suse.com/security/cve/CVE-2014-0408" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u45, when running on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0408/">CVE-2014-0408</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0411" ref_url="https://www.suse.com/security/cve/CVE-2014-0411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information about encryption keys via a timing discrepancy during the TLS/SSL handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0411/">CVE-2014-0411</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0416" ref_url="https://www.suse.com/security/cve/CVE-2014-0416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAAS.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to how principals are set for the Subject class, which allows attackers to escape the sandbox using deserialization of a crafted Subject instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0416/">CVE-2014-0416</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0422" ref_url="https://www.suse.com/security/cve/CVE-2014-0422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to missing package access checks in the Naming / JNDI component, which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0422/">CVE-2014-0422</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0423" ref_url="https://www.suse.com/security/cve/CVE-2014-0423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote authenticated users to affect confidentiality and availability via unknown vectors related to Beans.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability in DocumentHandler.java, related to Beans decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0423/">CVE-2014-0423</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0428" ref_url="https://www.suse.com/security/cve/CVE-2014-0428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0266-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0174-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to "insufficient security checks in IIOP streams," which allows attackers to escape the sandbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0428/">CVE-2014-0428</cve>
	<bugzilla href="https://bugzilla.suse.com/858818">SUSE bug 858818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862064">SUSE bug 862064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0429" ref_url="https://www.suse.com/security/cve/CVE-2014-0429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0429/">CVE-2014-0429</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0446" ref_url="https://www.suse.com/security/cve/CVE-2014-0446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0446/">CVE-2014-0446</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0451" ref_url="https://www.suse.com/security/cve/CVE-2014-0451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-2412.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0451/">CVE-2014-0451</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0452" ref_url="https://www.suse.com/security/cve/CVE-2014-0452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0458 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0452/">CVE-2014-0452</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0453" ref_url="https://www.suse.com/security/cve/CVE-2014-0453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0453/">CVE-2014-0453</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0454" ref_url="https://www.suse.com/security/cve/CVE-2014-0454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0454/">CVE-2014-0454</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0455" ref_url="https://www.suse.com/security/cve/CVE-2014-0455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-2402.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0455/">CVE-2014-0455</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0456" ref_url="https://www.suse.com/security/cve/CVE-2014-0456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0456/">CVE-2014-0456</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0457" ref_url="https://www.suse.com/security/cve/CVE-2014-0457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0457/">CVE-2014-0457</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0458" ref_url="https://www.suse.com/security/cve/CVE-2014-0458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-2423.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0458/">CVE-2014-0458</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0459" ref_url="https://www.suse.com/security/cve/CVE-2014-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0459/">CVE-2014-0459</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0460" ref_url="https://www.suse.com/security/cve/CVE-2014-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0460/">CVE-2014-0460</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0461" ref_url="https://www.suse.com/security/cve/CVE-2014-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0461/">CVE-2014-0461</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0434-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0436-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<bugzilla href="https://bugzilla.suse.com/868115">SUSE bug 868115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141043" comment="mutt-1.6.0-54.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00009.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<bugzilla href="https://bugzilla.suse.com/887022">SUSE bug 887022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0537</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0537" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0537" ref_url="https://www.suse.com/security/cve/CVE-2014-0537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0539.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0537/">CVE-2014-0537</cve>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886472">SUSE bug 886472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685553" comment="rubygem-actionpack-4_2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0539</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0539" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0539" ref_url="https://www.suse.com/security/cve/CVE-2014-0539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0537.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-0539/">CVE-2014-0539</cve>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886472">SUSE bug 886472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685553" comment="rubygem-actionpack-4_2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0591" ref_url="https://www.suse.com/security/cve/CVE-2014-0591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00019.html" source="SUSE-SU"/>
    <description>
    The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0591/">CVE-2014-0591</cve>
	<bugzilla href="https://bugzilla.suse.com/858639">SUSE bug 858639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0691" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0691" ref_url="https://www.suse.com/security/cve/CVE-2014-0691" source="SUSE CVE"/>
    <description>
    Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0691/">CVE-2014-0691</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10070" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10070" ref_url="https://www.suse.com/security/cve/CVE-2014-10070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-10070/">CVE-2014-10070</cve>
	<bugzilla href="https://bugzilla.suse.com/1082885">SUSE bug 1082885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334085" comment="zsh is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10071" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10071" ref_url="https://www.suse.com/security/cve/CVE-2014-10071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the "&gt;&amp; fd" syntax.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10071/">CVE-2014-10071</cve>
	<bugzilla href="https://bugzilla.suse.com/1082977">SUSE bug 1082977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334085" comment="zsh is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201410072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-10072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-10072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10072" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-10072" ref_url="https://www.suse.com/security/cve/CVE-2014-10072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In utils.c in zsh before 5.0.6, there is a buffer overflow when scanning very long directory paths for symbolic links.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-10072/">CVE-2014-10072</cve>
	<bugzilla href="https://bugzilla.suse.com/1082975">SUSE bug 1082975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334085" comment="zsh is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1344" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1344" ref_url="https://www.suse.com/security/cve/CVE-2014-1344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1344/">CVE-2014-1344</cve>
	<bugzilla href="https://bugzilla.suse.com/879607">SUSE bug 879607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1384" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1384" ref_url="https://www.suse.com/security/cve/CVE-2014-1384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1384/">CVE-2014-1384</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1385" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1385" ref_url="https://www.suse.com/security/cve/CVE-2014-1385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1385/">CVE-2014-1385</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1386" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1386" ref_url="https://www.suse.com/security/cve/CVE-2014-1386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1386/">CVE-2014-1386</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1387" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1387" ref_url="https://www.suse.com/security/cve/CVE-2014-1387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1387/">CVE-2014-1387</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1388" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1388" ref_url="https://www.suse.com/security/cve/CVE-2014-1388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1388/">CVE-2014-1388</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1389" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1389" ref_url="https://www.suse.com/security/cve/CVE-2014-1389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1389/">CVE-2014-1389</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1390" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1390" ref_url="https://www.suse.com/security/cve/CVE-2014-1390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.1.6 and 7.x before 7.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in HT6367.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1390/">CVE-2014-1390</cve>
	<bugzilla href="https://bugzilla.suse.com/892084">SUSE bug 892084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1447" ref_url="https://www.suse.com/security/cve/CVE-2014-1447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0270-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-02/msg00062.html" source="SUSE-SU"/>
    <description>
    Race condition in the virNetServerClientStartKeepAlive function in libvirt before 1.2.1 allows remote attackers to cause a denial of service (libvirtd crash) by closing a connection before a keepalive response is sent.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1447/">CVE-2014-1447</cve>
	<bugzilla href="https://bugzilla.suse.com/858817">SUSE bug 858817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1477" ref_url="https://www.suse.com/security/cve/CVE-2014-1477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1477/">CVE-2014-1477</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862345">SUSE bug 862345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1478" ref_url="https://www.suse.com/security/cve/CVE-2014-1478" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the MPostWriteBarrier class in js/src/jit/MIR.h and stack alignment in js/src/jit/AsmJS.cpp in OdinMonkey, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1478/">CVE-2014-1478</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1479" ref_url="https://www.suse.com/security/cve/CVE-2014-1479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1479/">CVE-2014-1479</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862348">SUSE bug 862348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1480" ref_url="https://www.suse.com/security/cve/CVE-2014-1480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1480/">CVE-2014-1480</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1481" ref_url="https://www.suse.com/security/cve/CVE-2014-1481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1481/">CVE-2014-1481</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862309">SUSE bug 862309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1482" ref_url="https://www.suse.com/security/cve/CVE-2014-1482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1482/">CVE-2014-1482</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862356">SUSE bug 862356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1483" ref_url="https://www.suse.com/security/cve/CVE-2014-1483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information by using an IFRAME element in conjunction with certain timing measurements involving the document.caretPositionFromPoint and document.elementFromPoint functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1483/">CVE-2014-1483</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862360">SUSE bug 862360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1484" ref_url="https://www.suse.com/security/cve/CVE-2014-1484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1484/">CVE-2014-1484</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1485" ref_url="https://www.suse.com/security/cve/CVE-2014-1485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1485/">CVE-2014-1485</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1486" ref_url="https://www.suse.com/security/cve/CVE-2014-1486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1486/">CVE-2014-1486</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1487" ref_url="https://www.suse.com/security/cve/CVE-2014-1487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1487/">CVE-2014-1487</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1488" ref_url="https://www.suse.com/security/cve/CVE-2014-1488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving termination of a worker process that has performed a cross-thread object-passing operation in conjunction with use of asm.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1488/">CVE-2014-1488</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1489" ref_url="https://www.suse.com/security/cve/CVE-2014-1489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1489/">CVE-2014-1489</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1490" ref_url="https://www.suse.com/security/cve/CVE-2014-1490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1490/">CVE-2014-1490</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862300">SUSE bug 862300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1491" ref_url="https://www.suse.com/security/cve/CVE-2014-1491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0248-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1491/">CVE-2014-1491</cve>
	<bugzilla href="https://bugzilla.suse.com/861847">SUSE bug 861847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/862289">SUSE bug 862289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1492" ref_url="https://www.suse.com/security/cve/CVE-2014-1492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0665-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0599-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0629-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1492/">CVE-2014-1492</cve>
	<bugzilla href="https://bugzilla.suse.com/869827">SUSE bug 869827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1544" ref_url="https://www.suse.com/security/cve/CVE-2014-1544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1544/">CVE-2014-1544</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1545" ref_url="https://www.suse.com/security/cve/CVE-2014-1545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0824-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0855-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1545/">CVE-2014-1545</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129286" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129287" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1547" ref_url="https://www.suse.com/security/cve/CVE-2014-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1547/">CVE-2014-1547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1548" ref_url="https://www.suse.com/security/cve/CVE-2014-1548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1548/">CVE-2014-1548</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1553" ref_url="https://www.suse.com/security/cve/CVE-2014-1553" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1553/">CVE-2014-1553</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1554" ref_url="https://www.suse.com/security/cve/CVE-2014-1554" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1554/">CVE-2014-1554</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1555" ref_url="https://www.suse.com/security/cve/CVE-2014-1555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1555/">CVE-2014-1555</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1556" ref_url="https://www.suse.com/security/cve/CVE-2014-1556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1556/">CVE-2014-1556</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1557" ref_url="https://www.suse.com/security/cve/CVE-2014-1557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0950-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1557/">CVE-2014-1557</cve>
	<bugzilla href="https://bugzilla.suse.com/887746">SUSE bug 887746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1562" ref_url="https://www.suse.com/security/cve/CVE-2014-1562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1562/">CVE-2014-1562</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1563" ref_url="https://www.suse.com/security/cve/CVE-2014-1563" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1563/">CVE-2014-1563</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1564" ref_url="https://www.suse.com/security/cve/CVE-2014-1564" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 do not properly initialize memory for GIF rendering, which allows remote attackers to obtain sensitive information from process memory via crafted web script that interacts with a CANVAS element associated with a malformed GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1564/">CVE-2014-1564</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1565" ref_url="https://www.suse.com/security/cve/CVE-2014-1565" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The mozilla::dom::AudioEventTimeline function in the Web Audio API implementation in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 does not properly create audio timelines, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted API calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1565/">CVE-2014-1565</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1567" ref_url="https://www.suse.com/security/cve/CVE-2014-1567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1120-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-1567/">CVE-2014-1567</cve>
	<bugzilla href="https://bugzilla.suse.com/894370">SUSE bug 894370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1568" ref_url="https://www.suse.com/security/cve/CVE-2014-1568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1220-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00039.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1568/">CVE-2014-1568</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897890">SUSE bug 897890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898959">SUSE bug 898959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1574" ref_url="https://www.suse.com/security/cve/CVE-2014-1574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1574/">CVE-2014-1574</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1575" ref_url="https://www.suse.com/security/cve/CVE-2014-1575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1575/">CVE-2014-1575</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1576" ref_url="https://www.suse.com/security/cve/CVE-2014-1576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1576/">CVE-2014-1576</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1577" ref_url="https://www.suse.com/security/cve/CVE-2014-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1577/">CVE-2014-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1578" ref_url="https://www.suse.com/security/cve/CVE-2014-1578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1578/">CVE-2014-1578</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1581" ref_url="https://www.suse.com/security/cve/CVE-2014-1581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1581/">CVE-2014-1581</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1583" ref_url="https://www.suse.com/security/cve/CVE-2014-1583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
    <description>
    The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1583/">CVE-2014-1583</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1585" ref_url="https://www.suse.com/security/cve/CVE-2014-1585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote attackers to obtain sensitive information from the local camera by maintaining a session after the user tries to discontinue streaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1585/">CVE-2014-1585</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1586" ref_url="https://www.suse.com/security/cve/CVE-2014-1586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1458-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1345-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1346-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1586/">CVE-2014-1586</cve>
	<bugzilla href="https://bugzilla.suse.com/900941">SUSE bug 900941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1581-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1654-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1655-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1656-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<bugzilla href="https://bugzilla.suse.com/908009">SUSE bug 908009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1737</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737</cve>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1738</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738</cve>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1748" ref_url="https://www.suse.com/security/cve/CVE-2014-1748" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0783-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1748/">CVE-2014-1748</cve>
	<bugzilla href="https://bugzilla.suse.com/909707">SUSE bug 909707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1829" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1829" ref_url="https://www.suse.com/security/cve/CVE-2014-1829" source="SUSE CVE"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Requests (aka python-requests) before 2.3.0 allows remote servers to obtain a netrc password by reading the Authorization header in a redirected request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1829/">CVE-2014-1829</cve>
	<bugzilla href="https://bugzilla.suse.com/897658">SUSE bug 897658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141086" comment="python-requests-2.8.1-6.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1830" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1830" ref_url="https://www.suse.com/security/cve/CVE-2014-1830" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-1830/">CVE-2014-1830</cve>
	<bugzilla href="https://bugzilla.suse.com/897658">SUSE bug 897658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141086" comment="python-requests-2.8.1-6.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1876" ref_url="https://www.suse.com/security/cve/CVE-2014-1876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    The unpacker::redirect_stdio function in unpack.cpp in unpack200 in OpenJDK 6, 7, and 8; Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 does not securely create temporary files when a log file cannot be opened, which allows local users to overwrite arbitrary files via a symlink attack on /tmp/unpack.log.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1876/">CVE-2014-1876</cve>
	<bugzilla href="https://bugzilla.suse.com/863305">SUSE bug 863305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1912" ref_url="https://www.suse.com/security/cve/CVE-2014-1912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0518-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0597-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-1912/">CVE-2014-1912</cve>
	<bugzilla href="https://bugzilla.suse.com/1049392">SUSE bug 1049392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882915">SUSE bug 882915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1932" ref_url="https://www.suse.com/security/cve/CVE-2014-1932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0591-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html" source="SUSE-SU"/>
    <description>
    The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1932/">CVE-2014-1932</cve>
	<bugzilla href="https://bugzilla.suse.com/863541">SUSE bug 863541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921566">SUSE bug 921566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141082" comment="python-imaging-1.1.7-21.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1959" ref_url="https://www.suse.com/security/cve/CVE-2014-1959" source="SUSE CVE"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1959/">CVE-2014-1959</cve>
	<bugzilla href="https://bugzilla.suse.com/863989">SUSE bug 863989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865993">SUSE bug 865993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2015" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2015" ref_url="https://www.suse.com/security/cve/CVE-2014-2015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00016.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the normify function in the rlm_pap module (modules/rlm_pap/rlm_pap.c) in FreeRADIUS 2.x, possibly 2.2.3 and earlier, and 3.x, possibly 3.0.1 and earlier, might allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password hash, as demonstrated by an SSHA hash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2015/">CVE-2014-2015</cve>
	<bugzilla href="https://bugzilla.suse.com/864576">SUSE bug 864576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140576" comment="freeradius-server-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140577" comment="freeradius-server-doc-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140578" comment="freeradius-server-krb5-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140579" comment="freeradius-server-ldap-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140580" comment="freeradius-server-libs-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140581" comment="freeradius-server-mysql-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140582" comment="freeradius-server-perl-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140583" comment="freeradius-server-postgresql-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140584" comment="freeradius-server-python-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140585" comment="freeradius-server-sqlite-3.0.3-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140586" comment="freeradius-server-utils-3.0.3-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2029</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2029" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2029" ref_url="https://www.suse.com/security/cve/CVE-2014-2029" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0361-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00033.html" source="SUSE-SU"/>
    <description>
    The automatic version check functionality in the tools in Percona Toolkit 2.1 allows man-in-the-middle attackers to obtain sensitive information or execute arbitrary code by leveraging use of HTTP to download configuration information from v.percona.com.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2029/">CVE-2014-2029</cve>
	<bugzilla href="https://bugzilla.suse.com/864194">SUSE bug 864194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919298">SUSE bug 919298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339425" comment="xtrabackup is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2146</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2146" ref_url="https://www.suse.com/security/cve/CVE-2014-2146" source="SUSE CVE"/>
    <description>
    The Zone-Based Firewall (ZBFW) functionality in Cisco IOS, possibly 15.4 and earlier, and IOS XE, possibly 3.13 and earlier, mishandles zone checking for existing sessions, which allows remote attackers to bypass intended resource-access restrictions via spoofed traffic that matches one of these sessions, aka Bug IDs CSCun94946 and CSCun96847.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2146/">CVE-2014-2146</cve>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<bugzilla href="https://bugzilla.suse.com/867620">SUSE bug 867620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916867">SUSE bug 916867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2241" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2241" ref_url="https://www.suse.com/security/cve/CVE-2014-2241" source="SUSE CVE"/>
    <description>
    The (1) cf2_initLocalRegionBuffer and (2) cf2_initGlobalRegionBuffer functions in cff/cf2ft.c in FreeType before 2.5.3 do not properly check if a subroutine exists, which allows remote attackers to cause a denial of service (assertion failure), as demonstrated by a crafted ttf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2241/">CVE-2014-2241</cve>
	<bugzilla href="https://bugzilla.suse.com/867620">SUSE bug 867620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2281" ref_url="https://www.suse.com/security/cve/CVE-2014-2281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" source="SUSE-SU"/>
    <description>
    The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2281/">CVE-2014-2281</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2282" ref_url="https://www.suse.com/security/cve/CVE-2014-2282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
    <description>
    The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2282/">CVE-2014-2282</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2283" ref_url="https://www.suse.com/security/cve/CVE-2014-2283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2283/">CVE-2014-2283</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2284" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2284" ref_url="https://www.suse.com/security/cve/CVE-2014-2284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0398-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html" source="SUSE-SU"/>
    <description>
    The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2284/">CVE-2014-2284</cve>
	<bugzilla href="https://bugzilla.suse.com/866942">SUSE bug 866942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875217">SUSE bug 875217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2285" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2285" ref_url="https://www.suse.com/security/cve/CVE-2014-2285" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0398-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html" source="SUSE-SU"/>
    <description>
    The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2285/">CVE-2014-2285</cve>
	<bugzilla href="https://bugzilla.suse.com/866942">SUSE bug 866942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875217">SUSE bug 875217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2299" ref_url="https://www.suse.com/security/cve/CVE-2014-2299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0382-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0383-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-03/msg00047.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2299/">CVE-2014-2299</cve>
	<bugzilla href="https://bugzilla.suse.com/867485">SUSE bug 867485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2338" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2338" ref_url="https://www.suse.com/security/cve/CVE-2014-2338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0697-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0700-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00066.html" source="SUSE-SU"/>
    <description>
    IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2338/">CVE-2014-2338</cve>
	<bugzilla href="https://bugzilla.suse.com/870572">SUSE bug 870572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2397" ref_url="https://www.suse.com/security/cve/CVE-2014-2397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2397/">CVE-2014-2397</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2398" ref_url="https://www.suse.com/security/cve/CVE-2014-2398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2398/">CVE-2014-2398</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2402" ref_url="https://www.suse.com/security/cve/CVE-2014-2402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-0455.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2402/">CVE-2014-2402</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2403" ref_url="https://www.suse.com/security/cve/CVE-2014-2403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2403/">CVE-2014-2403</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2412" ref_url="https://www.suse.com/security/cve/CVE-2014-2412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, SE 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-0451.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2412/">CVE-2014-2412</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2413" ref_url="https://www.suse.com/security/cve/CVE-2014-2413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2413/">CVE-2014-2413</cve>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2414" ref_url="https://www.suse.com/security/cve/CVE-2014-2414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2414/">CVE-2014-2414</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2421" ref_url="https://www.suse.com/security/cve/CVE-2014-2421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2421/">CVE-2014-2421</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2423" ref_url="https://www.suse.com/security/cve/CVE-2014-2423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2423/">CVE-2014-2423</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2427" ref_url="https://www.suse.com/security/cve/CVE-2014-2427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0728-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0733-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2427/">CVE-2014-2427</cve>
	<bugzilla href="https://bugzilla.suse.com/873872">SUSE bug 873872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/873873">SUSE bug 873873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877429">SUSE bug 877429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877430">SUSE bug 877430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2483" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2483" ref_url="https://www.suse.com/security/cve/CVE-2014-2483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u60 and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-4223. NOTE: the previous information is from the July 2014 CPU. Oracle has not commented on another vendor's claim that the issue is related to improper restriction of the "use of privileged annotations."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2483/">CVE-2014-2483</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2490" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2490" ref_url="https://www.suse.com/security/cve/CVE-2014-2490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 7u60 and SE 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2490/">CVE-2014-2490</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2494" ref_url="https://www.suse.com/security/cve/CVE-2014-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2494/">CVE-2014-2494</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0873-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0784-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0786-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00025.html" source="SUSE-SU"/>
    <description>
    The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<bugzilla href="https://bugzilla.suse.com/868624">SUSE bug 868624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2524" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html" source="SUSE-SU"/>
    <description>
    The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524</cve>
	<bugzilla href="https://bugzilla.suse.com/868822">SUSE bug 868822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0500-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<bugzilla href="https://bugzilla.suse.com/868944">SUSE bug 868944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2583" ref_url="https://www.suse.com/security/cve/CVE-2014-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000812.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2583/">CVE-2014-2583</cve>
	<bugzilla href="https://bugzilla.suse.com/870433">SUSE bug 870433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141056" comment="pam-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141057" comment="pam-32bit-1.1.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141058" comment="pam-doc-1.1.8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2653" ref_url="https://www.suse.com/security/cve/CVE-2014-2653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000878.html" source="SUSE-SU"/>
    <description>
    The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2653/">CVE-2014-2653</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870532">SUSE bug 870532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2667" ref_url="https://www.suse.com/security/cve/CVE-2014-2667" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0596-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0597-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-2667/">CVE-2014-2667</cve>
	<bugzilla href="https://bugzilla.suse.com/871152">SUSE bug 871152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2672</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2672" ref_url="https://www.suse.com/security/cve/CVE-2014-2672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00010.html" source="SUSE-SU"/>
    <description>
    Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2672/">CVE-2014-2672</cve>
	<bugzilla href="https://bugzilla.suse.com/871148">SUSE bug 871148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2678</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0766-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
    <description>
    The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678</cve>
	<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2686</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2686" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2686" ref_url="https://www.suse.com/security/cve/CVE-2014-2686" source="SUSE CVE"/>
    <description>
    Ansible prior to 1.5.4 mishandles the evaluation of some strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2686/">CVE-2014-2686</cve>
	<bugzilla href="https://bugzilla.suse.com/1160674">SUSE bug 1160674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2706</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706</cve>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2707" ref_url="https://www.suse.com/security/cve/CVE-2014-2707" source="SUSE CVE"/>
    <description>
    cups-browsed in cups-filters 1.0.41 before 1.0.51 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the (1) model or (2) PDL, related to "System V interface scripts generated for queues."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2707/">CVE-2014-2707</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883543">SUSE bug 883543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2855" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2855" ref_url="https://www.suse.com/security/cve/CVE-2014-2855" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0595-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00006.html" source="SUSE-SU"/>
    <description>
    The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2855/">CVE-2014-2855</cve>
	<bugzilla href="https://bugzilla.suse.com/873740">SUSE bug 873740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2856" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2856" ref_url="https://www.suse.com/security/cve/CVE-2014-2856" source="SUSE CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2856/">CVE-2014-2856</cve>
	<bugzilla href="https://bugzilla.suse.com/873899">SUSE bug 873899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2892" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0590-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00001.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<bugzilla href="https://bugzilla.suse.com/874723">SUSE bug 874723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140884" comment="libmms0-0.6.2-15.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2907" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2907" ref_url="https://www.suse.com/security/cve/CVE-2014-2907" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00022.html" source="SUSE-SU"/>
    <description>
    The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2907/">CVE-2014-2907</cve>
	<bugzilla href="https://bugzilla.suse.com/874693">SUSE bug 874693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/874760">SUSE bug 874760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2977" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2977" ref_url="https://www.suse.com/security/cve/CVE-2014-2977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00019.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.13 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2977/">CVE-2014-2977</cve>
	<bugzilla href="https://bugzilla.suse.com/878345">SUSE bug 878345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140428" comment="DirectFB-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140429" comment="lib++dfb-1_7-1-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140430" comment="libdirectfb-1_7-1-1.7.1-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2978" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2978" ref_url="https://www.suse.com/security/cve/CVE-2014-2978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00019.html" source="SUSE-SU"/>
    <description>
    The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-2978/">CVE-2014-2978</cve>
	<bugzilla href="https://bugzilla.suse.com/878349">SUSE bug 878349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140428" comment="DirectFB-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140429" comment="lib++dfb-1_7-1-1.7.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140430" comment="libdirectfb-1_7-1-1.7.1-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in IBM Java Runtime Environment (JRE) 7 R1 before SR2 (7.1.2.0), 7 before SR8 (7.0.8.0), 6 R1 before SR8 FP2 (6.1.8.2), 6 before SR16 FP2 (6.0.16.2), and before SR16 FP8 (5.0.16.8) allows local users to execute arbitrary code via vectors related to the shared classes cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930365">SUSE bug 930365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3124" ref_url="https://www.suse.com/security/cve/CVE-2014-3124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page table translations for unspecified memory page types.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3124/">CVE-2014-3124</cve>
	<bugzilla href="https://bugzilla.suse.com/875668">SUSE bug 875668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.html" source="SUSE-SU"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153</cve>
	<bugzilla href="https://bugzilla.suse.com/877775">SUSE bug 877775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882228">SUSE bug 882228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00026.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<bugzilla href="https://bugzilla.suse.com/891489">SUSE bug 891489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141072" comment="ppp-2.4.7-1.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181</cve>
	<bugzilla href="https://bugzilla.suse.com/896382">SUSE bug 896382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184</cve>
	<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3185</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185</cve>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3230" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0710-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-05/msg00072.html" source="SUSE-SU"/>
    <description>
    The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<bugzilla href="https://bugzilla.suse.com/876862">SUSE bug 876862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141068" comment="perl-LWP-Protocol-https-6.04-5.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140550" comment="emacs-el-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140552" comment="emacs-nox-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140550" comment="emacs-el-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140552" comment="emacs-nox-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140550" comment="emacs-el-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140552" comment="emacs-nox-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00080.html" source="SUSE-SU"/>
    <description>
    lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<bugzilla href="https://bugzilla.suse.com/876847">SUSE bug 876847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140549" comment="emacs-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140550" comment="emacs-el-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140551" comment="emacs-info-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140552" comment="emacs-nox-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140553" comment="emacs-x11-24.3-16.32 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140554" comment="etags-24.3-16.32 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3430" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3430" ref_url="https://www.suse.com/security/cve/CVE-2014-3430" source="SUSE CVE"/>
    <description>
    Dovecot 1.1 before 2.2.13 and dovecot-ee before 2.1.7.7 and 2.2.x before 2.2.12.12 does not properly close old connections, which allows remote attackers to cause a denial of service (resource consumption) via an incomplete SSL/TLS handshake for an IMAP/POP3 connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3430/">CVE-2014-3430</cve>
	<bugzilla href="https://bugzilla.suse.com/877255">SUSE bug 877255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140542" comment="dovecot22-2.2.13-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140543" comment="dovecot22-backend-mysql-2.2.13-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140544" comment="dovecot22-backend-pgsql-2.2.13-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140545" comment="dovecot22-backend-sqlite-2.2.13-2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
    <description>
    hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3466" ref_url="https://www.suse.com/security/cve/CVE-2014-3466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0758-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0763-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3466/">CVE-2014-3466</cve>
	<bugzilla href="https://bugzilla.suse.com/880730">SUSE bug 880730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3467" ref_url="https://www.suse.com/security/cve/CVE-2014-3467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3467/">CVE-2014-3467</cve>
	<bugzilla href="https://bugzilla.suse.com/880737">SUSE bug 880737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3468" ref_url="https://www.suse.com/security/cve/CVE-2014-3468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3468/">CVE-2014-3468</cve>
	<bugzilla href="https://bugzilla.suse.com/880735">SUSE bug 880735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3469" ref_url="https://www.suse.com/security/cve/CVE-2014-3469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0788-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015302" ref_url="https://www.suse.com/support/kb/doc?id=7015302" source="SUSE-SU"/>
		<reference ref_id="TID7015303" ref_url="https://www.suse.com/support/kb/doc?id=7015303" source="SUSE-SU"/>
    <description>
    The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3469/">CVE-2014-3469</cve>
	<bugzilla href="https://bugzilla.suse.com/880738">SUSE bug 880738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880910">SUSE bug 880910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3470" ref_url="https://www.suse.com/security/cve/CVE-2014-3470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0759-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0761-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7008708" ref_url="https://www.suse.com/support/kb/doc/?id=7008708" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015162" ref_url="https://www.suse.com/support/kb/doc?id=7015162" source="SUSE-SU"/>
		<reference ref_id="TID7015189" ref_url="https://www.suse.com/support/kb/doc?id=7015189" source="SUSE-SU"/>
		<reference ref_id="TID7015264" ref_url="https://www.suse.com/support/kb/doc?id=7015264" source="SUSE-SU"/>
		<reference ref_id="TID7015300" ref_url="https://www.suse.com/support/kb/doc?id=7015300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3470/">CVE-2014-3470</cve>
	<bugzilla href="https://bugzilla.suse.com/880891">SUSE bug 880891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883126">SUSE bug 883126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885777">SUSE bug 885777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3477" ref_url="https://www.suse.com/security/cve/CVE-2014-3477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000891.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0821-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0874-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html" source="SUSE-SU"/>
    <description>
    The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3477/">CVE-2014-3477</cve>
	<bugzilla href="https://bugzilla.suse.com/1010769">SUSE bug 1010769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881137">SUSE bug 881137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3493" ref_url="https://www.suse.com/security/cve/CVE-2014-3493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0859-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0944-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00034.html" source="SUSE-SU"/>
    <description>
    The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3493/">CVE-2014-3493</cve>
	<bugzilla href="https://bugzilla.suse.com/878642">SUSE bug 878642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880962">SUSE bug 880962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883758">SUSE bug 883758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3498</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3498" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3498" ref_url="https://www.suse.com/security/cve/CVE-2014-3498" source="SUSE CVE"/>
    <description>
    The user module in ansible before 1.6.6 allows remote authenticated users to execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3498/">CVE-2014-3498</cve>
	<bugzilla href="https://bugzilla.suse.com/979877">SUSE bug 979877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3505" ref_url="https://www.suse.com/security/cve/CVE-2014-3505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3505/">CVE-2014-3505</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890767">SUSE bug 890767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3506" ref_url="https://www.suse.com/security/cve/CVE-2014-3506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3506/">CVE-2014-3506</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890768">SUSE bug 890768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3507" ref_url="https://www.suse.com/security/cve/CVE-2014-3507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3507/">CVE-2014-3507</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890769">SUSE bug 890769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3508" ref_url="https://www.suse.com/security/cve/CVE-2014-3508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016328" ref_url="https://www.suse.com/support/kb/doc/?id=7016328" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3508/">CVE-2014-3508</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950708">SUSE bug 950708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3509" ref_url="https://www.suse.com/security/cve/CVE-2014-3509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3509/">CVE-2014-3509</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890766">SUSE bug 890766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3510" ref_url="https://www.suse.com/security/cve/CVE-2014-3510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001012.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3510/">CVE-2014-3510</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890764">SUSE bug 890764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890770">SUSE bug 890770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3511" ref_url="https://www.suse.com/security/cve/CVE-2014-3511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3511/">CVE-2014-3511</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890771">SUSE bug 890771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3512" ref_url="https://www.suse.com/security/cve/CVE-2014-3512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3512/">CVE-2014-3512</cve>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890772">SUSE bug 890772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00059.html" source="SUSE-SU"/>
    <description>
    Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3514</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3514" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3514" ref_url="https://www.suse.com/security/cve/CVE-2014-3514" source="SUSE CVE"/>
    <description>
    activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3514/">CVE-2014-3514</cve>
	<bugzilla href="https://bugzilla.suse.com/892777">SUSE bug 892777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685554" comment="rubygem-railties-4_2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3523" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3523" ref_url="https://www.suse.com/security/cve/CVE-2014-3523" source="SUSE CVE"/>
    <description>
    Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3523/">CVE-2014-3523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3532" ref_url="https://www.suse.com/security/cve/CVE-2014-3532" source="SUSE CVE"/>
    <description>
    dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3532/">CVE-2014-3532</cve>
	<bugzilla href="https://bugzilla.suse.com/885241">SUSE bug 885241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3533" ref_url="https://www.suse.com/security/cve/CVE-2014-3533" source="SUSE CVE"/>
    <description>
    dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3533/">CVE-2014-3533</cve>
	<bugzilla href="https://bugzilla.suse.com/885241">SUSE bug 885241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000963.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3540" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3540" ref_url="https://www.suse.com/security/cve/CVE-2014-3540" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-0114.  Reason: This candidate is a duplicate of CVE-2014-0114.  CVE abstraction content decisions did not require a second ID.  Notes: All CVE users should reference CVE-2014-0114 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3540/">CVE-2014-3540</cve>
	<bugzilla href="https://bugzilla.suse.com/885963">SUSE bug 885963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140448" comment="apache-commons-beanutils-1.9.2-1.27 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140449" comment="apache-commons-beanutils-javadoc-1.9.2-1.27 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3560" ref_url="https://www.suse.com/security/cve/CVE-2014-3560" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1040-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html" source="SUSE-SU"/>
    <description>
    NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3560/">CVE-2014-3560</cve>
	<bugzilla href="https://bugzilla.suse.com/889429">SUSE bug 889429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3564" ref_url="https://www.suse.com/security/cve/CVE-2014-3564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1039-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00026.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3564/">CVE-2014-3564</cve>
	<bugzilla href="https://bugzilla.suse.com/890123">SUSE bug 890123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140643" comment="gpgme-1.5.1-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140644" comment="libgpgme11-1.5.1-1.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3565" ref_url="https://www.suse.com/security/cve/CVE-2014-3565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1108-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00013.html" source="SUSE-SU"/>
    <description>
    snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3565/">CVE-2014-3565</cve>
	<bugzilla href="https://bugzilla.suse.com/894361">SUSE bug 894361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002292.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7015773" ref_url="https://www.suse.com/support/kb/doc?id=7015773" source="SUSE-SU"/>
		<reference ref_id="TID7015777" ref_url="https://www.suse.com/support/kb/doc/?id=7015777" source="SUSE-SU"/>
		<reference ref_id="TID7015785" ref_url="https://www.suse.com/support/kb/doc/?id=7015785" source="SUSE-SU"/>
		<reference ref_id="TID7015793" ref_url="https://www.suse.com/support/kb/doc/?id=7015793" source="SUSE-SU"/>
		<reference ref_id="TID7015804" ref_url="https://www.suse.com/support/kb/doc/?id=7015804" source="SUSE-SU"/>
		<reference ref_id="TID7015805" ref_url="https://www.suse.com/support/kb/doc/?id=7015805" source="SUSE-SU"/>
		<reference ref_id="TID7015809" ref_url="https://www.suse.com/support/kb/doc/?id=7015809" source="SUSE-SU"/>
		<reference ref_id="TID7015826" ref_url="https://www.suse.com/support/kb/doc/?id=7015826" source="SUSE-SU"/>
		<reference ref_id="TID7015854" ref_url="https://www.suse.com/support/kb/doc/?id=7015854" source="SUSE-SU"/>
		<reference ref_id="TID7015987" ref_url="https://www.suse.com/support/kb/doc/?id=7015987" source="SUSE-SU"/>
		<reference ref_id="TID7016067" ref_url="https://www.suse.com/support/kb/doc/?id=7016067" source="SUSE-SU"/>
		<reference ref_id="TID7016068" ref_url="https://www.suse.com/support/kb/doc/?id=7016068" source="SUSE-SU"/>
		<reference ref_id="TID7016144" ref_url="https://www.suse.com/support/kb/doc/?id=7016144" source="SUSE-SU"/>
		<reference ref_id="TID7016205" ref_url="https://www.suse.com/support/kb/doc/?id=7016205" source="SUSE-SU"/>
		<reference ref_id="TID7016299" ref_url="https://www.suse.com/support/kb/doc?id=7016299" source="SUSE-SU"/>
		<reference ref_id="TID7016328" ref_url="https://www.suse.com/support/kb/doc/?id=7016328" source="SUSE-SU"/>
		<reference ref_id="TID7016351" ref_url="https://www.suse.com/support/kb/doc/?id=7016351" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7017332" ref_url="https://www.suse.com/support/kb/doc/?id=7017332" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021975" ref_url="https://www.suse.com/support/kb/doc/?id=7021975" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1384-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1395-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2877-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0980-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031023">SUSE bug 1031023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901223">SUSE bug 901223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901254">SUSE bug 901254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901748">SUSE bug 901748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901757">SUSE bug 901757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901759">SUSE bug 901759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901889">SUSE bug 901889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901968">SUSE bug 901968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902229">SUSE bug 902229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902233">SUSE bug 902233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902476">SUSE bug 902476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903405">SUSE bug 903405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903684">SUSE bug 903684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131934" comment="apache2-mod_nss-1.0.14-18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141104" comment="res-signingkeys-3.0.18-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141105" comment="smt-3.0.18-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141106" comment="smt-support-3.0.18-26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911399">SUSE bug 911399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3577" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html" source="SUSE-SU"/>
    <description>
    org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "CN=" string in a field in the distinguished name (DN) of a certificate, as demonstrated by the "foo,CN=www.apache.org" string in the O field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577</cve>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3581" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001415.html" source="SUSE-SU"/>
    <description>
    The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581</cve>
	<bugzilla href="https://bugzilla.suse.com/899836">SUSE bug 899836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3583" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3583" ref_url="https://www.suse.com/security/cve/CVE-2014-3583" source="SUSE CVE"/>
    <description>
    The handle_headers function in mod_proxy_fcgi.c in the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI servers to cause a denial of service (buffer over-read and daemon crash) via long response headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3583/">CVE-2014-3583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00005.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949135">SUSE bug 949135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131935" comment="libgcrypt20-hmac-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131936" comment="libgcrypt20-hmac-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3596" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3596" ref_url="https://www.suse.com/security/cve/CVE-2014-3596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1373-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html" source="SUSE-SU"/>
    <description>
    The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3596/">CVE-2014-3596</cve>
	<bugzilla href="https://bugzilla.suse.com/1134598">SUSE bug 1134598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334475" comment="axis is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3601" ref_url="https://www.suse.com/security/cve/CVE-2014-3601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3601/">CVE-2014-3601</cve>
	<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3613" ref_url="https://www.suse.com/security/cve/CVE-2014-3613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3613/">CVE-2014-3613</cve>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894999">SUSE bug 894999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898303">SUSE bug 898303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141073" comment="procmail-3.22-267.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3620" ref_url="https://www.suse.com/security/cve/CVE-2014-3620" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3620/">CVE-2014-3620</cve>
	<bugzilla href="https://bugzilla.suse.com/1199221">SUSE bug 1199221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/894575">SUSE bug 894575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895991">SUSE bug 895991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3633" ref_url="https://www.suse.com/security/cve/CVE-2014-3633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1290-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1293-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3633/">CVE-2014-3633</cve>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1297-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1298-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" source="SUSE-SU"/>
    <description>
    rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141113" comment="rsyslog-diag-tools-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141114" comment="rsyslog-doc-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141115" comment="rsyslog-module-gssapi-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141116" comment="rsyslog-module-gtls-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141117" comment="rsyslog-module-mysql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141118" comment="rsyslog-module-pgsql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141119" comment="rsyslog-module-relp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141120" comment="rsyslog-module-snmp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141121" comment="rsyslog-module-udpspoof-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141134" comment="syslog-service-2.0-778.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3635" ref_url="https://www.suse.com/security/cve/CVE-2014-3635" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3635/">CVE-2014-3635</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904017">SUSE bug 904017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3638" ref_url="https://www.suse.com/security/cve/CVE-2014-3638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3638/">CVE-2014-3638</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903055">SUSE bug 903055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html" source="SUSE-SU"/>
    <description>
    The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903055">SUSE bug 903055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3657" ref_url="https://www.suse.com/security/cve/CVE-2014-3657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1290-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1293-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3657/">CVE-2014-3657</cve>
	<bugzilla href="https://bugzilla.suse.com/897783">SUSE bug 897783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899484">SUSE bug 899484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001142.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1330-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
    <description>
    parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673</cve>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00011.html" source="SUSE-SU"/>
    <description>
    Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141125" comment="shim-0.9-20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00011.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141125" comment="shim-0.9-20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00011.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141125" comment="shim-0.9-20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3683" ref_url="https://www.suse.com/security/cve/CVE-2014-3683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1297-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1298-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3683/">CVE-2014-3683</cve>
	<bugzilla href="https://bugzilla.suse.com/897262">SUSE bug 897262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899756">SUSE bug 899756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141112" comment="rsyslog-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141113" comment="rsyslog-diag-tools-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141114" comment="rsyslog-doc-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141115" comment="rsyslog-module-gssapi-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141116" comment="rsyslog-module-gtls-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141117" comment="rsyslog-module-mysql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141118" comment="rsyslog-module-pgsql-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141119" comment="rsyslog-module-relp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141120" comment="rsyslog-module-snmp-8.4.0-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141121" comment="rsyslog-module-udpspoof-8.4.0-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1314-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00028.html" source="SUSE-SU"/>
    <description>
    wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687</cve>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2177-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182177-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688</cve>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690</cve>
	<bugzilla href="https://bugzilla.suse.com/902232">SUSE bug 902232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3707" ref_url="https://www.suse.com/security/cve/CVE-2014-3707" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" source="SUSE-SU"/>
    <description>
    The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3707/">CVE-2014-3707</cve>
	<bugzilla href="https://bugzilla.suse.com/901924">SUSE bug 901924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1516-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00113.html" source="SUSE-SU"/>
    <description>
    The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009103557" comment="file-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103559" comment="file-magic-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103561" comment="libmagic1-5.19-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009103560" comment="libmagic1-32bit-5.19-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3970" ref_url="https://www.suse.com/security/cve/CVE-2014-3970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0946-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3970/">CVE-2014-3970</cve>
	<bugzilla href="https://bugzilla.suse.com/881524">SUSE bug 881524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140915" comment="libpulse-mainloop-glib0-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140916" comment="libpulse-mainloop-glib0-32bit-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140917" comment="libpulse0-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140918" comment="libpulse0-32bit-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140919" comment="pulseaudio-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140920" comment="pulseaudio-esound-compat-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140921" comment="pulseaudio-gdm-hooks-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140922" comment="pulseaudio-lang-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140923" comment="pulseaudio-module-x11-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140924" comment="pulseaudio-module-zeroconf-5.0-2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140925" comment="pulseaudio-utils-5.0-2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4020" ref_url="https://www.suse.com/security/cve/CVE-2014-4020" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-06/msg00049.html" source="SUSE-SU"/>
    <description>
    The dissect_frame function in epan/dissectors/packet-frame.c in the frame metadissector in Wireshark 1.10.x before 1.10.8 interprets a negative integer as a length value even though it was intended to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4020/">CVE-2014-4020</cve>
	<bugzilla href="https://bugzilla.suse.com/882602">SUSE bug 882602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4038" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0953-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0953-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00023.html" source="SUSE-SU"/>
    <description>
    ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a symlink attack related to (1) rtas_errd/diag_support.c and /tmp/get_dt_files, (2) scripts/ppc64_diag_mkrsrc and /tmp/diagSEsnap/snapH.tar.gz, or (3) lpd/test/lpd_ela_test.sh and /var/tmp/ras.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038</cve>
	<bugzilla href="https://bugzilla.suse.com/882667">SUSE bug 882667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141071" comment="ppc64-diag-2.7.1-5.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4039" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0953-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0953-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00023.html" source="SUSE-SU"/>
    <description>
    ppc64-diag 2.6.1 uses 0775 permissions for /tmp/diagSEsnap and does not properly restrict permissions for /tmp/diagSEsnap/snapH.tar.gz, which allows local users to obtain sensitive information by reading files in this archive, as demonstrated by /var/log/messages and /etc/yaboot.conf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039</cve>
	<bugzilla href="https://bugzilla.suse.com/882667">SUSE bug 882667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141071" comment="ppc64-diag-2.7.1-5.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4040" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001210.html" source="SUSE-SU"/>
    <description>
    snap in powerpc-utils 1.2.20 produces an archive with fstab and yaboot.conf files potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040</cve>
	<bugzilla href="https://bugzilla.suse.com/883174">SUSE bug 883174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141070" comment="powerpc-utils-1.3.2-17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html" source="SUSE-SU"/>
    <description>
    The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<bugzilla href="https://bugzilla.suse.com/882600">SUSE bug 882600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939797">SUSE bug 939797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4207" ref_url="https://www.suse.com/security/cve/CVE-2014-4207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4207/">CVE-2014-4207</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4209" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4209" ref_url="https://www.suse.com/security/cve/CVE-2014-4209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4209/">CVE-2014-4209</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4216" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4216" ref_url="https://www.suse.com/security/cve/CVE-2014-4216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4216/">CVE-2014-4216</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4218" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4218" ref_url="https://www.suse.com/security/cve/CVE-2014-4218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4218/">CVE-2014-4218</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4219" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4219" ref_url="https://www.suse.com/security/cve/CVE-2014-4219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4219/">CVE-2014-4219</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4221" ref_url="https://www.suse.com/security/cve/CVE-2014-4221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4221/">CVE-2014-4221</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4223" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4223" ref_url="https://www.suse.com/security/cve/CVE-2014-4223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-2483.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4223/">CVE-2014-4223</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4244" ref_url="https://www.suse.com/security/cve/CVE-2014-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4244/">CVE-2014-4244</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4252" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4252" ref_url="https://www.suse.com/security/cve/CVE-2014-4252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4252/">CVE-2014-4252</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4258" ref_url="https://www.suse.com/security/cve/CVE-2014-4258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4258/">CVE-2014-4258</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4260" ref_url="https://www.suse.com/security/cve/CVE-2014-4260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4260/">CVE-2014-4260</cve>
	<bugzilla href="https://bugzilla.suse.com/887580">SUSE bug 887580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915914">SUSE bug 915914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4262" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4262" ref_url="https://www.suse.com/security/cve/CVE-2014-4262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4262/">CVE-2014-4262</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4263" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4263" ref_url="https://www.suse.com/security/cve/CVE-2014-4263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4263/">CVE-2014-4263</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4264" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4264" ref_url="https://www.suse.com/security/cve/CVE-2014-4264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4264/">CVE-2014-4264</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4266" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4266" ref_url="https://www.suse.com/security/cve/CVE-2014-4266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Serviceability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4266/">CVE-2014-4266</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4268" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4268" ref_url="https://www.suse.com/security/cve/CVE-2014-4268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1055-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4268/">CVE-2014-4268</cve>
	<bugzilla href="https://bugzilla.suse.com/887530">SUSE bug 887530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891699">SUSE bug 891699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891700">SUSE bug 891700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891701">SUSE bug 891701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4274" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4274" ref_url="https://www.suse.com/security/cve/CVE-2014-4274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4274/">CVE-2014-4274</cve>
	<bugzilla href="https://bugzilla.suse.com/857678">SUSE bug 857678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896400">SUSE bug 896400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4287" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4287" ref_url="https://www.suse.com/security/cve/CVE-2014-4287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4287/">CVE-2014-4287</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4336" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4336" ref_url="https://www.suse.com/security/cve/CVE-2014-4336" source="SUSE CVE"/>
    <description>
    The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4336/">CVE-2014-4336</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883543">SUSE bug 883543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4337" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4337" ref_url="https://www.suse.com/security/cve/CVE-2014-4337" source="SUSE CVE"/>
    <description>
    The process_browse_data function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted packet data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4337/">CVE-2014-4337</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883543">SUSE bug 883543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4338" ref_url="https://www.suse.com/security/cve/CVE-2014-4338" source="SUSE CVE"/>
    <description>
    cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4338/">CVE-2014-4338</cve>
	<bugzilla href="https://bugzilla.suse.com/871327">SUSE bug 871327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883536">SUSE bug 883536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4341" ref_url="https://www.suse.com/security/cve/CVE-2014-4341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4341/">CVE-2014-4341</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4342" ref_url="https://www.suse.com/security/cve/CVE-2014-4342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4342/">CVE-2014-4342</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/886016">SUSE bug 886016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4343" ref_url="https://www.suse.com/security/cve/CVE-2014-4343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4343/">CVE-2014-4343</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4344" ref_url="https://www.suse.com/security/cve/CVE-2014-4344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0977-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00008.html" source="SUSE-SU"/>
    <description>
    The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4344/">CVE-2014-4344</cve>
	<bugzilla href="https://bugzilla.suse.com/888697">SUSE bug 888697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4345" ref_url="https://www.suse.com/security/cve/CVE-2014-4345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1043-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00030.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4345/">CVE-2014-4345</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891082">SUSE bug 891082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4362" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4362" ref_url="https://www.suse.com/security/cve/CVE-2014-4362" source="SUSE CVE"/>
    <description>
    The Sandbox Profiles implementation in Apple iOS before 8 does not properly restrict the third-party app sandbox profile, which allows attackers to obtain sensitive Apple ID information via a crafted app.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4362/">CVE-2014-4362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140534" comment="davfs2-1.5.2-2.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508</cve>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0932-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00034.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140882" comment="liblzo2-2-2.08-1.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140883" comment="liblzo2-2-32bit-2.08-1.13 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run.  NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608</cve>
	<bugzilla href="https://bugzilla.suse.com/883948">SUSE bug 883948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4611" ref_url="https://www.suse.com/security/cve/CVE-2014-4611" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:0924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib/lz4/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run that would be improperly handled by programs not complying with an API limitation, a different vulnerability than CVE-2014-4715.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4611/">CVE-2014-4611</cve>
	<bugzilla href="https://bugzilla.suse.com/883949">SUSE bug 883949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885389">SUSE bug 885389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4617" ref_url="https://www.suse.com/security/cve/CVE-2014-4617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000911.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0866-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0952-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-07/msg00042.html" source="SUSE-SU"/>
    <description>
    The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4617/">CVE-2014-4617</cve>
	<bugzilla href="https://bugzilla.suse.com/884130">SUSE bug 884130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962098">SUSE bug 962098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1042-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1046-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1070-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140926" comment="libpython3_4m1_0-3.4.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140927" comment="python3-base-3.4.1-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4671</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4671" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4671" ref_url="https://www.suse.com/security/cve/CVE-2014-4671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-07/msg00017.html" source="SUSE-SU"/>
    <description>
    Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-4671/">CVE-2014-4671</cve>
	<bugzilla href="https://bugzilla.suse.com/886454">SUSE bug 886454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891688">SUSE bug 891688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685553" comment="rubygem-actionpack-4_2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1366-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1380-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html" source="SUSE-SU"/>
    <description>
    Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<bugzilla href="https://bugzilla.suse.com/902709">SUSE bug 902709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4910" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4910" ref_url="https://www.suse.com/security/cve/CVE-2014-4910" source="SUSE CVE"/>
    <description>
    Directory traversal vulnerability in tools/backlight_helper.c in X.Org xf86-video-intel 2.99.911 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in the interface name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4910/">CVE-2014-4910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141165" comment="xf86-video-intel-2.99.917.641_ge4ef6e9-12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943</cve>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4966</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4966" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4966" ref_url="https://www.suse.com/security/cve/CVE-2014-4966" source="SUSE CVE"/>
    <description>
    Ansible before 1.6.7 does not prevent inventory data with "{{" and "lookup" substrings, and does not prevent remote data with "{{" substrings, which allows remote attackers to execute arbitrary code via (1) crafted lookup('pipe') calls or (2) crafted Jinja2 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4966/">CVE-2014-4966</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334676" comment="ansible is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4967</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4967" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4967" ref_url="https://www.suse.com/security/cve/CVE-2014-4967" source="SUSE CVE"/>
    <description>
    Multiple argument injection vulnerabilities in Ansible before 1.6.7 allow remote attackers to execute arbitrary code by leveraging access to an Ansible managed host and providing a crafted fact, as demonstrated by a fact with (1) a trailing " src=" clause, (2) a trailing " temp=" clause, or (3) a trailing " validate=" clause accompanied by a shell command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4967/">CVE-2014-4967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334676" comment="ansible is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4975" ref_url="https://www.suse.com/security/cve/CVE-2014-4975" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-4975/">CVE-2014-4975</cve>
	<bugzilla href="https://bugzilla.suse.com/887877">SUSE bug 887877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550168" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550169" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550170" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
    <description>
    CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000962.html" source="SUSE-SU"/>
    <description>
    The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<bugzilla href="https://bugzilla.suse.com/887240">SUSE bug 887240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5044" ref_url="https://www.suse.com/security/cve/CVE-2014-5044" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in libgfortran might allow remote attackers to execute arbitrary code or cause a denial of service (Fortran application crash) via vectors related to array allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5044/">CVE-2014-5044</cve>
	<bugzilla href="https://bugzilla.suse.com/888791">SUSE bug 888791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140498" comment="cpp48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140499" comment="gcc48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140500" comment="gcc48-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140501" comment="gcc48-c++-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140502" comment="gcc48-info-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140503" comment="gcc48-locale-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140504" comment="libasan0-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140505" comment="libasan0-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140506" comment="libstdc++48-devel-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140507" comment="libstdc++48-devel-32bit-4.8.5-30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5045" ref_url="https://www.suse.com/security/cve/CVE-2014-5045" source="SUSE CVE"/>
    <description>
    The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5045/">CVE-2014-5045</cve>
	<bugzilla href="https://bugzilla.suse.com/889060">SUSE bug 889060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1246-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077</cve>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00009.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<bugzilla href="https://bugzilla.suse.com/892073">SUSE bug 892073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5139" ref_url="https://www.suse.com/security/cve/CVE-2014-5139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000966.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1052-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00036.html" source="SUSE-SU"/>
    <description>
    The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-5139/">CVE-2014-5139</cve>
	<bugzilla href="https://bugzilla.suse.com/886831">SUSE bug 886831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890759">SUSE bug 890759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890765">SUSE bug 890765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5146" ref_url="https://www.suse.com/security/cve/CVE-2014-5146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5146/">CVE-2014-5146</cve>
	<bugzilla href="https://bugzilla.suse.com/889526">SUSE bug 889526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5149" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5149" ref_url="https://www.suse.com/security/cve/CVE-2014-5149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html" source="SUSE-SU"/>
    <description>
    Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5146.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5149/">CVE-2014-5149</cve>
	<bugzilla href="https://bugzilla.suse.com/889526">SUSE bug 889526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918998">SUSE bug 918998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5161" ref_url="https://www.suse.com/security/cve/CVE-2014-5161" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The dissect_log function in plugins/irda/packet-irda.c in the IrDA dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5161/">CVE-2014-5161</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889901">SUSE bug 889901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5162" ref_url="https://www.suse.com/security/cve/CVE-2014-5162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000 dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' and '\r' characters, which allows remote attackers to cause a denial of service (off-by-one buffer underflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5162/">CVE-2014-5162</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889901">SUSE bug 889901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5163" ref_url="https://www.suse.com/security/cve/CVE-2014-5163" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The APN decode functionality in (1) epan/dissectors/packet-gtp.c and (2) epan/dissectors/packet-gsm_a_gm.c in the GTP and GSM Management dissectors in Wireshark 1.10.x before 1.10.9 does not completely initialize a certain buffer, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5163/">CVE-2014-5163</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889906">SUSE bug 889906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5164" ref_url="https://www.suse.com/security/cve/CVE-2014-5164" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The rlc_decode_li function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.10.x before 1.10.9 initializes a certain structure member only after this member is used, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5164/">CVE-2014-5164</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889900">SUSE bug 889900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5165" ref_url="https://www.suse.com/security/cve/CVE-2014-5165" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00058.html" source="SUSE-SU"/>
    <description>
    The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.10.x before 1.10.9 does not properly validate padding values, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5165/">CVE-2014-5165</cve>
	<bugzilla href="https://bugzilla.suse.com/889854">SUSE bug 889854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889899">SUSE bug 889899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html" source="SUSE-SU"/>
    <description>
    The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html" source="SUSE-SU"/>
    <description>
    plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5461" ref_url="https://www.suse.com/security/cve/CVE-2014-5461" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1145-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5461/">CVE-2014-5461</cve>
	<bugzilla href="https://bugzilla.suse.com/893824">SUSE bug 893824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140879" comment="liblua5_2-5.2.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140880" comment="liblua5_2-32bit-5.2.2-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140881" comment="lua-5.2.2-4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001214.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00009.html" source="SUSE-SU"/>
    <description>
    GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<bugzilla href="https://bugzilla.suse.com/894553">SUSE bug 894553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6051" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6051" ref_url="https://www.suse.com/security/cve/CVE-2014-6051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6051/">CVE-2014-6051</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119309" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119310" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6052" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6052" ref_url="https://www.suse.com/security/cve/CVE-2014-6052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    The HandleRFBServerMessage function in libvncclient/rfbproto.c in LibVNCServer 0.9.9 and earlier does not check certain malloc return values, which allows remote VNC servers to cause a denial of service (application crash) or possibly execute arbitrary code by specifying a large screen size in a (1) FramebufferUpdate, (2) ResizeFrameBuffer, or (3) PalmVNCReSizeFrameBuffer message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6052/">CVE-2014-6052</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119309" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119310" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6053" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6053" ref_url="https://www.suse.com/security/cve/CVE-2014-6053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier does not properly handle attempts to send a large amount of ClientCutText data, which allows remote attackers to cause a denial of service (memory consumption or daemon crash) via a crafted message that is processed by using a single unchecked malloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6053/">CVE-2014-6053</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119309" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119310" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6054" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6054" ref_url="https://www.suse.com/security/cve/CVE-2014-6054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6054/">CVE-2014-6054</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119309" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119310" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6055" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6055" ref_url="https://www.suse.com/security/cve/CVE-2014-6055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2207-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer 0.9.9 and earlier allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long file or (2) directory name or the (3) FileTime attribute in a rfbFileTransferOffer message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6055/">CVE-2014-6055</cve>
	<bugzilla href="https://bugzilla.suse.com/897031">SUSE bug 897031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119309" comment="libvncclient0-0.9.9-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119310" comment="libvncserver0-0.9.9-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6268" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6268" ref_url="https://www.suse.com/security/cve/CVE-2014-6268" source="SUSE CVE"/>
    <description>
    The evtchn_fifo_set_pending function in Xen 4.4.x allows local guest users to cause a denial of service (host crash) via vectors involving an uninitialized FIFO-based event channel control block when (1) binding or (2) moving an event to a different VCPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6268/">CVE-2014-6268</cve>
	<bugzilla href="https://bugzilla.suse.com/895804">SUSE bug 895804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6271" ref_url="https://www.suse.com/security/cve/CVE-2014-6271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015693" ref_url="https://www.suse.com/support/kb/doc/?id=7015693" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015731" ref_url="https://www.suse.com/support/kb/doc?id=7015731" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6271/">CVE-2014-6271</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0132-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00070.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943011">SUSE bug 943011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947373">SUSE bug 947373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140839" comment="libevent-2_0-5-2.0.21-4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6277" ref_url="https://www.suse.com/security/cve/CVE-2014-6277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015714" ref_url="https://www.suse.com/support/kb/doc?id=7015714" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2961-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00001.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6277/">CVE-2014-6277</cve>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6278" ref_url="https://www.suse.com/security/cve/CVE-2014-6278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015714" ref_url="https://www.suse.com/support/kb/doc?id=7015714" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2961-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00001.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-6278/">CVE-2014-6278</cve>
	<bugzilla href="https://bugzilla.suse.com/898604">SUSE bug 898604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6456" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6463" ref_url="https://www.suse.com/security/cve/CVE-2014-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6463/">CVE-2014-6463</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6464" ref_url="https://www.suse.com/security/cve/CVE-2014-6464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6464/">CVE-2014-6464</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Internet Explorer, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6469" ref_url="https://www.suse.com/security/cve/CVE-2014-6469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6469/">CVE-2014-6469</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6474" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6474" ref_url="https://www.suse.com/security/cve/CVE-2014-6474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:MEMCACHED.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6474/">CVE-2014-6474</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6476" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6527.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6478" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6478" ref_url="https://www.suse.com/security/cve/CVE-2014-6478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6478/">CVE-2014-6478</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6484" ref_url="https://www.suse.com/security/cve/CVE-2014-6484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6484/">CVE-2014-6484</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6489" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6489" ref_url="https://www.suse.com/security/cve/CVE-2014-6489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect integrity and availability via vectors related to SERVER:SP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6489/">CVE-2014-6489</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6491" ref_url="https://www.suse.com/security/cve/CVE-2014-6491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6491/">CVE-2014-6491</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Firefox, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6494" ref_url="https://www.suse.com/security/cve/CVE-2014-6494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6494/">CVE-2014-6494</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6495" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6495" ref_url="https://www.suse.com/security/cve/CVE-2014-6495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6495/">CVE-2014-6495</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6496" ref_url="https://www.suse.com/security/cve/CVE-2014-6496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6496/">CVE-2014-6496</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6500" ref_url="https://www.suse.com/security/cve/CVE-2014-6500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6500/">CVE-2014-6500</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6504" ref_url="https://www.suse.com/security/cve/CVE-2014-6504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, and 7u67, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6504/">CVE-2014-6504</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6505" ref_url="https://www.suse.com/security/cve/CVE-2014-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6505/">CVE-2014-6505</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6507" ref_url="https://www.suse.com/security/cve/CVE-2014-6507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6507/">CVE-2014-6507</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6517" ref_url="https://www.suse.com/security/cve/CVE-2014-6517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and Jrockit R27.8.3 and R28.3.3 allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6517/">CVE-2014-6517</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6519" ref_url="https://www.suse.com/security/cve/CVE-2014-6519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6519/">CVE-2014-6519</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6520" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6520" ref_url="https://www.suse.com/security/cve/CVE-2014-6520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6520/">CVE-2014-6520</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6527" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6476.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6530" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6530" ref_url="https://www.suse.com/security/cve/CVE-2014-6530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6530/">CVE-2014-6530</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6551" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6551" ref_url="https://www.suse.com/security/cve/CVE-2014-6551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6551/">CVE-2014-6551</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6555" ref_url="https://www.suse.com/security/cve/CVE-2014-6555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6555/">CVE-2014-6555</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1526-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1549-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<bugzilla href="https://bugzilla.suse.com/901239">SUSE bug 901239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901242">SUSE bug 901242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901246">SUSE bug 901246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904889">SUSE bug 904889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6559" ref_url="https://www.suse.com/security/cve/CVE-2014-6559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6559/">CVE-2014-6559</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915912">SUSE bug 915912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6564" ref_url="https://www.suse.com/security/cve/CVE-2014-6564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6564/">CVE-2014-6564</cve>
	<bugzilla href="https://bugzilla.suse.com/901237">SUSE bug 901237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6568" ref_url="https://www.suse.com/security/cve/CVE-2014-6568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6568/">CVE-2014-6568</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6585" ref_url="https://www.suse.com/security/cve/CVE-2014-6585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6591.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6585/">CVE-2014-6585</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6587" ref_url="https://www.suse.com/security/cve/CVE-2014-6587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6587/">CVE-2014-6587</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6591" ref_url="https://www.suse.com/security/cve/CVE-2014-6591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6585.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6591/">CVE-2014-6591</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6593" ref_url="https://www.suse.com/security/cve/CVE-2014-6593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit 27.8.4 and 28.3.4 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6593/">CVE-2014-6593</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6601" ref_url="https://www.suse.com/security/cve/CVE-2014-6601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6601/">CVE-2014-6601</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7141" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
    <description>
    The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141</cve>
	<bugzilla href="https://bugzilla.suse.com/1040640">SUSE bug 1040640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/891268">SUSE bug 891268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7142" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
    <description>
    The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142</cve>
	<bugzilla href="https://bugzilla.suse.com/895773">SUSE bug 895773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7154" ref_url="https://www.suse.com/security/cve/CVE-2014-7154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7154/">CVE-2014-7154</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895798">SUSE bug 895798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7155" ref_url="https://www.suse.com/security/cve/CVE-2014-7155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7155/">CVE-2014-7155</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895799">SUSE bug 895799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7156" ref_url="https://www.suse.com/security/cve/CVE-2014-7156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7156/">CVE-2014-7156</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/895802">SUSE bug 895802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7169" ref_url="https://www.suse.com/security/cve/CVE-2014-7169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1247-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015693" ref_url="https://www.suse.com/support/kb/doc/?id=7015693" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015713" ref_url="https://www.suse.com/support/kb/doc/?id=7015713" source="SUSE-SU"/>
		<reference ref_id="TID7015714" ref_url="https://www.suse.com/support/kb/doc?id=7015714" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015731" ref_url="https://www.suse.com/support/kb/doc?id=7015731" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
    <description>
    GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7169/">CVE-2014-7169</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/896776">SUSE bug 896776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898346">SUSE bug 898346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899266">SUSE bug 899266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900127">SUSE bug 900127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900454">SUSE bug 900454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902237">SUSE bug 902237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7185" ref_url="https://www.suse.com/security/cve/CVE-2014-7185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1292-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1734-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00111.html" source="SUSE-SU"/>
    <description>
    Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7185/">CVE-2014-7185</cve>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955182">SUSE bug 955182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7186" ref_url="https://www.suse.com/security/cve/CVE-2014-7186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1247-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
    <description>
    The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7186/">CVE-2014-7186</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899039">SUSE bug 899039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7187" ref_url="https://www.suse.com/security/cve/CVE-2014-7187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1247-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7015701" ref_url="https://www.suse.com/support/kb/doc/?id=7015701" source="SUSE-SU"/>
		<reference ref_id="TID7015702" ref_url="https://www.suse.com/support/kb/doc?id=7015702" source="SUSE-SU"/>
		<reference ref_id="TID7015705" ref_url="https://www.suse.com/support/kb/doc/?id=7015705" source="SUSE-SU"/>
		<reference ref_id="TID7015715" ref_url="https://www.suse.com/support/kb/doc/?id=7015715" source="SUSE-SU"/>
		<reference ref_id="TID7015717" ref_url="https://www.suse.com/support/kb/doc/?id=7015717" source="SUSE-SU"/>
		<reference ref_id="TID7015718" ref_url="https://www.suse.com/support/kb/doc/?id=7015718" source="SUSE-SU"/>
		<reference ref_id="TID7015719" ref_url="https://www.suse.com/support/kb/doc/?id=7015719" source="SUSE-SU"/>
		<reference ref_id="TID7015720" ref_url="https://www.suse.com/support/kb/doc/?id=7015720" source="SUSE-SU"/>
		<reference ref_id="TID7015721" ref_url="https://www.suse.com/support/kb/doc/?id=7015721" source="SUSE-SU"/>
		<reference ref_id="TID7015741" ref_url="https://www.suse.com/support/kb/doc/?id=7015741" source="SUSE-SU"/>
		<reference ref_id="TID7016147" ref_url="https://www.suse.com/support/kb/doc/?id=7016147" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1310-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7187/">CVE-2014-7187</cve>
	<bugzilla href="https://bugzilla.suse.com/1024628">SUSE bug 1024628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898603">SUSE bug 898603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898812">SUSE bug 898812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898884">SUSE bug 898884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/899039">SUSE bug 899039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140477" comment="bash-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140478" comment="bash-doc-4.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140479" comment="libreadline6-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140480" comment="libreadline6-32bit-6.3-78.39 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140481" comment="readline-doc-6.3-78.39 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7188" ref_url="https://www.suse.com/security/cve/CVE-2014-7188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" source="SUSE-SU"/>
    <description>
    The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-7188/">CVE-2014-7188</cve>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/897657">SUSE bug 897657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7204" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002216.html" source="SUSE-SU"/>
    <description>
    jscript.c in Exuberant Ctags 5.8 allows remote attackers to cause a denial of service (infinite loop and CPU and disk consumption) via a crafted JavaScript file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<bugzilla href="https://bugzilla.suse.com/899486">SUSE bug 899486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130995" comment="ctags-5.8-7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7283" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7283" ref_url="https://www.suse.com/security/cve/CVE-2014-7283" source="SUSE CVE"/>
    <description>
    The xfs_da3_fixhashpath function in fs/xfs/xfs_da_btree.c in the xfs implementation in the Linux kernel before 3.14.2 does not properly compare btree hash values, which allows local users to cause a denial of service (filesystem corruption, and OOPS or panic) via operations on directories that have hash collisions, as demonstrated by rmdir operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7283/">CVE-2014-7283</cve>
	<bugzilla href="https://bugzilla.suse.com/899480">SUSE bug 899480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7300" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001293.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1348-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00005.html" source="SUSE-SU"/>
    <description>
    GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<bugzilla href="https://bugzilla.suse.com/900031">SUSE bug 900031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140638" comment="gnome-settings-daemon-3.20.1-40.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140639" comment="gnome-settings-daemon-lang-3.20.1-40.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7818</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7818" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7818" ref_url="https://www.suse.com/security/cve/CVE-2014-7818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1515-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7818/">CVE-2014-7818</cve>
	<bugzilla href="https://bugzilla.suse.com/903662">SUSE bug 903662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905727">SUSE bug 905727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685553" comment="rubygem-actionpack-4_2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1471-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00083.html" source="SUSE-SU"/>
    <description>
    The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1455-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00078.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<bugzilla href="https://bugzilla.suse.com/904017">SUSE bug 904017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7829</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7829" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7829" ref_url="https://www.suse.com/security/cve/CVE-2014-7829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1515-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7829/">CVE-2014-7829</cve>
	<bugzilla href="https://bugzilla.suse.com/905727">SUSE bug 905727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685553" comment="rubygem-actionpack-4_2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
    <description>
    The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842</cve>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00097.html" source="SUSE-SU"/>
    <description>
    BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141041" comment="mailx-12.5-28.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
    <description>
    The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970</cve>
	<bugzilla href="https://bugzilla.suse.com/900644">SUSE bug 900644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7975" ref_url="https://www.suse.com/security/cve/CVE-2014-7975" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
    <description>
    The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7975/">CVE-2014-7975</cve>
	<bugzilla href="https://bugzilla.suse.com/900392">SUSE bug 900392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8080" ref_url="https://www.suse.com/security/cve/CVE-2014-8080" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1589-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html" source="SUSE-SU"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8080/">CVE-2014-8080</cve>
	<bugzilla href="https://bugzilla.suse.com/902851">SUSE bug 902851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140929" comment="libruby2_1-2_1-2.1.2-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140930" comment="ruby2.1-2.1.2-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140931" comment="ruby2.1-stdlib-2.1.2-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8090" ref_url="https://www.suse.com/security/cve/CVE-2014-8090" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1589-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html" source="SUSE-SU"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8090/">CVE-2014-8090</cve>
	<bugzilla href="https://bugzilla.suse.com/905326">SUSE bug 905326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140929" comment="libruby2_1-2_1-2.1.2-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140930" comment="ruby2.1-2.1.2-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140931" comment="ruby2.1-stdlib-2.1.2-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8091" ref_url="https://www.suse.com/security/cve/CVE-2014-8091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    X.Org X Window System (aka X11 and X) X11R5 and X.Org Server (aka xserver and xorg-server) before 1.16.3, when using SUN-DES-1 (Secure RPC) authentication credentials, does not check the return value of a malloc call, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a crafted connection request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8091/">CVE-2014-8091</cve>
	<bugzilla href="https://bugzilla.suse.com/882226">SUSE bug 882226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8092" ref_url="https://www.suse.com/security/cve/CVE-2014-8092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.Org X Window System (aka X11 or X) X11R1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) ProcPutImage, (2) GetHosts, (3) RegionSizeof, or (4) REQUEST_FIXED_SIZE function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2014-8092/">CVE-2014-8092</cve>
	<bugzilla href="https://bugzilla.suse.com/1146596">SUSE bug 1146596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8093" ref_url="https://www.suse.com/security/cve/CVE-2014-8093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) __glXDisp_ReadPixels, (2) __glXDispSwap_ReadPixels, (3) __glXDisp_GetTexImage, (4) __glXDispSwap_GetTexImage, (5) GetSeparableFilter, (6) GetConvolutionFilter, (7) GetHistogram, (8) GetMinmax, (9) GetColorTable, (10) __glXGetAnswerBuffer, (11) __GLX_GET_ANSWER_BUFFER, (12) __glXMap1dReqSize, (13) __glXMap1fReqSize, (14) Map2Size, (15) __glXMap2dReqSize, (16) __glXMap2fReqSize, (17) __glXImageSize, or (18) __glXSeparableFilter2DReqSize function, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8093/">CVE-2014-8093</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8094" ref_url="https://www.suse.com/security/cve/CVE-2014-8094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8094/">CVE-2014-8094</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8095" ref_url="https://www.suse.com/security/cve/CVE-2014-8095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The XInput extension in X.Org X Window System (aka X11 or X) X11R4 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXChangeDeviceControl, (2) ProcXChangeDeviceControl, (3) ProcXChangeFeedbackControl, (4) ProcXSendExtensionEvent, (5) SProcXIAllowEvents, (6) SProcXIChangeCursor, (7) ProcXIChangeHierarchy, (8) SProcXIGetClientPointer, (9) SProcXIGrabDevice, (10) SProcXIUngrabDevice, (11) ProcXIUngrabDevice, (12) SProcXIPassiveGrabDevice, (13) ProcXIPassiveGrabDevice, (14) SProcXIPassiveUngrabDevice, (15) ProcXIPassiveUngrabDevice, (16) SProcXListDeviceProperties, (17) SProcXDeleteDeviceProperty, (18) SProcXIListProperties, (19) SProcXIDeleteProperty, (20) SProcXIGetProperty, (21) SProcXIQueryDevice, (22) SProcXIQueryPointer, (23) SProcXISelectEvents, (24) SProcXISetClientPointer, (25) SProcXISetFocus, (26) SProcXIGetFocus, or (27) SProcXIWarpPointer function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8095/">CVE-2014-8095</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8096" ref_url="https://www.suse.com/security/cve/CVE-2014-8096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The SProcXCMiscGetXIDList function in the XC-MISC extension in X.Org X Window System (aka X11 or X) X11R6.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8096/">CVE-2014-8096</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8097" ref_url="https://www.suse.com/security/cve/CVE-2014-8097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The DBE extension in X.Org X Window System (aka X11 or X) X11R6.1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcDbeSwapBuffers or (2) SProcDbeSwapBuffers function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8097/">CVE-2014-8097</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8098" ref_url="https://www.suse.com/security/cve/CVE-2014-8098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) __glXDisp_Render, (2) __glXDisp_RenderLarge, (3) __glXDispSwap_VendorPrivate, (4) __glXDispSwap_VendorPrivateWithReply, (5) set_client_info, (6) __glXDispSwap_SetClientInfoARB, (7) DoSwapInterval, (8) DoGetProgramString, (9) DoGetString, (10) __glXDispSwap_RenderMode, (11) __glXDisp_GetCompressedTexImage, (12) __glXDispSwap_GetCompressedTexImage, (13) __glXDisp_FeedbackBuffer, (14) __glXDispSwap_FeedbackBuffer, (15) __glXDisp_SelectBuffer, (16) __glXDispSwap_SelectBuffer, (17) __glXDisp_Flush, (18) __glXDispSwap_Flush, (19) __glXDisp_Finish, (20) __glXDispSwap_Finish, (21) __glXDisp_ReadPixels, (22) __glXDispSwap_ReadPixels, (23) __glXDisp_GetTexImage, (24) __glXDispSwap_GetTexImage, (25) __glXDisp_GetPolygonStipple, (26) __glXDispSwap_GetPolygonStipple, (27) __glXDisp_GetSeparableFilter, (28) __glXDisp_GetSeparableFilterEXT, (29) __glXDisp_GetConvolutionFilter, (30) __glXDisp_GetConvolutionFilterEXT, (31) __glXDisp_GetHistogram, (32) __glXDisp_GetHistogramEXT, (33) __glXDisp_GetMinmax, (34) __glXDisp_GetMinmaxEXT, (35) __glXDisp_GetColorTable, (36) __glXDisp_GetColorTableSGI, (37) GetSeparableFilter, (38) GetConvolutionFilter, (39) GetHistogram, (40) GetMinmax, or (41) GetColorTable function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8098/">CVE-2014-8098</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8099" ref_url="https://www.suse.com/security/cve/CVE-2014-8099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The XVideo extension in XFree86 4.0.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXvQueryExtension, (2) SProcXvQueryAdaptors, (3) SProcXvQueryEncodings, (4) SProcXvGrabPort, (5) SProcXvUngrabPort, (6) SProcXvPutVideo, (7) SProcXvPutStill, (8) SProcXvGetVideo, (9) SProcXvGetStill, (10) SProcXvPutImage, (11) SProcXvShmPutImage, (12) SProcXvSelectVideoNotify, (13) SProcXvSelectPortNotify, (14) SProcXvStopVideo, (15) SProcXvSetPortAttribute, (16) SProcXvGetPortAttribute, (17) SProcXvQueryBestSize, (18) SProcXvQueryPortAttributes, (19) SProcXvQueryImageAttributes, or (20) SProcXvListImageFormats function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8099/">CVE-2014-8099</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8100" ref_url="https://www.suse.com/security/cve/CVE-2014-8100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The Render extension in XFree86 4.0.1, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcRenderQueryVersion, (2) SProcRenderQueryVersion, (3) SProcRenderQueryPictFormats, (4) SProcRenderQueryPictIndexValues, (5) SProcRenderCreatePicture, (6) SProcRenderChangePicture, (7) SProcRenderSetPictureClipRectangles, (8) SProcRenderFreePicture, (9) SProcRenderComposite, (10) SProcRenderScale, (11) SProcRenderCreateGlyphSet, (12) SProcRenderReferenceGlyphSet, (13) SProcRenderFreeGlyphSet, (14) SProcRenderFreeGlyphs, or (15) SProcRenderCompositeGlyphs function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8100/">CVE-2014-8100</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8101" ref_url="https://www.suse.com/security/cve/CVE-2014-8101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The RandR extension in XFree86 4.2.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcRRQueryVersion, (2) SProcRRGetScreenInfo, (3) SProcRRSelectInput, or (4) SProcRRConfigureOutputProperty function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8101/">CVE-2014-8101</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8102" ref_url="https://www.suse.com/security/cve/CVE-2014-8102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8102/">CVE-2014-8102</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8103" ref_url="https://www.suse.com/security/cve/CVE-2014-8103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1719-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00103.html" source="SUSE-SU"/>
    <description>
    X.Org Server (aka xserver and xorg-server) 1.15.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) sproc_dri3_query_version, (2) sproc_dri3_open, (3) sproc_dri3_pixmap_from_buffer, (4) sproc_dri3_buffer_from_pixmap, (5) sproc_dri3_fence_from_fd, (6) sproc_dri3_fd_from_fence, (7) proc_present_query_capabilities, (8) sproc_present_query_version, (9) sproc_present_pixmap, (10) sproc_present_notify_msc, (11) sproc_present_select_input, or (12) sproc_present_query_capabilities function in the (a) DRI3 or (b) Present extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8103/">CVE-2014-8103</cve>
	<bugzilla href="https://bugzilla.suse.com/907268">SUSE bug 907268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00008.html" source="SUSE-SU"/>
    <description>
    OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141048" comment="openvpn-2.3.8-16.6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141049" comment="openvpn-auth-pam-plugin-2.3.8-16.6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8109" ref_url="https://www.suse.com/security/cve/CVE-2014-8109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00108.html" source="SUSE-SU"/>
    <description>
    mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8109/">CVE-2014-8109</cve>
	<bugzilla href="https://bugzilla.suse.com/909715">SUSE bug 909715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8111" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3970-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183970-1.html" source="SUSE-SU"/>
    <description>
    Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111</cve>
	<bugzilla href="https://bugzilla.suse.com/927845">SUSE bug 927845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140459" comment="apache2-mod_jk-1.2.40-5.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1721-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549834" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549835" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549836" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549837" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1721-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549834" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549835" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549836" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549837" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8118" ref_url="https://www.suse.com/security/cve/CVE-2014-8118" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1716-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00100.html" source="SUSE-SU"/>
    <description>
    Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8118/">CVE-2014-8118</cve>
	<bugzilla href="https://bugzilla.suse.com/1101137">SUSE bug 1101137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906803">SUSE bug 906803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908128">SUSE bug 908128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141108" comment="rpm-4.11.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141109" comment="rpm-32bit-4.11.2-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141110" comment="rpm-build-4.11.2-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
    <description>
    The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140461" comment="augeas-1.2.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140462" comment="augeas-lenses-1.2.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140463" comment="libaugeas0-1.2.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0955-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00084.html" source="SUSE-SU"/>
    <description>
    DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted TIFF image to the (1) checkInkNamesString function in tif_dir.c in the thumbnail tool, (2) compresscontig function in tiff2bw.c in the tiff2bw tool, (3) putcontig8bitCIELab function in tif_getimage.c in the tiff2rgba tool, LZWPreDecode function in tif_lzw.c in the (4) tiff2ps or (5) tiffdither tool, (6) NeXTDecode function in tif_next.c in the tiffmedian tool, or (7) TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    LibTIFF prior to 4.0.4, as used in Apple iOS before 8.4 and OS X before 10.10.4 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550933" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550934" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550935" comment="tiff-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942690">SUSE bug 942690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134</cve>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909078">SUSE bug 909078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8136" ref_url="https://www.suse.com/security/cve/CVE-2014-8136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0008-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html" source="SUSE-SU"/>
    <description>
    The (1) qemuDomainMigratePerform and (2) qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8136/">CVE-2014-8136</cve>
	<bugzilla href="https://bugzilla.suse.com/910862">SUSE bug 910862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0039-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0042-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8138" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001216.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0217-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909475">SUSE bug 909475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<bugzilla href="https://bugzilla.suse.com/909214">SUSE bug 909214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915880">SUSE bug 915880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
    <description>
    Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before 4.2rc4, when an Active Directory Domain Controller (AD DC) is configured, allows remote authenticated users to set the LDB userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain privileges, by leveraging delegation of authority for user-account or computer-account creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<bugzilla href="https://bugzilla.suse.com/914279">SUSE bug 914279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<bugzilla href="https://bugzilla.suse.com/1066493">SUSE bug 1066493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927951">SUSE bug 927951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959178">SUSE bug 959178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546245" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546246" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546248" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549588" comment="libicu-doc-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549589" comment="libicu52_1-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549590" comment="libicu52_1-32bit-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549591" comment="libicu52_1-data-52.1-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594765" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594766" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594767" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8147" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<bugzilla href="https://bugzilla.suse.com/1066493">SUSE bug 1066493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079317">SUSE bug 1079317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910805">SUSE bug 910805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910806">SUSE bug 910806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927951">SUSE bug 927951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959178">SUSE bug 959178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546245" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546246" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546248" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549588" comment="libicu-doc-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549589" comment="libicu52_1-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549590" comment="libicu52_1-32bit-52.1-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549591" comment="libicu52_1-data-52.1-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594765" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594766" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594767" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8148" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00051.html" source="SUSE-SU"/>
    <description>
    The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148</cve>
	<bugzilla href="https://bugzilla.suse.com/912023">SUSE bug 912023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001223.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0200-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0200-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911837">SUSE bug 911837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8159" ref_url="https://www.suse.com/security/cve/CVE-2014-8159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
    <description>
    The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8159/">CVE-2014-8159</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914742">SUSE bug 914742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939241">SUSE bug 939241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="TID7016668" ref_url="https://www.suse.com/support/kb/doc?id=7016668" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160</cve>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8169" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001428.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0475-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html" source="SUSE-SU"/>
    <description>
    automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<bugzilla href="https://bugzilla.suse.com/917977">SUSE bug 917977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140464" comment="autofs-5.0.9-21.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8181" ref_url="https://www.suse.com/security/cve/CVE-2014-8181" source="SUSE CVE"/>
    <description>
    The kernel in Red Hat Enterprise Linux 7 and MRG-2 does not clear garbage data for SG_IO buffer, which may leaking sensitive information to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8181/">CVE-2014-8181</cve>
	<bugzilla href="https://bugzilla.suse.com/980851">SUSE bug 980851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8183</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8183" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8183" ref_url="https://www.suse.com/security/cve/CVE-2014-8183" source="SUSE CVE"/>
    <description>
    It was found that foreman, versions 1.x.x before 1.15.6, in Satellite 6 did not properly enforce access controls on certain resources. An attacker with access to the API and knowledge of the resource name can access resources in other organizations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-8183/">CVE-2014-8183</cve>
	<bugzilla href="https://bugzilla.suse.com/1053752">SUSE bug 1053752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8240" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001100.html" source="SUSE-SU"/>
    <description>
    Integer overflow in TigerVNC allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to screen size handling, which triggers a heap-based buffer overflow, a similar issue to CVE-2014-6051.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<bugzilla href="https://bugzilla.suse.com/900896">SUSE bug 900896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140770" comment="libXvnc1-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140771" comment="tigervnc-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140772" comment="xorg-x11-Xvnc-1.6.0-12.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8242" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1752-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00034.html" source="SUSE-SU"/>
    <description>
    librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922710">SUSE bug 922710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8354" ref_url="https://www.suse.com/security/cve/CVE-2014-8354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00036.html" source="SUSE-SU"/>
    <description>
    The HorizontalFilter function in resize.c in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8354/">CVE-2014-8354</cve>
	<bugzilla href="https://bugzilla.suse.com/903204">SUSE bug 903204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8355" ref_url="https://www.suse.com/security/cve/CVE-2014-8355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00036.html" source="SUSE-SU"/>
    <description>
    PCX parser code in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8355/">CVE-2014-8355</cve>
	<bugzilla href="https://bugzilla.suse.com/903216">SUSE bug 903216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8484" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8484" ref_url="https://www.suse.com/security/cve/CVE-2014-8484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The srec_scan function in bfd/srec.c in libdbfd in GNU binutils before 2.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a small S-record.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8484/">CVE-2014-8484</cve>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902677">SUSE bug 902677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8485" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8485" ref_url="https://www.suse.com/security/cve/CVE-2014-8485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The setup_group function in bfd/elf.c in libbfd in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted section group headers in an ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8485/">CVE-2014-8485</cve>
	<bugzilla href="https://bugzilla.suse.com/902676">SUSE bug 902676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0011-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00039.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<bugzilla href="https://bugzilla.suse.com/908994">SUSE bug 908994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8501" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8501" ref_url="https://www.suse.com/security/cve/CVE-2014-8501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The _bfd_XXi_swap_aouthdr_in function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) and possibly have other unspecified impact via a crafted NumberOfRvaAndSizes field in the AOUT header in a PE executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8501/">CVE-2014-8501</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8502" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8502" ref_url="https://www.suse.com/security/cve/CVE-2014-8502" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pe_print_edata function in bfd/peXXigen.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a truncated export table in a PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8502/">CVE-2014-8502</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8503" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8503" ref_url="https://www.suse.com/security/cve/CVE-2014-8503" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ihex_scan function in bfd/ihex.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted ihex file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8503/">CVE-2014-8503</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8504" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8504" ref_url="https://www.suse.com/security/cve/CVE-2014-8504" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the srec_scan function in bfd/srec.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (crash) and possibly have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8504/">CVE-2014-8504</cve>
	<bugzilla href="https://bugzilla.suse.com/903655">SUSE bug 903655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8561" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8561" ref_url="https://www.suse.com/security/cve/CVE-2014-8561" source="SUSE CVE"/>
    <description>
    imagemagick 6.8.9.6 has remote DOS via infinite loop
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-8561/">CVE-2014-8561</cve>
	<bugzilla href="https://bugzilla.suse.com/1156786">SUSE bug 1156786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8562" ref_url="https://www.suse.com/security/cve/CVE-2014-8562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00036.html" source="SUSE-SU"/>
    <description>
    DCM decode in ImageMagick before 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds read).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8562/">CVE-2014-8562</cve>
	<bugzilla href="https://bugzilla.suse.com/903638">SUSE bug 903638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1472-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html" source="SUSE-SU"/>
    <description>
    The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<bugzilla href="https://bugzilla.suse.com/904603">SUSE bug 904603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<bugzilla href="https://bugzilla.suse.com/913064">SUSE bug 913064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0133-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<bugzilla href="https://bugzilla.suse.com/913066">SUSE bug 913066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0077-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<bugzilla href="https://bugzilla.suse.com/913067">SUSE bug 913067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8650</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8650" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8650" ref_url="https://www.suse.com/security/cve/CVE-2014-8650" source="SUSE CVE"/>
    <description>
    python-requests-Kerberos through 0.5 does not handle mutual authentication
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8650/">CVE-2014-8650</cve>
	<bugzilla href="https://bugzilla.suse.com/1160886">SUSE bug 1160886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339347" comment="python-requests-kerberos is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709</cve>
	<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8716" ref_url="https://www.suse.com/security/cve/CVE-2014-8716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-11/msg00100.html" source="SUSE-SU"/>
    <description>
    The JPEG decoder in ImageMagick before 6.8.9-9 allows local users to cause a denial of service (out-of-bounds memory access and crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8716/">CVE-2014-8716</cve>
	<bugzilla href="https://bugzilla.suse.com/905260">SUSE bug 905260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8737" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8737" ref_url="https://www.suse.com/security/cve/CVE-2014-8737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU binutils 2.24 and earlier allow local users to delete arbitrary files via a .. (dot dot) or full path name in an archive to (1) strip or (2) objcopy or create arbitrary files via (3) a .. (dot dot) or full path name in an archive to ar.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8737/">CVE-2014-8737</cve>
	<bugzilla href="https://bugzilla.suse.com/905736">SUSE bug 905736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8738" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8738" ref_url="https://www.suse.com/security/cve/CVE-2014-8738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001192.html" source="SUSE-SU"/>
    <description>
    The _bfd_slurp_extended_name_table function in bfd/archive.c in GNU binutils 2.24 and earlier allows remote attackers to cause a denial of service (invalid write, segmentation fault, and crash) via a crafted extended name table in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8738/">CVE-2014-8738</cve>
	<bugzilla href="https://bugzilla.suse.com/905735">SUSE bug 905735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140482" comment="binutils-2.26.1-9.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8767" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<bugzilla href="https://bugzilla.suse.com/905870">SUSE bug 905870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8768" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allow remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8769" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<bugzilla href="https://bugzilla.suse.com/905871">SUSE bug 905871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905872">SUSE bug 905872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8884" ref_url="https://www.suse.com/security/cve/CVE-2014-8884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00019.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8884/">CVE-2014-8884</cve>
	<bugzilla href="https://bugzilla.suse.com/904876">SUSE bug 904876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905522">SUSE bug 905522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905739">SUSE bug 905739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905744">SUSE bug 905744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905748">SUSE bug 905748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905764">SUSE bug 905764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8891" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0343-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="TID7016228" ref_url="https://www.suse.com/support/kb/doc/?id=7016228" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors related to the security manager.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891</cve>
	<bugzilla href="https://bugzilla.suse.com/916266">SUSE bug 916266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8892" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0343-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="TID7016228" ref_url="https://www.suse.com/support/kb/doc/?id=7016228" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via unspecified vectors related to the security manager.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892</cve>
	<bugzilla href="https://bugzilla.suse.com/916265">SUSE bug 916265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00034.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<bugzilla href="https://bugzilla.suse.com/906831">SUSE bug 906831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907764">SUSE bug 907764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969774">SUSE bug 969774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140571" comment="libFLAC++6-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140572" comment="libFLAC8-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140573" comment="libFLAC8-32bit-1.3.0-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8991</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8991" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991" source="SUSE CVE"/>
    <description>
    pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991</cve>
	<bugzilla href="https://bugzilla.suse.com/907038">SUSE bug 907038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561562" comment="python-pip-10.0.1-11.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561558" comment="python-ply-3.4-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1588-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00034.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<bugzilla href="https://bugzilla.suse.com/907016">SUSE bug 907016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969774">SUSE bug 969774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140571" comment="libFLAC++6-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140572" comment="libFLAC8-1.3.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140573" comment="libFLAC8-32bit-1.3.0-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001206.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
    <description>
    Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906364">SUSE bug 906364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909474">SUSE bug 909474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106110" comment="libjasper1-1.900.1-170.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106111" comment="libjasper1-32bit-1.900.1-170.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9050" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9050" ref_url="https://www.suse.com/security/cve/CVE-2014-9050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00003.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9050/">CVE-2014-9050</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906770">SUSE bug 906770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1682-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00081.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996084">SUSE bug 996084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00055.html" source="SUSE-SU"/>
    <description>
    libjpeg-turbo before 1.3.1 allows remote attackers to cause a denial of service (crash) via a crafted JPEG file, related to the Exif marker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<bugzilla href="https://bugzilla.suse.com/906761">SUSE bug 906761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105080" comment="libjpeg-turbo-1.3.1-30.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105088" comment="libjpeg62-62.1.0-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105087" comment="libjpeg62-32bit-62.1.0-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105091" comment="libjpeg62-turbo-1.3.1-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105082" comment="libjpeg8-8.0.2-30.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105081" comment="libjpeg8-32bit-8.0.2-30.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105086" comment="libturbojpeg0-8.0.2-30.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1643-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00061.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009102938" comment="cpio-2.11-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009102939" comment="cpio-lang-2.11-29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001313.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html" source="SUSE-SU"/>
    <description>
    Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<bugzilla href="https://bugzilla.suse.com/907434">SUSE bug 907434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908742">SUSE bug 908742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140779" comment="libblkid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140780" comment="libblkid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140781" comment="libfdisk1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140782" comment="libmount1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140783" comment="libmount1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140784" comment="libsmartcols1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140785" comment="libuuid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140786" comment="libuuid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140787" comment="python-libmount-2.28-40.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140788" comment="util-linux-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140789" comment="util-linux-lang-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140790" comment="util-linux-systemd-2.28-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140791" comment="uuidd-2.28-40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005432.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00018.html" source="SUSE-SU"/>
    <description>
    The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<bugzilla href="https://bugzilla.suse.com/907453">SUSE bug 907453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141043" comment="mutt-1.6.0-54.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0925-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1625-1" ref_url="https://lists.opensuse.org/opensuse-updates/2014-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0319-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html" source="SUSE-SU"/>
    <description>
    scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<bugzilla href="https://bugzilla.suse.com/907809">SUSE bug 907809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921588">SUSE bug 921588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141036" comment="libyaml-0-2-0.1.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009109959" comment="perl-YAML-LibYAML-0.38-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9140" ref_url="https://www.suse.com/security/cve/CVE-2014-9140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9140/">CVE-2014-9140</cve>
	<bugzilla href="https://bugzilla.suse.com/923142">SUSE bug 923142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141140" comment="tcpdump-4.5.1-10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9221" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0114-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00054.html" source="SUSE-SU"/>
    <description>
    strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<bugzilla href="https://bugzilla.suse.com/910491">SUSE bug 910491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9273" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9273" ref_url="https://www.suse.com/security/cve/CVE-2014-9273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0189-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00005.html" source="SUSE-SU"/>
    <description>
    lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9273/">CVE-2014-9273</cve>
	<bugzilla href="https://bugzilla.suse.com/908614">SUSE bug 908614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106170" comment="libhivex0-1.3.10-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106171" comment="perl-Win-Hivex-1.3.10-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1686-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1686-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="TID7016020" ref_url="https://www.suse.com/support/kb/doc?id=7016020" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00024.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1670-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00024.html" source="SUSE-SU"/>
    <description>
    The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296</cve>
	<bugzilla href="https://bugzilla.suse.com/910764">SUSE bug 910764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911053">SUSE bug 911053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0259-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00023.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948963">SUSE bug 948963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9328" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upack packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915512">SUSE bug 915512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9390" ref_url="https://www.suse.com/security/cve/CVE-2014-9390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0154-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001180.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0673-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1096-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00045.html" source="SUSE-SU"/>
    <description>
    Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9390/">CVE-2014-9390</cve>
	<bugzilla href="https://bugzilla.suse.com/910756">SUSE bug 910756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925040">SUSE bug 925040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124820" comment="git-core-1.8.5.6-18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<bugzilla href="https://bugzilla.suse.com/910599">SUSE bug 910599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html" source="SUSE-SU"/>
    <description>
    The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001269.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00063.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the read_long_names function in libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009106094" comment="elfutils-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106096" comment="libasm1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106097" comment="libasm1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106099" comment="libdw1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106100" comment="libdw1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106102" comment="libebl1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106103" comment="libebl1-32bit-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106106" comment="libelf1-0.158-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106107" comment="libelf1-32bit-0.158-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001208.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mpfr_strtofr function in GNU MPFR before 3.1.2-p11 allows context-dependent attackers to have unspecified impact via vectors related to incorrect documentation for mpn_set_str.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<bugzilla href="https://bugzilla.suse.com/911812">SUSE bug 911812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009105814" comment="libmpfr4-3.1.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009105815" comment="libmpfr4-32bit-3.1.2-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="TID7016082" ref_url="https://www.suse.com/support/kb/doc/?id=7016082" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495</cve>
	<bugzilla href="https://bugzilla.suse.com/912076">SUSE bug 912076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912929">SUSE bug 912929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<bugzilla href="https://bugzilla.suse.com/911796">SUSE bug 911796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1695-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00044.html" source="SUSE-SU"/>
    <description>
    rsync 3.1.1 allows remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960191">SUSE bug 960191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141111" comment="rsync-3.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0187-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0449-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qtmd_decompress function in libmspack 0.4 allows remote attackers to cause a denial of service (hang) via a crafted CAB file, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919283">SUSE bug 919283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585</cve>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9620" ref_url="https://www.suse.com/security/cve/CVE-2014-9620" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    The ELF parser in file 5.08 through 5.21 allows remote attackers to cause a denial of service via a large number of notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9620/">CVE-2014-9620</cve>
	<bugzilla href="https://bugzilla.suse.com/913651">SUSE bug 913651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549834" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549835" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549836" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549837" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9621" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9621" ref_url="https://www.suse.com/security/cve/CVE-2014-9621" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    The ELF parser in file 5.16 through 5.21 allows remote attackers to cause a denial of service via a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9621/">CVE-2014-9621</cve>
	<bugzilla href="https://bugzilla.suse.com/913650">SUSE bug 913650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549834" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549835" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549836" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549837" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9622" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9622" ref_url="https://www.suse.com/security/cve/CVE-2014-9622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001219.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0191-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00007.html" source="SUSE-SU"/>
    <description>
    Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9622/">CVE-2014-9622</cve>
	<bugzilla href="https://bugzilla.suse.com/913676">SUSE bug 913676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106065" comment="xdg-utils-20140630-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<bugzilla href="https://bugzilla.suse.com/914442">SUSE bug 914442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009106381" comment="unzip-6.00-32.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9638" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0522-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html" source="SUSE-SU"/>
    <description>
    oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0522-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00054.html" source="SUSE-SU"/>
    <description>
    Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<bugzilla href="https://bugzilla.suse.com/1081744">SUSE bug 1081744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914439">SUSE bug 914439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914441">SUSE bug 914441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9640" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0231-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00032.html" source="SUSE-SU"/>
    <description>
    oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914938">SUSE bug 914938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919283">SUSE bug 919283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9645" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9645" ref_url="https://www.suse.com/security/cve/CVE-2014-9645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001555.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1083-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00041.html" source="SUSE-SU"/>
    <description>
    The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9645/">CVE-2014-9645</cve>
	<bugzilla href="https://bugzilla.suse.com/914423">SUSE bug 914423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914660">SUSE bug 914660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113975" comment="busybox-1.21.1-3.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9653" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9653" ref_url="https://www.suse.com/security/cve/CVE-2014-9653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3067-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00071.html" source="SUSE-SU"/>
    <description>
    readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9653/">CVE-2014-9653</cve>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549834" comment="file-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549835" comment="file-magic-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549836" comment="libmagic1-5.22-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549837" comment="libmagic1-32bit-5.22-10.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9654" ref_url="https://www.suse.com/security/cve/CVE-2014-9654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002018.html" source="SUSE-SU"/>
    <description>
    The Regular Expressions package in International Components for Unicode (ICU) for C/C++ before 2014-12-03, as used in Google Chrome before 40.0.2214.91, calculates certain values without ensuring that they can be represented in a 24-bit field, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted string, a related issue to CVE-2014-7923.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9654/">CVE-2014-9654</cve>
	<bugzilla href="https://bugzilla.suse.com/917129">SUSE bug 917129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929629">SUSE bug 929629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952260">SUSE bug 952260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107570" comment="libicu-doc-52.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107572" comment="libicu52_1-52.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107571" comment="libicu52_1-32bit-52.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107573" comment="libicu52_1-data-52.1-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916927">SUSE bug 916927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<bugzilla href="https://bugzilla.suse.com/916847">SUSE bug 916847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<bugzilla href="https://bugzilla.suse.com/916867">SUSE bug 916867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<bugzilla href="https://bugzilla.suse.com/916860">SUSE bug 916860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<bugzilla href="https://bugzilla.suse.com/916862">SUSE bug 916862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<bugzilla href="https://bugzilla.suse.com/916868">SUSE bug 916868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0627-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html" source="SUSE-SU"/>
    <description>
    bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140589" comment="ft2demos-2.6.3-7.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140587" comment="libfreetype6-2.6.3-7.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140588" comment="libfreetype6-32bit-2.6.3-7.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9679" ref_url="https://www.suse.com/security/cve/CVE-2014-9679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0465-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001311.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0381-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00098.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9679/">CVE-2014-9679</cve>
	<bugzilla href="https://bugzilla.suse.com/917799">SUSE bug 917799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1849-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1913-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2983-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3004-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<bugzilla href="https://bugzilla.suse.com/917806">SUSE bug 917806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919737">SUSE bug 919737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953359">SUSE bug 953359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141130" comment="sudo-1.8.10p3-6.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9687" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" source="SUSE-SU"/>
    <description>
    eCryptfs 104 and earlier uses a default salt to encrypt the mount passphrase, which makes it easier for attackers to obtain user passwords via a brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<bugzilla href="https://bugzilla.suse.com/920160">SUSE bug 920160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9709" ref_url="https://www.suse.com/security/cve/CVE-2014-9709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html" source="SUSE-SU"/>
    <description>
    The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9709/">CVE-2014-9709</cve>
	<bugzilla href="https://bugzilla.suse.com/923945">SUSE bug 923945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923946">SUSE bug 923946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9732" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9732" ref_url="https://www.suse.com/security/cve/CVE-2014-9732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    The cabd_extract function in cabd.c in libmspack before 0.5 does not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9732/">CVE-2014-9732</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9749" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1835-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1835-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0192-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0223-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00124.html" source="SUSE-SU"/>
    <description>
    Squid 3.4.4 through 3.4.11 and 3.5.0.1 through 3.5.1, when Digest authentication is used, allow remote authenticated users to retain access by leveraging a stale nonce, aka "Nonce replay vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<bugzilla href="https://bugzilla.suse.com/949942">SUSE bug 949942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993299">SUSE bug 993299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550189" comment="squid-3.5.21-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1995-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html" source="SUSE-SU"/>
    <description>
    The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953521">SUSE bug 953521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9805" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9805" ref_url="https://www.suse.com/security/cve/CVE-2014-9805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted pnm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9805/">CVE-2014-9805</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983752">SUSE bug 983752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9806" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9806" ref_url="https://www.suse.com/security/cve/CVE-2014-9806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (file descriptor consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9806/">CVE-2014-9806</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983774">SUSE bug 983774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9807" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9807" ref_url="https://www.suse.com/security/cve/CVE-2014-9807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The pdb coder in ImageMagick allows remote attackers to cause a denial of service (double free) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9807/">CVE-2014-9807</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983794">SUSE bug 983794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9808" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9808" ref_url="https://www.suse.com/security/cve/CVE-2014-9808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted dpc image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9808/">CVE-2014-9808</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983796">SUSE bug 983796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9809" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9809" ref_url="https://www.suse.com/security/cve/CVE-2014-9809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted xwd image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9809/">CVE-2014-9809</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983799">SUSE bug 983799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9810" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9810" ref_url="https://www.suse.com/security/cve/CVE-2014-9810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The dpx file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed dpx file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9810/">CVE-2014-9810</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983803">SUSE bug 983803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9811" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9811" ref_url="https://www.suse.com/security/cve/CVE-2014-9811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The xwd file handler in ImageMagick allows remote attackers to cause a denial of service (segmentation fault and application crash) via a malformed xwd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9811/">CVE-2014-9811</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984032">SUSE bug 984032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9812" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9812" ref_url="https://www.suse.com/security/cve/CVE-2014-9812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted ps file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9812/">CVE-2014-9812</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984137">SUSE bug 984137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9813" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9813" ref_url="https://www.suse.com/security/cve/CVE-2014-9813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted viff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9813/">CVE-2014-9813</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9814" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9814" ref_url="https://www.suse.com/security/cve/CVE-2014-9814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted wpg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9814/">CVE-2014-9814</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984193">SUSE bug 984193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9815" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9815" ref_url="https://www.suse.com/security/cve/CVE-2014-9815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (application crash) via a crafted wpg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9815/">CVE-2014-9815</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984372">SUSE bug 984372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9816" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9816" ref_url="https://www.suse.com/security/cve/CVE-2014-9816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted viff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9816/">CVE-2014-9816</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984035">SUSE bug 984035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984398">SUSE bug 984398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9817" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9817" ref_url="https://www.suse.com/security/cve/CVE-2014-9817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pdb file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9817/">CVE-2014-9817</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984400">SUSE bug 984400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9818" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9818" ref_url="https://www.suse.com/security/cve/CVE-2014-9818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a malformed sun file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9818/">CVE-2014-9818</cve>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984181">SUSE bug 984181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9819" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9819" ref_url="https://www.suse.com/security/cve/CVE-2014-9819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9823.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9819/">CVE-2014-9819</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984142">SUSE bug 984142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9820" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9820" ref_url="https://www.suse.com/security/cve/CVE-2014-9820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted pnm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9820/">CVE-2014-9820</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984150">SUSE bug 984150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9821" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9821" ref_url="https://www.suse.com/security/cve/CVE-2014-9821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted xpm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9821/">CVE-2014-9821</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984014">SUSE bug 984014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9822" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9822" ref_url="https://www.suse.com/security/cve/CVE-2014-9822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted quantum file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9822/">CVE-2014-9822</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984187">SUSE bug 984187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9823" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9823" ref_url="https://www.suse.com/security/cve/CVE-2014-9823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted palm file, a different vulnerability than CVE-2014-9819.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9823/">CVE-2014-9823</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984401">SUSE bug 984401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9824" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9824" ref_url="https://www.suse.com/security/cve/CVE-2014-9824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9825.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9824/">CVE-2014-9824</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984185">SUSE bug 984185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9825" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9825" ref_url="https://www.suse.com/security/cve/CVE-2014-9825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file, a different vulnerability than CVE-2014-9824.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9825/">CVE-2014-9825</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984427">SUSE bug 984427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9826" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9826" ref_url="https://www.suse.com/security/cve/CVE-2014-9826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick allows remote attackers to have unspecified impact via vectors related to error handling in sun files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9826/">CVE-2014-9826</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9828" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9828" ref_url="https://www.suse.com/security/cve/CVE-2014-9828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted psd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9828/">CVE-2014-9828</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984028">SUSE bug 984028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9829" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9829" ref_url="https://www.suse.com/security/cve/CVE-2014-9829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    coders/sun.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted sun file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9829/">CVE-2014-9829</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984409">SUSE bug 984409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9830" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9830" ref_url="https://www.suse.com/security/cve/CVE-2014-9830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    coders/sun.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted sun file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9830/">CVE-2014-9830</cve>
	<bugzilla href="https://bugzilla.suse.com/1000690">SUSE bug 1000690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984135">SUSE bug 984135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9831" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9831" ref_url="https://www.suse.com/security/cve/CVE-2014-9831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via a corrupted wpg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9831/">CVE-2014-9831</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9832" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9832" ref_url="https://www.suse.com/security/cve/CVE-2014-9832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted pcx file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9832/">CVE-2014-9832</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984183">SUSE bug 984183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9833" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9833" ref_url="https://www.suse.com/security/cve/CVE-2014-9833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted psd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9833/">CVE-2014-9833</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984406">SUSE bug 984406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984427">SUSE bug 984427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9834" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9834" ref_url="https://www.suse.com/security/cve/CVE-2014-9834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted pict file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9834/">CVE-2014-9834</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984436">SUSE bug 984436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9835" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9835" ref_url="https://www.suse.com/security/cve/CVE-2014-9835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Heap overflow in ImageMagick 6.8.9-9 via a crafted wpf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9835/">CVE-2014-9835</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984145">SUSE bug 984145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984375">SUSE bug 984375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9836" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9836" ref_url="https://www.suse.com/security/cve/CVE-2014-9836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service via a crafted xpm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9836/">CVE-2014-9836</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984023">SUSE bug 984023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9837" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9837" ref_url="https://www.suse.com/security/cve/CVE-2014-9837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    coders/pnm.c in ImageMagick 6.9.0-1 Beta and earlier allows remote attackers to cause a denial of service (crash) via a crafted png file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9837/">CVE-2014-9837</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984166">SUSE bug 984166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9838" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9838" ref_url="https://www.suse.com/security/cve/CVE-2014-9838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    magick/cache.c in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9838/">CVE-2014-9838</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984370">SUSE bug 984370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9839" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9839" ref_url="https://www.suse.com/security/cve/CVE-2014-9839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
    <description>
    magick/colormap-private.h in ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9839/">CVE-2014-9839</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984379">SUSE bug 984379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9840" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9840" ref_url="https://www.suse.com/security/cve/CVE-2014-9840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.8.9-9 allows remote attackers to cause a denial of service (out-of-bounds access) via a crafted palm file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9840/">CVE-2014-9840</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984433">SUSE bug 984433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9841" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9841" ref_url="https://www.suse.com/security/cve/CVE-2014-9841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact via unknown vectors, related to "throwing of exceptions."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9841/">CVE-2014-9841</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984172">SUSE bug 984172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984186">SUSE bug 984186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9842" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9842" ref_url="https://www.suse.com/security/cve/CVE-2014-9842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9842/">CVE-2014-9842</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984172">SUSE bug 984172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984374">SUSE bug 984374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9843" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9843" ref_url="https://www.suse.com/security/cve/CVE-2014-9843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DecodePSDPixels function in coders/psd.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9843/">CVE-2014-9843</cve>
	<bugzilla href="https://bugzilla.suse.com/1000697">SUSE bug 1000697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984179">SUSE bug 984179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9844" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9844" ref_url="https://www.suse.com/security/cve/CVE-2014-9844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9844/">CVE-2014-9844</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984373">SUSE bug 984373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9845" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9845" ref_url="https://www.suse.com/security/cve/CVE-2014-9845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The ReadDIBImage function in coders/dib.c in ImageMagick allows remote attackers to cause a denial of service (crash) via a corrupted dib file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9845/">CVE-2014-9845</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984394">SUSE bug 984394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9846" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9846" ref_url="https://www.suse.com/security/cve/CVE-2014-9846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.8.9.9 allows remote attackers to have unspecified impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9846/">CVE-2014-9846</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983521">SUSE bug 983521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9847" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9847" ref_url="https://www.suse.com/security/cve/CVE-2014-9847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The jng decoder in ImageMagick 6.8.9.9 allows remote attackers to have an unspecified impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9847/">CVE-2014-9847</cve>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984144">SUSE bug 984144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9848" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9848" ref_url="https://www.suse.com/security/cve/CVE-2014-9848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    Memory leak in ImageMagick allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9848/">CVE-2014-9848</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984404">SUSE bug 984404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549273" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549274" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9849" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9849" ref_url="https://www.suse.com/security/cve/CVE-2014-9849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The png coder in ImageMagick allows remote attackers to cause a denial of service (crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9849/">CVE-2014-9849</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984018">SUSE bug 984018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9850" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9850" ref_url="https://www.suse.com/security/cve/CVE-2014-9850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Logic error in ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (resource consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9850/">CVE-2014-9850</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984149">SUSE bug 984149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9851" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9851" ref_url="https://www.suse.com/security/cve/CVE-2014-9851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.8.9.9 allows remote attackers to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9851/">CVE-2014-9851</cve>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984160">SUSE bug 984160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9852" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9852" ref_url="https://www.suse.com/security/cve/CVE-2014-9852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    distribute-cache.c in ImageMagick re-uses objects after they have been destroyed, which allows remote attackers to have unspecified impact via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9852/">CVE-2014-9852</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984191">SUSE bug 984191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9853" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9853" ref_url="https://www.suse.com/security/cve/CVE-2014-9853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Memory leak in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (memory consumption) via a crafted rle file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9853/">CVE-2014-9853</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984408">SUSE bug 984408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9854" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9854" ref_url="https://www.suse.com/security/cve/CVE-2014-9854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    coders/tiff.c in ImageMagick allows remote attackers to cause a denial of service (application crash) via vectors related to the "identification of image."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9854/">CVE-2014-9854</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984184">SUSE bug 984184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9904" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9904" ref_url="https://www.suse.com/security/cve/CVE-2014-9904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9904/">CVE-2014-9904</cve>
	<bugzilla href="https://bugzilla.suse.com/986811">SUSE bug 986811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986941">SUSE bug 986941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9913" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913</cve>
	<bugzilla href="https://bugzilla.suse.com/1013993">SUSE bug 1013993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334480" comment="unzip is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9914" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9914" ref_url="https://www.suse.com/security/cve/CVE-2014-9914" source="SUSE CVE"/>
    <description>
    Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9914/">CVE-2014-9914</cve>
	<bugzilla href="https://bugzilla.suse.com/1023997">SUSE bug 1023997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9915" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9915" ref_url="https://www.suse.com/security/cve/CVE-2014-9915" source="SUSE CVE"/>
    <description>
    Off-by-one error in ImageMagick before 6.6.0-4 allows remote attackers to cause a denial of service (application crash) via a crafted 8BIM profile.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9915/">CVE-2014-9915</cve>
	<bugzilla href="https://bugzilla.suse.com/1016575">SUSE bug 1016575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017306">SUSE bug 1017306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9922" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
    <description>
    The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922</cve>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9939" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    ihex.c in GNU Binutils before 2.26 contains a stack buffer overflow when printing bad bytes in Intel Hex objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105209">SUSE bug 1105209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9940" ref_url="https://www.suse.com/security/cve/CVE-2014-9940" source="SUSE CVE"/>
    <description>
    The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9940/">CVE-2014-9940</cve>
	<bugzilla href="https://bugzilla.suse.com/1037307">SUSE bug 1037307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0138" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0138" ref_url="https://www.suse.com/security/cve/CVE-2015-0138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
    <description>
    GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0138/">CVE-2015-0138</cve>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0192" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0192" ref_url="https://www.suse.com/security/cve/CVE-2015-0192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0192/">CVE-2015-0192</cve>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016252" ref_url="https://www.suse.com/support/kb/doc?id=7016252" source="SUSE-SU"/>
		<reference ref_id="TID7016260" ref_url="https://www.suse.com/support/kb/doc/?id=7016260" source="SUSE-SU"/>
		<reference ref_id="TID7016273" ref_url="https://www.suse.com/support/kb/doc/?id=7016273" source="SUSE-SU"/>
		<reference ref_id="TID7016312" ref_url="https://www.suse.com/support/kb/doc/?id=7016312" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7016340" ref_url="https://www.suse.com/support/kb/doc/?id=7016340" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920482">SUSE bug 920482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920484">SUSE bug 920484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
    <description>
    The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
    <description>
    Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<bugzilla href="https://bugzilla.suse.com/912292">SUSE bug 912292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0210" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0210" ref_url="https://www.suse.com/security/cve/CVE-2015-0210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004183.html" source="SUSE-SU"/>
    <description>
    wpa_supplicant 2.0-16 does not properly check certificate subject name, which allows remote attackers to cause a man-in-the-middle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0210/">CVE-2015-0210</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0228" ref_url="https://www.suse.com/security/cve/CVE-2015-0228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00006.html" source="SUSE-SU"/>
    <description>
    The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0228/">CVE-2015-0228</cve>
	<bugzilla href="https://bugzilla.suse.com/918352">SUSE bug 918352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0225-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00028.html" source="SUSE-SU"/>
    <description>
    libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<bugzilla href="https://bugzilla.suse.com/914693">SUSE bug 914693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0353-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<bugzilla href="https://bugzilla.suse.com/917376">SUSE bug 917376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2736-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00017.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<bugzilla href="https://bugzilla.suse.com/1003898">SUSE bug 1003898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916343">SUSE bug 916343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140535" comment="dbus-1-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140536" comment="dbus-1-x11-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140537" comment="libdbus-1-3-1.8.16-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140538" comment="libdbus-1-3-32bit-1.8.16-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00050.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113256" comment="e2fsprogs-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113260" comment="libcom_err2-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113261" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113264" comment="libext2fs2-1.42.11-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0252" ref_url="https://www.suse.com/security/cve/CVE-2015-0252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001316.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00012.html" source="SUSE-SU"/>
    <description>
    internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0252/">CVE-2015-0252</cve>
	<bugzilla href="https://bugzilla.suse.com/920810">SUSE bug 920810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0253" ref_url="https://www.suse.com/security/cve/CVE-2015-0253" source="SUSE CVE"/>
    <description>
    The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0253/">CVE-2015-0253</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0254" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1751-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00033.html" source="SUSE-SU"/>
    <description>
    Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) &lt;x:parse&gt; or (2) &lt;x:transform&gt; JSTL XML tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254</cve>
	<bugzilla href="https://bugzilla.suse.com/920813">SUSE bug 920813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009533005" comment="jakarta-taglibs-standard-1.1.1-255.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533006" comment="jakarta-taglibs-standard-javadoc-1.1.1-255.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001403.html" source="SUSE-SU"/>
		<reference ref_id="TID7016170" ref_url="https://www.suse.com/support/kb/doc/?id=7016170" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0337-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0338-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00086.html" source="SUSE-SU"/>
    <description>
    X.Org Server (aka xserver and xorg-server) before 1.16.3 and 1.17.x before 1.17.1 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<bugzilla href="https://bugzilla.suse.com/915810">SUSE bug 915810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140770" comment="libXvnc1-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140771" comment="tigervnc-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140772" comment="xorg-x11-Xvnc-1.6.0-12.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0275" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0275" ref_url="https://www.suse.com/security/cve/CVE-2015-0275" source="SUSE CVE"/>
    <description>
    The ext4_zero_range function in fs/ext4/extents.c in the Linux kernel before 4.1 allows local users to cause a denial of service (BUG) via a crafted fallocate zero-range request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0275/">CVE-2015-0275</cve>
	<bugzilla href="https://bugzilla.suse.com/919032">SUSE bug 919032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0554-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0294" ref_url="https://www.suse.com/security/cve/CVE-2015-0294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001351.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0622-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00086.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0294/">CVE-2015-0294</cve>
	<bugzilla href="https://bugzilla.suse.com/919938">SUSE bug 919938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0295" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0573-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html" source="SUSE-SU"/>
    <description>
    The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936523">SUSE bug 936523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0374" ref_url="https://www.suse.com/security/cve/CVE-2015-0374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0374/">CVE-2015-0374</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0381" ref_url="https://www.suse.com/security/cve/CVE-2015-0381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0381/">CVE-2015-0381</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0382" ref_url="https://www.suse.com/security/cve/CVE-2015-0382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0382/">CVE-2015-0382</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0383" ref_url="https://www.suse.com/security/cve/CVE-2015-0383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows local users to affect integrity and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0383/">CVE-2015-0383</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0391" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0391" ref_url="https://www.suse.com/security/cve/CVE-2015-0391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0391/">CVE-2015-0391</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915913">SUSE bug 915913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0395" ref_url="https://www.suse.com/security/cve/CVE-2015-0395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0395/">CVE-2015-0395</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0400" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0400" ref_url="https://www.suse.com/security/cve/CVE-2015-0400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0400/">CVE-2015-0400</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0407" ref_url="https://www.suse.com/security/cve/CVE-2015-0407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0407/">CVE-2015-0407</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0408" ref_url="https://www.suse.com/security/cve/CVE-2015-0408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0408/">CVE-2015-0408</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0410" ref_url="https://www.suse.com/security/cve/CVE-2015-0410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0410/">CVE-2015-0410</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0411" ref_url="https://www.suse.com/security/cve/CVE-2015-0411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0411/">CVE-2015-0411</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0412" ref_url="https://www.suse.com/security/cve/CVE-2015-0412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0412/">CVE-2015-0412</cve>
	<bugzilla href="https://bugzilla.suse.com/914041">SUSE bug 914041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0432" ref_url="https://www.suse.com/security/cve/CVE-2015-0432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0432/">CVE-2015-0432</cve>
	<bugzilla href="https://bugzilla.suse.com/914058">SUSE bug 914058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915911">SUSE bug 915911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0433" ref_url="https://www.suse.com/security/cve/CVE-2015-0433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0433/">CVE-2015-0433</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0441" ref_url="https://www.suse.com/security/cve/CVE-2015-0441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0441/">CVE-2015-0441</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0459" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0460" ref_url="https://www.suse.com/security/cve/CVE-2015-0460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0460/">CVE-2015-0460</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0486" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0486" ref_url="https://www.suse.com/security/cve/CVE-2015-0486" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u40 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0486/">CVE-2015-0486</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0491" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00018.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932310">SUSE bug 932310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0499" ref_url="https://www.suse.com/security/cve/CVE-2015-0499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0499/">CVE-2015-0499</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0501" ref_url="https://www.suse.com/security/cve/CVE-2015-0501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0501/">CVE-2015-0501</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0505" ref_url="https://www.suse.com/security/cve/CVE-2015-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0505/">CVE-2015-0505</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0559" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<bugzilla href="https://bugzilla.suse.com/912365">SUSE bug 912365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0561" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<bugzilla href="https://bugzilla.suse.com/912368">SUSE bug 912368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<bugzilla href="https://bugzilla.suse.com/912369">SUSE bug 912369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<bugzilla href="https://bugzilla.suse.com/912370">SUSE bug 912370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0113-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<bugzilla href="https://bugzilla.suse.com/912372">SUSE bug 912372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0797" ref_url="https://www.suse.com/security/cve/CVE-2015-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0921-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
    <description>
    GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0797/">CVE-2015-0797</cve>
	<bugzilla href="https://bugzilla.suse.com/927559">SUSE bug 927559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925401">SUSE bug 925401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<bugzilla href="https://bugzilla.suse.com/913068">SUSE bug 913068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925398">SUSE bug 925398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925393">SUSE bug 925393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925392">SUSE bug 925392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925392">SUSE bug 925392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0704-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<bugzilla href="https://bugzilla.suse.com/925368">SUSE bug 925368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/925395">SUSE bug 925395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0607-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html" source="SUSE-SU"/>
    <description>
    The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0593-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0607-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0636-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00096.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<bugzilla href="https://bugzilla.suse.com/923495">SUSE bug 923495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<bugzilla href="https://bugzilla.suse.com/910669">SUSE bug 910669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923534">SUSE bug 923534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924515">SUSE bug 924515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1503-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00005.html" source="SUSE-SU"/>
    <description>
    The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131935" comment="libgcrypt20-hmac-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131936" comment="libgcrypt20-hmac-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0840" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1058-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00029.html" source="SUSE-SU"/>
    <description>
    The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840</cve>
	<bugzilla href="https://bugzilla.suse.com/926749">SUSE bug 926749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141153" comment="update-alternatives-1.18.4-14.216 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0973" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973</cve>
	<bugzilla href="https://bugzilla.suse.com/912929">SUSE bug 912929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1027</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1027" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1027" ref_url="https://www.suse.com/security/cve/CVE-2015-1027" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0472-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00030.html" source="SUSE-SU"/>
    <description>
    The version checking subroutine in percona-toolkit before 2.2.13 and xtrabackup before 2.2.9 was vulnerable to silent HTTP downgrade attacks and Man In The Middle attacks in which the server response could be modified to allow the attacker to respond with modified command payload and have the client return additional running configuration information leading to an information disclosure of running configuration of MySQL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1027/">CVE-2015-1027</cve>
	<bugzilla href="https://bugzilla.suse.com/919298">SUSE bug 919298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339425" comment="xtrabackup is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1038" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001551.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00000.html" source="SUSE-SU"/>
    <description>
    p7zip 9.20.1 allows remote attackers to write to arbitrary files via a symlink attack in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<bugzilla href="https://bugzilla.suse.com/912878">SUSE bug 912878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128891" comment="p7zip-9.20.1-6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1071" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1071" ref_url="https://www.suse.com/security/cve/CVE-2015-1071" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1071/">CVE-2015-1071</cve>
	<bugzilla href="https://bugzilla.suse.com/923223">SUSE bug 923223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1076" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1076" ref_url="https://www.suse.com/security/cve/CVE-2015-1076" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1076/">CVE-2015-1076</cve>
	<bugzilla href="https://bugzilla.suse.com/923223">SUSE bug 923223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1081" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1081" ref_url="https://www.suse.com/security/cve/CVE-2015-1081" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1081/">CVE-2015-1081</cve>
	<bugzilla href="https://bugzilla.suse.com/923223">SUSE bug 923223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1083" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1083" ref_url="https://www.suse.com/security/cve/CVE-2015-1083" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1083/">CVE-2015-1083</cve>
	<bugzilla href="https://bugzilla.suse.com/923223">SUSE bug 923223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1120" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1120" ref_url="https://www.suse.com/security/cve/CVE-2015-1120" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1120/">CVE-2015-1120</cve>
	<bugzilla href="https://bugzilla.suse.com/928380">SUSE bug 928380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1122" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1122" ref_url="https://www.suse.com/security/cve/CVE-2015-1122" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0761-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-1122/">CVE-2015-1122</cve>
	<bugzilla href="https://bugzilla.suse.com/1082221">SUSE bug 1082221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928380">SUSE bug 928380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1127" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1127" ref_url="https://www.suse.com/security/cve/CVE-2015-1127" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-1127/">CVE-2015-1127</cve>
	<bugzilla href="https://bugzilla.suse.com/928380">SUSE bug 928380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151142857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1142857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1142857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1142857" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1142857" ref_url="https://www.suse.com/security/cve/CVE-2015-1142857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0703-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00050.html" source="SUSE-SU"/>
    <description>
    On multiple SR-IOV cars it is possible for VF's assigned to guests to send ethernet flow control pause frames via the PF. This includes Linux kernel ixgbe driver before commit f079fa005aae08ee0e1bc32699874ff4f02e11c1, the Linux Kernel i40e/i40evf driver before e7358f54a3954df16d4f87e3cad35063f1c17de5 and the DPDK before commit 3f12b9f23b6499ff66ec8b0de941fb469297e5d0, additionally Multiple vendor NIC firmware is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-1142857/">CVE-2015-1142857</cve>
	<bugzilla href="https://bugzilla.suse.com/1077355">SUSE bug 1077355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519012" comment="kernel-firmware-20170530-21.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519013" comment="ucode-amd-20170530-21.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1153" ref_url="https://www.suse.com/security/cve/CVE-2015-1153" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1153/">CVE-2015-1153</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1155" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1155" ref_url="https://www.suse.com/security/cve/CVE-2015-1155" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0761-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1155/">CVE-2015-1155</cve>
	<bugzilla href="https://bugzilla.suse.com/1082221">SUSE bug 1082221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html" source="SUSE-SU"/>
    <description>
    The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976653">SUSE bug 976653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1044-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter to help/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<bugzilla href="https://bugzilla.suse.com/924208">SUSE bug 924208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976653">SUSE bug 976653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140510" comment="cups-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140511" comment="cups-client-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140512" comment="cups-libs-1.7.5-12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140513" comment="cups-libs-32bit-1.7.5-12.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1191" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1191" ref_url="https://www.suse.com/security/cve/CVE-2015-1191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0650-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0662-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00017.html" source="SUSE-SU"/>
    <description>
    Multiple directory traversal vulnerabilities in pigz 2.3.1 allow remote attackers to write to arbitrary files via a (1) full pathname or (2) .. (dot dot) in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1191/">CVE-2015-1191</cve>
	<bugzilla href="https://bugzilla.suse.com/913627">SUSE bug 913627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009108432" comment="pigz-2.3-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html" source="SUSE-SU"/>
    <description>
    GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<bugzilla href="https://bugzilla.suse.com/913678">SUSE bug 913678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915329">SUSE bug 915329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1441-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<bugzilla href="https://bugzilla.suse.com/1034050">SUSE bug 1034050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<bugzilla href="https://bugzilla.suse.com/918330">SUSE bug 918330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1350" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1350" ref_url="https://www.suse.com/security/cve/CVE-2015-1350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
    <description>
    The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1350/">CVE-2015-1350</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/914939">SUSE bug 914939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1395" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1395" ref_url="https://www.suse.com/security/cve/CVE-2015-1395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001427.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1395/">CVE-2015-1395</cve>
	<bugzilla href="https://bugzilla.suse.com/915328">SUSE bug 915328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1396" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1396" ref_url="https://www.suse.com/security/cve/CVE-2015-1396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001427.html" source="SUSE-SU"/>
    <description>
    A Directory Traversal vulnerability exists in the GNU patch before 2.7.4. A remote attacker can write to arbitrary files via a symlink attack in a patch file. NOTE: this issue exists because of an incomplete fix for CVE-2015-1196.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1396/">CVE-2015-1396</cve>
	<bugzilla href="https://bugzilla.suse.com/915329">SUSE bug 915329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110205" comment="patch-2.7.5-7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1419" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0428-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00012.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in vsftpd 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419</cve>
	<bugzilla href="https://bugzilla.suse.com/900326">SUSE bug 900326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915522">SUSE bug 915522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922024">SUSE bug 922024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141156" comment="vsftpd-3.0.2-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1461" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted (1) Yoda's crypter or (2) mew packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916217">SUSE bug 916217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1462" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a "heap out of bounds condition."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916214">SUSE bug 916214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1463" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-02/msg00014.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an "incorrect compiler optimization."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916215">SUSE bug 916215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0351-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html" source="SUSE-SU"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473" source="SUSE CVE"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1325-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" source="SUSE-SU"/>
    <description>
    The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140870" comment="libldap-2_4-2-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140871" comment="libldap-2_4-2-32bit-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140872" comment="openldap2-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140873" comment="openldap2-back-meta-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140874" comment="openldap2-client-2.4.41-18.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1325-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00069.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140870" comment="libldap-2_4-2-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140871" comment="libldap-2_4-2-32bit-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140872" comment="openldap2-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140873" comment="openldap2-back-meta-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140874" comment="openldap2-client-2.4.41-18.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:0450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1213-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<bugzilla href="https://bugzilla.suse.com/914890">SUSE bug 914890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916925">SUSE bug 916925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00050.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009113256" comment="e2fsprogs-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113260" comment="libcom_err2-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113261" comment="libcom_err2-32bit-1.42.11-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113264" comment="libext2fs2-1.42.11-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html" source="SUSE-SU"/>
    <description>
    The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593</cve>
	<bugzilla href="https://bugzilla.suse.com/1044934">SUSE bug 1044934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1606" ref_url="https://www.suse.com/security/cve/CVE-2015-1606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2241-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00045.html" source="SUSE-SU"/>
    <description>
    The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1606/">CVE-2015-1606</cve>
	<bugzilla href="https://bugzilla.suse.com/918089">SUSE bug 918089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1607" ref_url="https://www.suse.com/security/cve/CVE-2015-1607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2171-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2241-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00045.html" source="SUSE-SU"/>
    <description>
    kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1607/">CVE-2015-1607</cve>
	<bugzilla href="https://bugzilla.suse.com/918090">SUSE bug 918090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119616" comment="gpg2-2.0.24-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119617" comment="gpg2-lang-2.0.24-3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962632">SUSE bug 962632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0955-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00084.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00057.html" source="SUSE-SU"/>
    <description>
    The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140952" comment="libssh2-1-1.4.3-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140953" comment="libssh2-1-32bit-1.4.3-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989464">SUSE bug 989464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
    <description>
    The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0775-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927497">SUSE bug 927497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957163">SUSE bug 957163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0775-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927497">SUSE bug 927497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936327">SUSE bug 936327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943565">SUSE bug 943565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957163">SUSE bug 957163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962624">SUSE bug 962624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html" source="SUSE-SU"/>
    <description>
    The bdfReadProperties function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 allows remote authenticated users to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a (1) negative or (2) large property count in a BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html" source="SUSE-SU"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly handle character bitmaps it cannot read, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0702-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2300-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00074.html" source="SUSE-SU"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly perform type conversion for metrics values, which allows remote authenticated users to cause a denial of service (out-of-bounds memory access) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<bugzilla href="https://bugzilla.suse.com/921978">SUSE bug 921978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140752" comment="libXfont1-1.5.1-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
    <description>
    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939270">SUSE bug 939270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964732">SUSE bug 964732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1855" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1855" ref_url="https://www.suse.com/security/cve/CVE-2015-1855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1855/">CVE-2015-1855</cve>
	<bugzilla href="https://bugzilla.suse.com/926974">SUSE bug 926974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550168" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550169" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550170" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1858" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1858" ref_url="https://www.suse.com/security/cve/CVE-2015-1858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1858/">CVE-2015-1858</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1859" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1859" ref_url="https://www.suse.com/security/cve/CVE-2015-1859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1859/">CVE-2015-1859</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1860" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1860" ref_url="https://www.suse.com/security/cve/CVE-2015-1860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001540.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1860/">CVE-2015-1860</cve>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927806">SUSE bug 927806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927807">SUSE bug 927807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927808">SUSE bug 927808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140721" comment="libQt5Concurrent5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140722" comment="libQt5Core5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140723" comment="libQt5DBus5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140724" comment="libQt5Gui5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140725" comment="libQt5Network5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140726" comment="libQt5OpenGL5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140727" comment="libQt5PrintSupport5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140728" comment="libQt5Sql5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140729" comment="libQt5Sql5-mysql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140730" comment="libQt5Sql5-postgresql-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140731" comment="libQt5Sql5-sqlite-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140732" comment="libQt5Sql5-unixODBC-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140733" comment="libQt5Test5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140734" comment="libQt5Widgets5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140735" comment="libQt5Xml5-5.6.1-11.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125268" comment="libqt4-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125269" comment="libqt4-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125270" comment="libqt4-qt3support-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125271" comment="libqt4-qt3support-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125272" comment="libqt4-sql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125273" comment="libqt4-sql-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125274" comment="libqt4-sql-mysql-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125279" comment="libqt4-sql-sqlite-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125283" comment="libqt4-x11-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125284" comment="libqt4-x11-32bit-4.8.6-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125290" comment="qt4-x11-tools-4.8.6-7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927558">SUSE bug 927558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1914" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1914" ref_url="https://www.suse.com/security/cve/CVE-2015-1914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
    <description>
    IBM Java 7 R1 before SR3, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to bypass "permission checks" and obtain sensitive information via vectors related to the Java Virtual Machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1914/">CVE-2015-1914</cve>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1931" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939382">SUSE bug 939382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1261-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00041.html" source="SUSE-SU"/>
    <description>
    The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919214">SUSE bug 919214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937096">SUSE bug 937096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937097">SUSE bug 937097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131905" comment="libidn-tools-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2155" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0616-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<bugzilla href="https://bugzilla.suse.com/922220">SUSE bug 922220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922221">SUSE bug 922221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922222">SUSE bug 922222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922223">SUSE bug 922223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2170" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    The upx decoder in ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<bugzilla href="https://bugzilla.suse.com/920696">SUSE bug 920696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<bugzilla href="https://bugzilla.suse.com/920697">SUSE bug 920697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0489-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<bugzilla href="https://bugzilla.suse.com/920699">SUSE bug 920699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2221" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted y0da cryptor file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2222" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted petite packed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2265" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1244-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html" source="SUSE-SU"/>
    <description>
    The remove_bad_chars function in utils/cups-browsed.c in cups-filters before 1.0.66 allows remote IPP printers to execute arbitrary commands via consecutive shell metacharacters in the (1) model or (2) PDL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2296" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926396">SUSE bug 926396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141086" comment="python-requests-2.8.1-6.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561562" comment="python-pip-10.0.1-11.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561558" comment="python-ply-3.4-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525269" comment="python3-certifi-2018.4.16-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525270" comment="python3-chardet-3.0.4-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525271" comment="python3-urllib3-1.22-3.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2304" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0568-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<bugzilla href="https://bugzilla.suse.com/920870">SUSE bug 920870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549199" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922022">SUSE bug 922022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922028">SUSE bug 922028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922030">SUSE bug 922030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922043">SUSE bug 922043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922567">SUSE bug 922567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0858-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924961">SUSE bug 924961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2327" ref_url="https://www.suse.com/security/cve/CVE-2015-2327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.36 mishandles the /(((a\2)|(a*)\g&lt;-1&gt;))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2327/">CVE-2015-2327</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957567">SUSE bug 957567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2328" ref_url="https://www.suse.com/security/cve/CVE-2015-2328" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2328/">CVE-2015-2328</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957600">SUSE bug 957600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2330" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2330" ref_url="https://www.suse.com/security/cve/CVE-2015-2330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001336.html" source="SUSE-SU"/>
    <description>
    Late TLS certificate verification in WebKitGTK+ prior to 2.6.6 allows remote attackers to view a secure HTTP request, including, for example, secure cookies.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2330/">CVE-2015-2330</cve>
	<bugzilla href="https://bugzilla.suse.com/922895">SUSE bug 922895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001329.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0615-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-03/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<bugzilla href="https://bugzilla.suse.com/922894">SUSE bug 922894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923240">SUSE bug 923240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141037" comment="libzip2-0.11.1-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2568" ref_url="https://www.suse.com/security/cve/CVE-2015-2568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2568/">CVE-2015-2568</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2571" ref_url="https://www.suse.com/security/cve/CVE-2015-2571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2571/">CVE-2015-2571</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2573" ref_url="https://www.suse.com/security/cve/CVE-2015-2573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2573/">CVE-2015-2573</cve>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936409">SUSE bug 936409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2597" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Install.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951727">SUSE bug 951727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2619" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2627" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to installation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2637" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2638" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2659" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659" source="SUSE CVE"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u45 and Java SE Embedded 8u33 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2664" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2666</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2666" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2666" ref_url="https://www.suse.com/security/cve/CVE-2015-2666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2666/">CVE-2015-2666</cve>
	<bugzilla href="https://bugzilla.suse.com/922944">SUSE bug 922944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2668" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0906-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00024.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<bugzilla href="https://bugzilla.suse.com/1040662">SUSE bug 1040662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921950">SUSE bug 921950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922560">SUSE bug 922560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929192">SUSE bug 929192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140489" comment="clamav-0.99.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
    <description>
    The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<bugzilla href="https://bugzilla.suse.com/928978">SUSE bug 928978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1898-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html" source="SUSE-SU"/>
    <description>
    lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969771">SUSE bug 969771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html" source="SUSE-SU"/>
    <description>
    lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952189">SUSE bug 952189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html" source="SUSE-SU"/>
    <description>
    The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2055-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00124.html" source="SUSE-SU"/>
    <description>
    The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspecified other impact by interacting with an application that calls the gss_export_sec_context function.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-2696.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0934-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0935-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<bugzilla href="https://bugzilla.suse.com/930622">SUSE bug 930622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    nsZipArchive.cpp in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
    <description>
    PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2775" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2775" ref_url="https://www.suse.com/security/cve/CVE-2015-2775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-2775/">CVE-2015-2775</cve>
	<bugzilla href="https://bugzilla.suse.com/925502">SUSE bug 925502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530378" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546036" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594734" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0854-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00010.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="TID7017143" ref_url="https://www.suse.com/support/kb/doc/?id=7017143" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<bugzilla href="https://bugzilla.suse.com/925378">SUSE bug 925378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2924" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924" source="SUSE CVE"/>
    <description>
    The receive_ra function in rdisc/nm-lndp-rdisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in NetworkManager 1.x allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message, a similar issue to CVE-2015-2922.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<bugzilla href="https://bugzilla.suse.com/926223">SUSE bug 926223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140431" comment="libnm-glib-vpn1-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140432" comment="libnm-glib4-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140433" comment="libnm-util2-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140434" comment="libnm0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140435" comment="typelib-1_0-NMClient-1_0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140436" comment="typelib-1_0-NetworkManager-1_0-1.0.12-8.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3138" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    print-wb.c in tcpdump before 4.7.4 allows remote attackers to cause a denial of service (segmentation fault and process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138</cve>
	<bugzilla href="https://bugzilla.suse.com/927637">SUSE bug 927637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<bugzilla href="https://bugzilla.suse.com/927608">SUSE bug 927608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<bugzilla href="https://bugzilla.suse.com/927607">SUSE bug 927607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0799-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-04/msg00057.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<bugzilla href="https://bugzilla.suse.com/1092962">SUSE bug 1092962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927746">SUSE bug 927746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<bugzilla href="https://bugzilla.suse.com/1037590">SUSE bug 1037590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047059">SUSE bug 1047059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928962">SUSE bug 928962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936407">SUSE bug 936407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0861-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<bugzilla href="https://bugzilla.suse.com/928533">SUSE bug 928533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00044.html" source="SUSE-SU"/>
    <description>
    The authentication setup in XWayland 1.16.x and 1.17.x before 1.17.2 starts the server in non-authenticating mode, which allows local users to read from or send information to arbitrary X11 clients via vectors involving a UNIX socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<bugzilla href="https://bugzilla.suse.com/1177201">SUSE bug 1177201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934102">SUSE bug 934102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3165" ref_url="https://www.suse.com/security/cve/CVE-2015-3165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3165/">CVE-2015-3165</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3166" ref_url="https://www.suse.com/security/cve/CVE-2015-3166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3166/">CVE-2015-3166</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3167" ref_url="https://www.suse.com/security/cve/CVE-2015-3167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001499.html" source="SUSE-SU"/>
    <description>
    contrib/pgcrypto in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 uses different error responses when an incorrect key is used, which makes it easier for attackers to obtain the key via a brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3167/">CVE-2015-3167</cve>
	<bugzilla href="https://bugzilla.suse.com/931972">SUSE bug 931972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931973">SUSE bug 931973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931974">SUSE bug 931974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932040">SUSE bug 932040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7017046" ref_url="https://www.suse.com/support/kb/doc/?id=7017046" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1327-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
    <description>
    crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7017047" ref_url="https://www.suse.com/support/kb/doc/?id=7017047" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1327-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00073.html" source="SUSE-SU"/>
    <description>
    The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963977">SUSE bug 963977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2288-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html" source="SUSE-SU"/>
    <description>
    ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<bugzilla href="https://bugzilla.suse.com/957813">SUSE bug 957813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0362-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0442-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
    <description>
    ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<bugzilla href="https://bugzilla.suse.com/963410">SUSE bug 963410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0997-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1003-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00007.html" source="SUSE-SU"/>
    <description>
    fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009110488" comment="fuse-2.9.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110491" comment="libfuse2-2.9.3-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932823">SUSE bug 932823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3210" ref_url="https://www.suse.com/security/cve/CVE-2015-3210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P&lt;B&gt;c)(?P&lt;B&gt;a(?P=B)))&gt;WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3210/">CVE-2015-3210</cve>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3216" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3216" ref_url="https://www.suse.com/security/cve/CVE-2015-3216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
    <description>
    Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3216/">CVE-2015-3216</cve>
	<bugzilla href="https://bugzilla.suse.com/933898">SUSE bug 933898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3218" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<bugzilla href="https://bugzilla.suse.com/933922">SUSE bug 933922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
    <description>
    The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140715" comment="libldb1-1.1.26-10.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140716" comment="libldb1-32bit-1.1.26-10.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3225</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3225" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3225" ref_url="https://www.suse.com/security/cve/CVE-2015-3225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1259-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1262-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1263-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html" source="SUSE-SU"/>
    <description>
    lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3225/">CVE-2015-3225</cve>
	<bugzilla href="https://bugzilla.suse.com/934797">SUSE bug 934797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334695" comment="rubygem-rack is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3226</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3226" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3226" ref_url="https://www.suse.com/security/cve/CVE-2015-3226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001792.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3226/">CVE-2015-3226</cve>
	<bugzilla href="https://bugzilla.suse.com/934799">SUSE bug 934799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685553" comment="rubygem-actionpack-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685555" comment="rubygem-actionview-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685556" comment="rubygem-activejob-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685557" comment="rubygem-activemodel-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348062" comment="rubygem-activerecord-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685558" comment="rubygem-activesupport-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334405" comment="rubygem-rails-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685554" comment="rubygem-railties-4_2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3227</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3227" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3227" ref_url="https://www.suse.com/security/cve/CVE-2015-3227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001792.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1279-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00050.html" source="SUSE-SU"/>
    <description>
    The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3227/">CVE-2015-3227</cve>
	<bugzilla href="https://bugzilla.suse.com/934800">SUSE bug 934800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685553" comment="rubygem-actionpack-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685555" comment="rubygem-actionview-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685556" comment="rubygem-activejob-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685557" comment="rubygem-activemodel-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348062" comment="rubygem-activerecord-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685558" comment="rubygem-activesupport-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334405" comment="rubygem-rails-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685554" comment="rubygem-railties-4_2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3228" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1352-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0951-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00010.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<bugzilla href="https://bugzilla.suse.com/939342">SUSE bug 939342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009125321" comment="ghostscript-9.15-6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125322" comment="ghostscript-x11-9.15-6.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
    <description>
    The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<bugzilla href="https://bugzilla.suse.com/1123794">SUSE bug 1123794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550291" comment="pam-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548138" comment="pam-32bit-1.1.8-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517451" comment="pam-doc-1.1.8-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1566-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1750-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<bugzilla href="https://bugzilla.suse.com/944460">SUSE bug 944460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3255" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<bugzilla href="https://bugzilla.suse.com/939246">SUSE bug 939246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3256" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html" source="SUSE-SU"/>
    <description>
    PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1244-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the WriteProlog function in filter/texttopdf.c in texttopdf in cups-filters before 1.0.70 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a small line size in a print job.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1244-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00033.html" source="SUSE-SU"/>
    <description>
    Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<bugzilla href="https://bugzilla.suse.com/921753">SUSE bug 921753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288</cve>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3290" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3290" ref_url="https://www.suse.com/security/cve/CVE-2015-3290" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00024.html" source="SUSE-SU"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3290/">CVE-2015-3290</cve>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939269">SUSE bug 939269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3291" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3291" ref_url="https://www.suse.com/security/cve/CVE-2015-3291" source="SUSE CVE"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3291/">CVE-2015-3291</cve>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3294" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0979-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00013.html" source="SUSE-SU"/>
    <description>
    The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<bugzilla href="https://bugzilla.suse.com/923144">SUSE bug 923144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928867">SUSE bug 928867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140541" comment="dnsmasq-2.71-10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334577" comment="dnsmasq is affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00147.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<bugzilla href="https://bugzilla.suse.com/927841">SUSE bug 927841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549985" comment="ppp-2.4.7-3.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3405" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3405" ref_url="https://www.suse.com/security/cve/CVE-2015-3405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.html" source="SUSE-SU"/>
    <description>
    ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3405/">CVE-2015-3405</cve>
	<bugzilla href="https://bugzilla.suse.com/924202">SUSE bug 924202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928321">SUSE bug 928321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414</cve>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&amp;O&gt;O) in a CREATE TABLE statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416" source="SUSE CVE"/>
    <description>
    The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333982" comment="sqlite3 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3418" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3418" ref_url="https://www.suse.com/security/cve/CVE-2015-3418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001456.html" source="SUSE-SU"/>
    <description>
    The ProcPutImage function in dix/dispatch.c in X.Org Server (aka xserver and xorg-server) before 1.16.4 allows attackers to cause a denial of service (divide-by-zero and crash) via a zero-height PutImage request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3418/">CVE-2015-3418</cve>
	<bugzilla href="https://bugzilla.suse.com/928520">SUSE bug 928520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141173" comment="xorg-x11-server-7.6_1.18.3-57.34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141174" comment="xorg-x11-server-extra-7.6_1.18.3-57.34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3448</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3448" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3448" ref_url="https://www.suse.com/security/cve/CVE-2015-3448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006330.html" source="SUSE-SU"/>
    <description>
    REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3448/">CVE-2015-3448</cve>
	<bugzilla href="https://bugzilla.suse.com/917802">SUSE bug 917802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596252" comment="crowbar-core-4.0+git.1574788924.e4a6aeb0c-9.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596253" comment="crowbar-core-branding-upstream-4.0+git.1574788924.e4a6aeb0c-9.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596254" comment="crowbar-openstack-4.0+git.1574869671.9c7bade2d-9.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596255" comment="grafana-monasca-ui-drilldown-1.5.5~dev3-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596256" comment="openstack-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596257" comment="openstack-monasca-api-1.7.1~dev18-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596258" comment="openstack-monasca-log-api-1.4.3~dev3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596259" comment="openstack-neutron-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596260" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596261" comment="openstack-neutron-doc-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596262" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596263" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596264" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596265" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596266" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596267" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596268" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596269" comment="openstack-neutron-server-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596270" comment="python-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596271" comment="python-monasca-api-1.7.1~dev18-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596272" comment="python-monasca-log-api-1.4.3~dev3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596273" comment="python-neutron-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596274" comment="ruby2.1-rubygem-puma-2.16.0-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3451" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001553.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1506-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00006.html" source="SUSE-SU"/>
    <description>
    The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<bugzilla href="https://bugzilla.suse.com/929237">SUSE bug 929237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009113959" comment="perl-XML-LibXML-2.0019-5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0889-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0889-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0943-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="TID7016497" ref_url="https://www.suse.com/support/kb/doc?id=7016497" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html" source="SUSE-SU"/>
    <description>
    The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935900">SUSE bug 935900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" source="SUSE-SU"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3644" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3644" ref_url="https://www.suse.com/security/cve/CVE-2015-3644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001439.html" source="SUSE-SU"/>
    <description>
    Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3644/">CVE-2015-3644</cve>
	<bugzilla href="https://bugzilla.suse.com/1177580">SUSE bug 1177580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931517">SUSE bug 931517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009110494" comment="stunnel-5.00-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3658" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3658" ref_url="https://www.suse.com/security/cve/CVE-2015-3658" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an Origin header, which makes it easier for remote attackers to bypass CSRF protection mechanisms via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3658/">CVE-2015-3658</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3659" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3659" ref_url="https://www.suse.com/security/cve/CVE-2015-3659" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL functions, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3659/">CVE-2015-3659</cve>
	<bugzilla href="https://bugzilla.suse.com/936835">SUSE bug 936835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936836">SUSE bug 936836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3727" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3727" ref_url="https://www.suse.com/security/cve/CVE-2015-3727" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access an arbitrary web site's database via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3727/">CVE-2015-3727</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3731" ref_url="https://www.suse.com/security/cve/CVE-2015-3731" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3731/">CVE-2015-3731</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3741" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3741" ref_url="https://www.suse.com/security/cve/CVE-2015-3741" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3741/">CVE-2015-3741</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3743" ref_url="https://www.suse.com/security/cve/CVE-2015-3743" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3743/">CVE-2015-3743</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3745" ref_url="https://www.suse.com/security/cve/CVE-2015-3745" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3745/">CVE-2015-3745</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3747" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3747" ref_url="https://www.suse.com/security/cve/CVE-2015-3747" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3747/">CVE-2015-3747</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3748" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3748" ref_url="https://www.suse.com/security/cve/CVE-2015-3748" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3748/">CVE-2015-3748</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3749" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3749" ref_url="https://www.suse.com/security/cve/CVE-2015-3749" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3749/">CVE-2015-3749</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3752" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3752" ref_url="https://www.suse.com/security/cve/CVE-2015-3752" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross-origin request or (2) a private-browsing request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3752/">CVE-2015-3752</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00039.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00039.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1676-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-05/msg00039.html" source="SUSE-SU"/>
    <description>
    The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<bugzilla href="https://bugzilla.suse.com/930689">SUSE bug 930689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930691">SUSE bug 930691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3900" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3900" ref_url="https://www.suse.com/security/cve/CVE-2015-3900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3900/">CVE-2015-3900</cve>
	<bugzilla href="https://bugzilla.suse.com/936032">SUSE bug 936032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550168" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550169" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550170" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3908</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3908" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3908" ref_url="https://www.suse.com/security/cve/CVE-2015-3908" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1452-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3908/">CVE-2015-3908</cve>
	<bugzilla href="https://bugzilla.suse.com/938161">SUSE bug 938161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938399">SUSE bug 938399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334676" comment="ansible is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004209.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016528" ref_url="https://www.suse.com/support/kb/doc/?id=7016528" source="SUSE-SU"/>
		<reference ref_id="TID7016529" ref_url="https://www.suse.com/support/kb/doc?id=7016529" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016657" ref_url="https://www.suse.com/support/kb/doc/?id=7016657" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="TID7016726" ref_url="https://www.suse.com/support/kb/doc/?id=7016726" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021978" ref_url="https://www.suse.com/support/kb/doc/?id=7021978" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022026" ref_url="https://www.suse.com/support/kb/doc/?id=7022026" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1684-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0478-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2267-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00034.html" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931600">SUSE bug 931600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931723">SUSE bug 931723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937202">SUSE bug 937202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938905">SUSE bug 938905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938913">SUSE bug 938913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943664">SUSE bug 943664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944729">SUSE bug 944729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955589">SUSE bug 955589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980406">SUSE bug 980406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131759" comment="libtcnative-1-0-1.1.32-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009122758" comment="socat-1.7.2.4-3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1059-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00030.html" source="SUSE-SU"/>
    <description>
    The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4042" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1059-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140496" comment="coreutils-8.25-12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140497" comment="coreutils-lang-8.25-12.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4047" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4047" ref_url="https://www.suse.com/security/cve/CVE-2015-4047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001531.html" source="SUSE-SU"/>
    <description>
    racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4047/">CVE-2015-4047</cve>
	<bugzilla href="https://bugzilla.suse.com/931989">SUSE bug 931989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140685" comment="ipsec-tools-0.8.0-15.16 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
    <description>
    QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1030-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4171" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001641.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1082-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-06/msg00040.html" source="SUSE-SU"/>
    <description>
    strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933591">SUSE bug 933591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4467" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4467" ref_url="https://www.suse.com/security/cve/CVE-2015-4467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    The chmd_init_decomp function in chmd.c in libmspack before 0.5 does not properly validate the reset interval, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4467/">CVE-2015-4467</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4468" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4468" ref_url="https://www.suse.com/security/cve/CVE-2015-4468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the search_chunk function in chmd.c in libmspack before 0.5 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4468/">CVE-2015-4468</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4469" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4469" ref_url="https://www.suse.com/security/cve/CVE-2015-4469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    The chmd_read_headers function in chmd.c in libmspack before 0.5 does not validate name lengths, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4469/">CVE-2015-4469</cve>
	<bugzilla href="https://bugzilla.suse.com/934524">SUSE bug 934524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934526">SUSE bug 934526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4470" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4470" ref_url="https://www.suse.com/security/cve/CVE-2015-4470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the inflate function in mszipd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4470/">CVE-2015-4470</cve>
	<bugzilla href="https://bugzilla.suse.com/934527">SUSE bug 934527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4471" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4471" ref_url="https://www.suse.com/security/cve/CVE-2015-4471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the lzxd_decompress function in lzxd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (buffer under-read and application crash) via a crafted CAB archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4471/">CVE-2015-4471</cve>
	<bugzilla href="https://bugzilla.suse.com/934528">SUSE bug 934528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4472" ref_url="https://www.suse.com/security/cve/CVE-2015-4472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001776.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the READ_ENCINT macro in chmd.c in libmspack before 0.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4472/">CVE-2015-4472</cve>
	<bugzilla href="https://bugzilla.suse.com/934525">SUSE bug 934525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934529">SUSE bug 934529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009118765" comment="libmspack0-0.4-14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4474" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1500-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00033.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942801">SUSE bug 942801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1453-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1454-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html" source="SUSE-SU"/>
    <description>
    The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<bugzilla href="https://bugzilla.suse.com/940806">SUSE bug 940806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940918">SUSE bug 940918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<bugzilla href="https://bugzilla.suse.com/943550">SUSE bug 943550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943557">SUSE bug 943557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html" source="SUSE-SU"/>
    <description>
    The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<bugzilla href="https://bugzilla.suse.com/943550">SUSE bug 943550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943558">SUSE bug 943558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943608">SUSE bug 943608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1250-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html" source="SUSE-SU"/>
    <description>
    name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<bugzilla href="https://bugzilla.suse.com/936476">SUSE bug 936476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4625" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1927-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<bugzilla href="https://bugzilla.suse.com/935119">SUSE bug 935119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140902" comment="libpolkit0-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140903" comment="polkit-0.113-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140904" comment="typelib-1_0-Polkit-1_0-0.113-5.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4680" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003008.html" source="SUSE-SU"/>
    <description>
    FreeRADIUS 2.2.x before 2.2.8 and 3.0.x before 3.0.9 does not properly check revocation of intermediate CA certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680</cve>
	<bugzilla href="https://bugzilla.suse.com/935573">SUSE bug 935573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550037" comment="freeradius-server-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550038" comment="freeradius-server-doc-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550039" comment="freeradius-server-krb5-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550040" comment="freeradius-server-ldap-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550041" comment="freeradius-server-libs-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550042" comment="freeradius-server-mysql-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550043" comment="freeradius-server-perl-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550044" comment="freeradius-server-postgresql-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550045" comment="freeradius-server-python-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550046" comment="freeradius-server-sqlite-3.0.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550047" comment="freeradius-server-utils-3.0.3-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4729" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4736" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<bugzilla href="https://bugzilla.suse.com/937828">SUSE bug 937828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4766</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4766" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4766" ref_url="https://www.suse.com/security/cve/CVE-2015-4766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows local users to affect availability via unknown vectors related to Server : Security : Firewall.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4766/">CVE-2015-4766</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4791</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4791" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4791" ref_url="https://www.suse.com/security/cve/CVE-2015-4791" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4791/">CVE-2015-4791</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4800</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4800" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4800" ref_url="https://www.suse.com/security/cve/CVE-2015-4800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4800/">CVE-2015-4800</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4807" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4810" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4816</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4819</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969667">SUSE bug 969667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4833</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4833" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4833" ref_url="https://www.suse.com/security/cve/CVE-2015-4833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4833/">CVE-2015-4833</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4862</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4862" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4862" ref_url="https://www.suse.com/security/cve/CVE-2015-4862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4862/">CVE-2015-4862</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4864</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4864" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4866</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4866" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4868" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and Java SE Embedded 8u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4879</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect availability via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4890</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4890" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4890" ref_url="https://www.suse.com/security/cve/CVE-2015-4890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4890/">CVE-2015-4890</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4895</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958790">SUSE bug 958790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4901" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4902" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to RMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4904</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4904" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4904" ref_url="https://www.suse.com/security/cve/CVE-2015-4904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to libmysqld.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4904/">CVE-2015-4904</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4905</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4905" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4905" ref_url="https://www.suse.com/security/cve/CVE-2015-4905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4905/">CVE-2015-4905</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4906" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors related to JavaFX, a different vulnerability than CVE-2015-4908 and CVE-2015-4916.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4908" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4916.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4910</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4910" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4910" ref_url="https://www.suse.com/security/cve/CVE-2015-4910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4910/">CVE-2015-4910</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1874-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1874-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1875-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958789">SUSE bug 958789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4916" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4908.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916</cve>
	<bugzilla href="https://bugzilla.suse.com/951376">SUSE bug 951376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5006" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html" source="SUSE-SU"/>
    <description>
    IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR2, 7 R1 before SR3 FP20, 7 before SR9 FP20, 6 R1 before SR8 FP15, and 6 before SR16 FP15 allow physically proximate attackers to obtain sensitive information by reading the Kerberos Credential Cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<bugzilla href="https://bugzilla.suse.com/955131">SUSE bug 955131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
    <description>
    The J9 JVM in IBM SDK, Java Technology Edition 6 before SR16 FP20, 6 R1 before SR8 FP20, 7 before SR9 FP30, and 7 R1 before SR3 FP30 allows remote attackers to obtain sensitive information or inject data by invoking non-public interface methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5073" ref_url="https://www.suse.com/security/cve/CVE-2015-5073" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5073/">CVE-2015-5073</cve>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5130" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5130" ref_url="https://www.suse.com/security/cve/CVE-2015-5130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00018.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5130/">CVE-2015-5130</cve>
	<bugzilla href="https://bugzilla.suse.com/941239">SUSE bug 941239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952254">SUSE bug 952254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1409-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5156" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156</cve>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123903">SUSE bug 1123903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945048">SUSE bug 945048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5157" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157</cve>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174</cve>
	<bugzilla href="https://bugzilla.suse.com/967967">SUSE bug 967967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5185" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5185" ref_url="https://www.suse.com/security/cve/CVE-2015-5185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1571-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00019.html" source="SUSE-SU"/>
    <description>
    The lookupProviders function in providerMgr.c in sblim-sfcb 1.3.4 and 1.3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty className in a packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5185/">CVE-2015-5185</cve>
	<bugzilla href="https://bugzilla.suse.com/942628">SUSE bug 942628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141124" comment="sblim-sfcb-1.4.8-8.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5191" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0509-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0827-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00092.html" source="SUSE-SU"/>
    <description>
    VMware Tools prior to 10.0.9 contains multiple file system races in libDeployPkg, related to the use of hard-coded paths under /tmp. Successful exploitation of this issue may result in a local privilege escalation. CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<bugzilla href="https://bugzilla.suse.com/1007600">SUSE bug 1007600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518489" comment="libvmtools0-10.1.0-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518490" comment="open-vm-tools-10.1.0-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518491" comment="open-vm-tools-desktop-10.1.0-8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5198" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html" source="SUSE-SU"/>
    <description>
    libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to gain privileges via unspecified vectors, related to the VDPAU_DRIVER_PATH environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<bugzilla href="https://bugzilla.suse.com/943967">SUSE bug 943967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5199" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in dlopen in libvdpau before 1.1.1 allows local users to gain privileges via the VDPAU_DRIVER environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<bugzilla href="https://bugzilla.suse.com/943968">SUSE bug 943968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5200" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00012.html" source="SUSE-SU"/>
    <description>
    The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<bugzilla href="https://bugzilla.suse.com/943969">SUSE bug 943969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140976" comment="libvdpau1-1.1.1-6.73 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5203" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941919">SUSE bug 941919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008640.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1910-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<bugzilla href="https://bugzilla.suse.com/949754">SUSE bug 949754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140779" comment="libblkid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140780" comment="libblkid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140781" comment="libfdisk1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140782" comment="libmount1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140783" comment="libmount1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140784" comment="libsmartcols1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140785" comment="libuuid1-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140786" comment="libuuid1-32bit-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140787" comment="python-libmount-2.28-40.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140788" comment="util-linux-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140789" comment="util-linux-lang-2.28-40.28 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140790" comment="util-linux-systemd-2.28-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140791" comment="uuidd-2.28-40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5219" ref_url="https://www.suse.com/security/cve/CVE-2015-5219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5219/">CVE-2015-5219</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5221" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942553">SUSE bug 942553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225" source="SUSE CVE"/>
    <description>
    Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<bugzilla href="https://bugzilla.suse.com/942845">SUSE bug 942845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5244" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5244" ref_url="https://www.suse.com/security/cve/CVE-2015-5244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002292.html" source="SUSE-SU"/>
    <description>
    The NSSCipherSuite option with ciphersuites enabled in mod_nss before 1.0.12 allows remote attackers to bypass application restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5244/">CVE-2015-5244</cve>
	<bugzilla href="https://bugzilla.suse.com/945905">SUSE bug 945905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131934" comment="apache2-mod_nss-1.0.14-18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247" source="SUSE CVE"/>
    <description>
    The virStorageVolCreateXML API in libvirt 1.2.14 through 1.2.19 allows remote authenticated users with a read-write connection to cause a denial of service (libvirtd crash) by triggering a failed unlink after creating a volume on a root_squash NFS pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<bugzilla href="https://bugzilla.suse.com/945645">SUSE bug 945645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<bugzilla href="https://bugzilla.suse.com/958582">SUSE bug 958582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1750-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<bugzilla href="https://bugzilla.suse.com/944787">SUSE bug 944787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1750-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<bugzilla href="https://bugzilla.suse.com/948976">SUSE bug 948976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007692.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00033.html" source="SUSE-SU"/>
    <description>
    http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClient before 4.3.6 ignores the http.socket.timeout configuration setting during an SSL handshake, which allows remote attackers to cause a denial of service (HTTPS call hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262</cve>
	<bugzilla href="https://bugzilla.suse.com/1120767">SUSE bug 1120767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531477" comment="apache-commons-httpclient-3.1-6.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5276" ref_url="https://www.suse.com/security/cve/CVE-2015-5276" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1946-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1069-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html" source="SUSE-SU"/>
    <description>
    The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5276/">CVE-2015-5276</cve>
	<bugzilla href="https://bugzilla.suse.com/945842">SUSE bug 945842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140498" comment="cpp48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140499" comment="gcc48-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140500" comment="gcc48-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140501" comment="gcc48-c++-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140502" comment="gcc48-info-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140503" comment="gcc48-locale-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140504" comment="libasan0-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140505" comment="libasan0-32bit-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125716" comment="libasan2-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125717" comment="libasan2-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125723" comment="libffi4-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125724" comment="libffi4-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125734" comment="libmpx0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125735" comment="libmpx0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125736" comment="libmpxwrappers0-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009125737" comment="libmpxwrappers0-32bit-5.3.1+r233831-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140506" comment="libstdc++48-devel-4.8.5-30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140507" comment="libstdc++48-devel-32bit-4.8.5-30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<bugzilla href="https://bugzilla.suse.com/945987">SUSE bug 945987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5288" ref_url="https://www.suse.com/security/cve/CVE-2015-5288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1907-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1919-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html" source="SUSE-SU"/>
    <description>
    The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5288/">CVE-2015-5288</cve>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5289" ref_url="https://www.suse.com/security/cve/CVE-2015-5289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1907-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5289/">CVE-2015-5289</cve>
	<bugzilla href="https://bugzilla.suse.com/949669">SUSE bug 949669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949670">SUSE bug 949670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958584">SUSE bug 958584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<bugzilla href="https://bugzilla.suse.com/958583">SUSE bug 958583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<bugzilla href="https://bugzilla.suse.com/951629">SUSE bug 951629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962624">SUSE bug 962624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5310" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
    <description>
    The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<bugzilla href="https://bugzilla.suse.com/952254">SUSE bug 952254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953115">SUSE bug 953115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0216-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00082.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the virStorageBackendFileSystemVolCreate function in storage/storage_backend_fs.c in libvirt, when fine-grained Access Control Lists (ACL) are in effect, allows local users with storage_vol:create ACL but not domain:write permission to write to arbitrary files via a .. (dot dot) in a volume name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140977" comment="libvirt-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140978" comment="libvirt-client-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140979" comment="libvirt-daemon-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140980" comment="libvirt-daemon-config-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140981" comment="libvirt-daemon-config-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140982" comment="libvirt-daemon-driver-interface-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140983" comment="libvirt-daemon-driver-libxl-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140984" comment="libvirt-daemon-driver-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140985" comment="libvirt-daemon-driver-network-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140986" comment="libvirt-daemon-driver-nodedev-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140987" comment="libvirt-daemon-driver-nwfilter-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140988" comment="libvirt-daemon-driver-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140989" comment="libvirt-daemon-driver-secret-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140990" comment="libvirt-daemon-driver-storage-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140991" comment="libvirt-daemon-lxc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140992" comment="libvirt-daemon-qemu-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140993" comment="libvirt-daemon-xen-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140994" comment="libvirt-doc-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140995" comment="libvirt-lock-sanlock-2.0.0-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140996" comment="libvirt-nss-2.0.0-26.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<bugzilla href="https://bugzilla.suse.com/958581">SUSE bug 958581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958586">SUSE bug 958586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140715" comment="libldb1-1.1.26-10.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140716" comment="libldb1-32bit-1.1.26-10.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html" source="SUSE-SU"/>
    <description>
    The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345</cve>
	<bugzilla href="https://bugzilla.suse.com/967965">SUSE bug 967965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html" source="SUSE-SU"/>
    <description>
    Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346</cve>
	<bugzilla href="https://bugzilla.suse.com/967814">SUSE bug 967814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html" source="SUSE-SU"/>
    <description>
    The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351</cve>
	<bugzilla href="https://bugzilla.suse.com/967812">SUSE bug 967812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5352" ref_url="https://www.suse.com/security/cve/CVE-2015-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5352/">CVE-2015-5352</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936695">SUSE bug 936695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938277">SUSE bug 938277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<bugzilla href="https://bugzilla.suse.com/936862">SUSE bug 936862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5380</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5380" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5380" ref_url="https://www.suse.com/security/cve/CVE-2015-5380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
    <description>
    The Utf8DecoderBase::WriteUtf16Slow function in unicode-decoder.cc in Google V8, as used in Node.js before 0.12.6, io.js before 1.8.3 and 2.x before 2.3.3, and other products, does not verify that there is memory available for a UTF-16 surrogate pair, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted byte sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5380/">CVE-2015-5380</cve>
	<bugzilla href="https://bugzilla.suse.com/937414">SUSE bug 937414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937416">SUSE bug 937416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5400" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400</cve>
	<bugzilla href="https://bugzilla.suse.com/938715">SUSE bug 938715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967073">SUSE bug 967073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="TID7016709" ref_url="https://www.suse.com/support/kb/doc?id=7016709" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-07/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00001.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939567">SUSE bug 939567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980168">SUSE bug 980168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5600" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5600" ref_url="https://www.suse.com/security/cve/CVE-2015-5600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5600/">CVE-2015-5600</cve>
	<bugzilla href="https://bugzilla.suse.com/1009988">SUSE bug 1009988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938746">SUSE bug 938746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943504">SUSE bug 943504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945985">SUSE bug 945985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954457">SUSE bug 954457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957883">SUSE bug 957883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5621" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001593.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html" source="SUSE-SU"/>
    <description>
    The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<bugzilla href="https://bugzilla.suse.com/1111123">SUSE bug 1111123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940188">SUSE bug 940188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969779">SUSE bug 969779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140934" comment="libsnmp30-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140935" comment="libsnmp30-32bit-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140936" comment="net-snmp-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140937" comment="perl-SNMP-5.7.3-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140938" comment="snmp-mibs-5.7.3-4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5694</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5694" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5694" ref_url="https://www.suse.com/security/cve/CVE-2015-5694" source="SUSE CVE"/>
    <description>
    Designate does not enforce the DNS protocol limit concerning record set sizes
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5694/">CVE-2015-5694</cve>
	<bugzilla href="https://bugzilla.suse.com/1158204">SUSE bug 1158204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339348" comment="openstack-designate is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1480-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1481-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00002.html" source="SUSE-SU"/>
    <description>
    buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944107">SUSE bug 944107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954983">SUSE bug 954983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5788" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5788" ref_url="https://www.suse.com/security/cve/CVE-2015-5788" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5788/">CVE-2015-5788</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5794" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5794" ref_url="https://www.suse.com/security/cve/CVE-2015-5794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5794/">CVE-2015-5794</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5801" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5801" ref_url="https://www.suse.com/security/cve/CVE-2015-5801" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5801/">CVE-2015-5801</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5809" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5809" ref_url="https://www.suse.com/security/cve/CVE-2015-5809" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5809/">CVE-2015-5809</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5822" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5822" ref_url="https://www.suse.com/security/cve/CVE-2015-5822" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5822/">CVE-2015-5822</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5928" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5928" ref_url="https://www.suse.com/security/cve/CVE-2015-5928" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0915-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html" source="SUSE-SU"/>
    <description>
    WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5928/">CVE-2015-5928</cve>
	<bugzilla href="https://bugzilla.suse.com/971460">SUSE bug 971460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140862" comment="libjavascriptcoregtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140863" comment="libwebkitgtk-3_0-0-2.4.11-23.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140864" comment="libwebkitgtk3-lang-2.4.11-23.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5969" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001838.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0368-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00050.html" source="SUSE-SU"/>
    <description>
    The mysql-systemd-helper script in the mysql-community-server package before 5.6.28-2.17.1 in openSUSE 13.2 and before 5.6.28-13.1 in openSUSE Leap 42.1 and the mariadb package before 10.0.22-2.21.2 in openSUSE 13.2 and before 10.0.22-3.1 in SUSE Linux Enterprise (SLE) 12.1 and openSUSE Leap 42.1 allows local users to discover database credentials by listing a process and its arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<bugzilla href="https://bugzilla.suse.com/957174">SUSE bug 957174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6240</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6240" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6240" ref_url="https://www.suse.com/security/cve/CVE-2015-6240" source="SUSE CVE"/>
    <description>
    The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6240/">CVE-2015-6240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334676" comment="ansible is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001582.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1499-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-09/msg00001.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<bugzilla href="https://bugzilla.suse.com/941794">SUSE bug 941794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009114253" comment="gnutls-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114257" comment="libgnutls-openssl27-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114258" comment="libgnutls28-3.2.15-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009114259" comment="libgnutls28-32bit-3.2.15-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6496</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6496" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6496" ref_url="https://www.suse.com/security/cve/CVE-2015-6496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00015.html" source="SUSE-SU"/>
    <description>
    conntrackd in conntrack-tools 1.4.2 and earlier does not ensure that the optional kernel modules are loaded before using them, which allows remote attackers to cause a denial of service (crash) via a (1) DCCP, (2) SCTP, or (3) ICMPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6496/">CVE-2015-6496</cve>
	<bugzilla href="https://bugzilla.suse.com/942149">SUSE bug 942149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685234" comment="conntrack-tools is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6525" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6525" ref_url="https://www.suse.com/security/cve/CVE-2015-6525" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different affected versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6525/">CVE-2015-6525</cve>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943011">SUSE bug 943011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338885" comment="libevent is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6563" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6563" ref_url="https://www.suse.com/security/cve/CVE-2015-6563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6563/">CVE-2015-6563</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6564" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6564" ref_url="https://www.suse.com/security/cve/CVE-2015-6564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6564/">CVE-2015-6564</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/942850">SUSE bug 942850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943006">SUSE bug 943006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943007">SUSE bug 943007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943010">SUSE bug 943010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948086">SUSE bug 948086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6749" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the aiff_open function in oggenc/audio.c in vorbis-tools 1.4.0 and earlier allows remote attackers to cause a denial of service (crash) via a crafted AIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<bugzilla href="https://bugzilla.suse.com/943795">SUSE bug 943795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009115051" comment="vorbis-tools-1.4.0-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009115052" comment="vorbis-tools-lang-1.4.0-26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965156">SUSE bug 965156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00039.html" source="SUSE-SU"/>
    <description>
    The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140870" comment="libldap-2_4-2-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140871" comment="libldap-2_4-2-32bit-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140872" comment="openldap2-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140873" comment="openldap2-back-meta-2.4.41-18.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140874" comment="openldap2-client-2.4.41-18.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6937" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.html" source="SUSE-SU"/>
    <description>
    The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<bugzilla href="https://bugzilla.suse.com/947003">SUSE bug 947003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129286" comment="mozilla-nspr-4.12-15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129287" comment="mozilla-nspr-32bit-4.12-15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2229-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2245-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html" source="SUSE-SU"/>
    <description>
    The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the RTPReceiverVideo::ParseRtpPacket function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 might allow remote attackers to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a crafted WebRTC RTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering a graphics operation that requires a large texture allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the MPEG4Extractor::readMetaData function in MPEG4Extractor.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 on 64-bit platforms allows remote attackers to execute arbitrary code via a crafted MP4 video file that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to bypass the Same Origin Policy via data: and view-source: URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2353-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the Metadata::setData function in MetaData.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect memory allocation and application crash) via an MP4 video file with crafted covr metadata that triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<bugzilla href="https://bugzilla.suse.com/959277">SUSE bug 959277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1705-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001623.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141107" comment="rpcbind-0.2.3-21.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
    <description>
    hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0575-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00151.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1227-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<bugzilla href="https://bugzilla.suse.com/965902">SUSE bug 965902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131935" comment="libgcrypt20-hmac-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131936" comment="libgcrypt20-hmac-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017265" ref_url="https://www.suse.com/support/kb/doc?id=7017265" source="SUSE-SU"/>
		<reference ref_id="TID7017273" ref_url="https://www.suse.com/support/kb/doc/?id=7017273" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017329" ref_url="https://www.suse.com/support/kb/doc/?id=7017329" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<bugzilla href="https://bugzilla.suse.com/1077097">SUSE bug 1077097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967061">SUSE bug 967061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967072">SUSE bug 967072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967496">SUSE bug 967496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969216">SUSE bug 969216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969241">SUSE bug 969241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958918">SUSE bug 958918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7551" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7551" ref_url="https://www.suse.com/security/cve/CVE-2015-7551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library.  NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7551/">CVE-2015-7551</cve>
	<bugzilla href="https://bugzilla.suse.com/939860">SUSE bug 939860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959495">SUSE bug 959495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550168" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550169" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550170" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1467-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the gdk_pixbuf_flip function in gdk-pixbuf-scale.c in gdk-pixbuf 2.30.x allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<bugzilla href="https://bugzilla.suse.com/958963">SUSE bug 958963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0215-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550933" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550934" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550935" comment="tiff-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7555" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001821.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0201-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0289-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00117.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in giffix.c in giffix in giflib 5.1.1 allows attackers to cause a denial of service (program crash) via crafted image and logical screen width fields in a GIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<bugzilla href="https://bugzilla.suse.com/960319">SUSE bug 960319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009126715" comment="giflib-progs-5.0.5-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009126709" comment="libgif6-5.0.5-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009126710" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7559</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7559" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7559" ref_url="https://www.suse.com/security/cve/CVE-2015-7559" source="SUSE CVE"/>
    <description>
    It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7559/">CVE-2015-7559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0877-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<bugzilla href="https://bugzilla.suse.com/968222">SUSE bug 968222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7566</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7566" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566</cve>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0007-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0161-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0162-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961280">SUSE bug 961280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961281">SUSE bug 961281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961282">SUSE bug 961282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961283">SUSE bug 961283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961284">SUSE bug 961284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961290">SUSE bug 961290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961357">SUSE bug 961357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967521">SUSE bug 967521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981087">SUSE bug 981087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7576</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7576" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7576" ref_url="https://www.suse.com/security/cve/CVE-2015-7576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html" source="SUSE-SU"/>
    <description>
    The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7576/">CVE-2015-7576</cve>
	<bugzilla href="https://bugzilla.suse.com/963329">SUSE bug 963329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963563">SUSE bug 963563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970715">SUSE bug 970715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7577</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7577" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7577" ref_url="https://www.suse.com/security/cve/CVE-2015-7577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html" source="SUSE-SU"/>
    <description>
    activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7577/">CVE-2015-7577</cve>
	<bugzilla href="https://bugzilla.suse.com/963330">SUSE bug 963330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963604">SUSE bug 963604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685558" comment="rubygem-activesupport-4_2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7581</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7581" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7581" ref_url="https://www.suse.com/security/cve/CVE-2015-7581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html" source="SUSE-SU"/>
    <description>
    actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7581/">CVE-2015-7581</cve>
	<bugzilla href="https://bugzilla.suse.com/963335">SUSE bug 963335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7613" ref_url="https://www.suse.com/security/cve/CVE-2015-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html" source="SUSE-SU"/>
    <description>
    Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7613/">CVE-2015-7613</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948536">SUSE bug 948536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948701">SUSE bug 948701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1467-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" source="SUSE-SU"/>
    <description>
    io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its allocation failed, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) and possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<bugzilla href="https://bugzilla.suse.com/948790">SUSE bug 948790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2195-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1467-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the pixops_scale_nearest function in pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted GIF image file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<bugzilla href="https://bugzilla.suse.com/948791">SUSE bug 948791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations.  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7696" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2529-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696</cve>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334480" comment="unzip is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7697" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2529-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697</cve>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950110">SUSE bug 950110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950111">SUSE bug 950111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334480" comment="unzip is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911792">SUSE bug 911792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943216">SUSE bug 943216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943218">SUSE bug 943218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943219">SUSE bug 943219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943221">SUSE bug 943221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952611">SUSE bug 952611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952611">SUSE bug 952611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7744</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7744" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7747" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1903-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00029.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the afReadFrames function in audiofile (aka libaudiofile and Audio File Library) allows user-assisted remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted audio file, as demonstrated by sixteen-stereo-to-eight-mono.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747</cve>
	<bugzilla href="https://bugzilla.suse.com/949399">SUSE bug 949399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1995-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in libsndfile 1.0.25 allows remote attackers to have unspecified impact via the headindex value in the header in an AIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1836-2" ref_url="https://lists.opensuse.org/opensuse-updates/2015-10/msg00057.html" source="SUSE-SU"/>
    <description>
    The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<bugzilla href="https://bugzilla.suse.com/950437">SUSE bug 950437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833</cve>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
    <description>
    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952606">SUSE bug 952606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7884" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
    <description>
    The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951626">SUSE bug 951626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951627">SUSE bug 951627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7885" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951626">SUSE bug 951626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951627">SUSE bug 951627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7940</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7940" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7940" ref_url="https://www.suse.com/security/cve/CVE-2015-7940" source="SUSE CVE"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html" source="SUSE-SU"/>
    <description>
    The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7940/">CVE-2015-7940</cve>
	<bugzilla href="https://bugzilla.suse.com/951727">SUSE bug 951727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1965-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00023.html" source="SUSE-SU"/>
    <description>
    The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962960">SUSE bug 962960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962988">SUSE bug 962988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<bugzilla href="https://bugzilla.suse.com/962802">SUSE bug 962802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962970">SUSE bug 962970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963000">SUSE bug 963000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962995">SUSE bug 962995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7981" ref_url="https://www.suse.com/security/cve/CVE-2015-7981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2136-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00046.html" source="SUSE-SU"/>
    <description>
    The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7981/">CVE-2015-7981</cve>
	<bugzilla href="https://bugzilla.suse.com/952051">SUSE bug 952051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990</cve>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1439-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00123.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550224" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550225" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548046" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00042.html" source="SUSE-SU"/>
    <description>
    db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<bugzilla href="https://bugzilla.suse.com/944066">SUSE bug 944066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958861">SUSE bug 958861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8023" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2183-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2103-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00139.html" source="SUSE-SU"/>
    <description>
    The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<bugzilla href="https://bugzilla.suse.com/953817">SUSE bug 953817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119278" comment="strongswan-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119279" comment="strongswan-doc-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119300" comment="strongswan-hmac-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119280" comment="strongswan-ipsec-5.1.3-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119281" comment="strongswan-libs0-5.1.3-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8025" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001686.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00102.html" source="SUSE-SU"/>
    <description>
    driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<bugzilla href="https://bugzilla.suse.com/952062">SUSE bug 952062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119273" comment="xscreensaver-5.22-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119274" comment="xscreensaver-data-5.22-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954429">SUSE bug 954429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<bugzilla href="https://bugzilla.suse.com/937419">SUSE bug 937419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131098" comment="wpa_supplicant-2.2-14.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8075" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2000-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1995-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2119-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00145.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<bugzilla href="https://bugzilla.suse.com/953516">SUSE bug 953516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953519">SUSE bug 953519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119271" comment="libsndfile1-1.0.25-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119272" comment="libsndfile1-32bit-1.0.25-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8079" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8079" ref_url="https://www.suse.com/security/cve/CVE-2015-8079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002293.html" source="SUSE-SU"/>
    <description>
    qt5-qtwebkit before 5.4 records private browsing URLs to its favicon database, WebpageIcons.db.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8079/">CVE-2015-8079</cve>
	<bugzilla href="https://bugzilla.suse.com/954210">SUSE bug 954210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140736" comment="libQt5WebKit5-5.6.1-9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140737" comment="libQt5WebKit5-imports-5.6.1-9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140738" comment="libQt5WebKitWidgets5-5.6.1-9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2136-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2262-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2263-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0103-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0104-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0105-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0729-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1652-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00046.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969333">SUSE bug 969333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119221" comment="libpng12-0-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119222" comment="libpng12-0-32bit-1.2.50-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119233" comment="libpng15-15-1.5.22-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119224" comment="libpng16-16-1.6.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119225" comment="libpng16-16-32bit-1.6.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<bugzilla href="https://bugzilla.suse.com/951608">SUSE bug 951608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963002">SUSE bug 963002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974668">SUSE bug 974668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8139" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8139" ref_url="https://www.suse.com/security/cve/CVE-2015-8139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8139/">CVE-2015-8139</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962997">SUSE bug 962997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8140" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8140" ref_url="https://www.suse.com/security/cve/CVE-2015-8140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8140/">CVE-2015-8140</cve>
	<bugzilla href="https://bugzilla.suse.com/1010964">SUSE bug 1010964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962994">SUSE bug 962994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962966">SUSE bug 962966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8241" ref_url="https://www.suse.com/security/cve/CVE-2015-8241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8241/">CVE-2015-8241</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956018">SUSE bug 956018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8317" ref_url="https://www.suse.com/security/cve/CVE-2015-8317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html" source="SUSE-SU"/>
    <description>
    The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8317/">CVE-2015-8317</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956260">SUSE bug 956260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334402" comment="rubygem-nokogiri is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1455-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00132.html" source="SUSE-SU"/>
    <description>
    The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2367-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0179-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html" source="SUSE-SU"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140648" comment="grub2-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140649" comment="grub2-arm64-efi-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140650" comment="grub2-i386-pc-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140651" comment="grub2-powerpc-ieee1275-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140652" comment="grub2-s390x-emu-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140653" comment="grub2-snapper-plugin-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140654" comment="grub2-systemd-sleep-plugin-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140655" comment="grub2-x86_64-efi-2.02~beta2-104.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140656" comment="grub2-x86_64-xen-2.02~beta2-104.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8380" ref_url="https://www.suse.com/security/cve/CVE-2015-8380" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8380/">CVE-2015-8380</cve>
	<bugzilla href="https://bugzilla.suse.com/957566">SUSE bug 957566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8381" ref_url="https://www.suse.com/security/cve/CVE-2015-8381" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8381/">CVE-2015-8381</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8382" ref_url="https://www.suse.com/security/cve/CVE-2015-8382" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8382/">CVE-2015-8382</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8383" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8383" ref_url="https://www.suse.com/security/cve/CVE-2015-8383" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8383/">CVE-2015-8383</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8384" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8384" ref_url="https://www.suse.com/security/cve/CVE-2015-8384" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8384/">CVE-2015-8384</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8385" ref_url="https://www.suse.com/security/cve/CVE-2015-8385" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8385/">CVE-2015-8385</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8386" ref_url="https://www.suse.com/security/cve/CVE-2015-8386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8386/">CVE-2015-8386</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8387" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8387" ref_url="https://www.suse.com/security/cve/CVE-2015-8387" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8387/">CVE-2015-8387</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8388" ref_url="https://www.suse.com/security/cve/CVE-2015-8388" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?=di(?&lt;=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8388/">CVE-2015-8388</cve>
	<bugzilla href="https://bugzilla.suse.com/936227">SUSE bug 936227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8389" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8389" ref_url="https://www.suse.com/security/cve/CVE-2015-8389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8389/">CVE-2015-8389</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8390" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8390" ref_url="https://www.suse.com/security/cve/CVE-2015-8390" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8390/">CVE-2015-8390</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8391" ref_url="https://www.suse.com/security/cve/CVE-2015-8391" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8391/">CVE-2015-8391</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8392" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8392" ref_url="https://www.suse.com/security/cve/CVE-2015-8392" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8392/">CVE-2015-8392</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8393" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8393" ref_url="https://www.suse.com/security/cve/CVE-2015-8393" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8393/">CVE-2015-8393</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8394" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8394" ref_url="https://www.suse.com/security/cve/CVE-2015-8394" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles the (?(&lt;digits&gt;) and (?(R&lt;digits&gt;) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8394/">CVE-2015-8394</cve>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8395" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8395" ref_url="https://www.suse.com/security/cve/CVE-2015-8395" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8395/">CVE-2015-8395</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957598">SUSE bug 957598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
    <description>
    The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<bugzilla href="https://bugzilla.suse.com/958585">SUSE bug 958585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8539" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958601">SUSE bug 958601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2672-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0942-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1037-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00063.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<bugzilla href="https://bugzilla.suse.com/1149680">SUSE bug 1149680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958791">SUSE bug 958791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550102" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547941" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550116" comment="libpng15-15-1.5.22-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969522">SUSE bug 969522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001799.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2367-1" ref_url="https://lists.opensuse.org/opensuse-updates/2015-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.4.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via a ; (semicolon) character in a print job, a different vulnerability than CVE-2015-8327.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957531">SUSE bug 957531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009119506" comment="cups-filters-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119507" comment="cups-filters-cups-browsed-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119508" comment="cups-filters-foomatic-rip-1.0.58-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009119509" comment="cups-filters-ghostscript-1.0.58-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001890.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0601-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0610-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00168.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<bugzilla href="https://bugzilla.suse.com/961305">SUSE bug 961305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615" source="SUSE CVE"/>
    <description>
    The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 does not limit the number of printk console messages when logging the new callback method, which allows local HVM guest OS users to cause a denial of service via a large number of changes to the callback method (HVM_PARAM_CALLBACK_IRQ).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615</cve>
	<bugzilla href="https://bugzilla.suse.com/960093">SUSE bug 960093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965269">SUSE bug 965269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0406-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0501-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html" source="SUSE-SU"/>
    <description>
    The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0406-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0501-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html" source="SUSE-SU"/>
    <description>
    The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<bugzilla href="https://bugzilla.suse.com/963964">SUSE bug 963964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0406-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0501-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00025.html" source="SUSE-SU"/>
    <description>
    apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<bugzilla href="https://bugzilla.suse.com/962189">SUSE bug 962189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962190">SUSE bug 962190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8709" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8709" ref_url="https://www.suse.com/security/cve/CVE-2015-8709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.  NOTE: the vendor states "there is no kernel bug here."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8709/">CVE-2015-8709</cve>
	<bugzilla href="https://bugzilla.suse.com/1010933">SUSE bug 1010933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959709">SUSE bug 959709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960561">SUSE bug 960561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960563">SUSE bug 960563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8710" ref_url="https://www.suse.com/security/cve/CVE-2015-8710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0188-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00066.html" source="SUSE-SU"/>
    <description>
    The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8710/">CVE-2015-8710</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960674">SUSE bug 960674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8711" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8712" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8712" ref_url="https://www.suse.com/security/cve/CVE-2015-8712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8712/">CVE-2015-8712</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8713" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8713" ref_url="https://www.suse.com/security/cve/CVE-2015-8713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8713/">CVE-2015-8713</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8714" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8714" ref_url="https://www.suse.com/security/cve/CVE-2015-8714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8714/">CVE-2015-8714</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8715" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8715" ref_url="https://www.suse.com/security/cve/CVE-2015-8715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8715/">CVE-2015-8715</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8716" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8716" ref_url="https://www.suse.com/security/cve/CVE-2015-8716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8716/">CVE-2015-8716</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8717" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8717" ref_url="https://www.suse.com/security/cve/CVE-2015-8717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8717/">CVE-2015-8717</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8718" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8719" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8719" ref_url="https://www.suse.com/security/cve/CVE-2015-8719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8719/">CVE-2015-8719</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8720" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8721" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8722" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8723" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8724" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8725" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8726" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8727" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8728" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8729" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8730" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8732" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8733" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0054-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00011.html" source="SUSE-SU"/>
    <description>
    The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<bugzilla href="https://bugzilla.suse.com/960382">SUSE bug 960382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960836">SUSE bug 960836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960708">SUSE bug 960708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8762" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8762" ref_url="https://www.suse.com/security/cve/CVE-2015-8762" source="SUSE CVE"/>
    <description>
    The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a zero-length EAP-PWD packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8762/">CVE-2015-8762</cve>
	<bugzilla href="https://bugzilla.suse.com/961479">SUSE bug 961479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334570" comment="freeradius-server is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8763" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8763" ref_url="https://www.suse.com/security/cve/CVE-2015-8763" source="SUSE CVE"/>
    <description>
    The EAP-PWD module in FreeRADIUS 3.0 through 3.0.8 allows remote attackers to have unspecified impact via a crafted (1) commit or (2) confirm message, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8763/">CVE-2015-8763</cve>
	<bugzilla href="https://bugzilla.suse.com/961479">SUSE bug 961479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334570" comment="freeradius-server is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8764" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8764" ref_url="https://www.suse.com/security/cve/CVE-2015-8764" source="SUSE CVE"/>
    <description>
    Off-by-one error in the EAP-PWD module in FreeRADIUS 3.0 through 3.0.8, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8764/">CVE-2015-8764</cve>
	<bugzilla href="https://bugzilla.suse.com/961479">SUSE bug 961479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334570" comment="freeradius-server is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
    <description>
    The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962735">SUSE bug 962735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965453">SUSE bug 965453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0405-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0414-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<bugzilla href="https://bugzilla.suse.com/964213">SUSE bug 964213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964225">SUSE bug 964225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785</cve>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0475-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0477-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0486-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html" source="SUSE-SU"/>
    <description>
    The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<bugzilla href="https://bugzilla.suse.com/964845">SUSE bug 964845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0475-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0477-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0486-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html" source="SUSE-SU"/>
    <description>
    x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<bugzilla href="https://bugzilla.suse.com/964847">SUSE bug 964847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0475-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0477-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0486-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html" source="SUSE-SU"/>
    <description>
    The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<bugzilla href="https://bugzilla.suse.com/964849">SUSE bug 964849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009123011" comment="libhogweed2-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123012" comment="libhogweed2-32bit-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123014" comment="libnettle4-2.7.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009123015" comment="libnettle4-32bit-2.7.1-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8812" ref_url="https://www.suse.com/security/cve/CVE-2015-8812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8812/">CVE-2015-8812</cve>
	<bugzilla href="https://bugzilla.suse.com/966437">SUSE bug 966437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966683">SUSE bug 966683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816</cve>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979064">SUSE bug 979064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8830" ref_url="https://www.suse.com/security/cve/CVE-2015-8830" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.  NOTE: this vulnerability exists because of a CVE-2012-6701 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8830/">CVE-2015-8830</cve>
	<bugzilla href="https://bugzilla.suse.com/969354">SUSE bug 969354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969355">SUSE bug 969355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8853" ref_url="https://www.suse.com/security/cve/CVE-2015-8853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8853/">CVE-2015-8853</cve>
	<bugzilla href="https://bugzilla.suse.com/976584">SUSE bug 976584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997948">SUSE bug 997948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997950">SUSE bug 997950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8868" ref_url="https://www.suse.com/security/cve/CVE-2015-8868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1322-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1630-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00077.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ExponentialFunction::ExponentialFunction function in Poppler before 0.40.0 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via an invalid blend mode in the ExtGState dictionary in a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8868/">CVE-2015-8868</cve>
	<bugzilla href="https://bugzilla.suse.com/976844">SUSE bug 976844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128640" comment="libpoppler44-0.24.4-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8871" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8871" ref_url="https://www.suse.com/security/cve/CVE-2015-8871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the opj_j2k_write_mco function in j2k.c in OpenJPEG before 2.1.1 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-8871/">CVE-2015-8871</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979907">SUSE bug 979907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549547" comment="libopenjp2-7-2.1.0-4.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8872" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8872" ref_url="https://www.suse.com/security/cve/CVE-2015-8872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002225.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1461-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00014.html" source="SUSE-SU"/>
    <description>
    The set_fat function in fat.c in dosfstools before 4.0 might allow attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an "off-by-two error."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8872/">CVE-2015-8872</cve>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131020" comment="dosfstools-3.0.26-6.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8878</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8878" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8878" ref_url="https://www.suse.com/security/cve/CVE-2015-8878" source="SUSE CVE"/>
    <description>
    main/php_open_temporary_file.c in PHP before 5.5.28 and 5.6.x before 5.6.12 does not ensure thread safety, which allows remote attackers to cause a denial of service (race condition and heap memory corruption) by leveraging an application that performs many temporary-file accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8878/">CVE-2015-8878</cve>
	<bugzilla href="https://bugzilla.suse.com/981055">SUSE bug 981055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8894" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8894" ref_url="https://www.suse.com/security/cve/CVE-2015-8894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8894/">CVE-2015-8894</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983523">SUSE bug 983523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8895" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8895" ref_url="https://www.suse.com/security/cve/CVE-2015-8895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer overflow in coders/icon.c in ImageMagick 6.9.1-3 and later allows remote attackers to cause a denial of service (application crash) via a crafted length value, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8895/">CVE-2015-8895</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983527">SUSE bug 983527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8896" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8896" ref_url="https://www.suse.com/security/cve/CVE-2015-8896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
    <description>
    Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8896/">CVE-2015-8896</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983533">SUSE bug 983533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8897" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8897" ref_url="https://www.suse.com/security/cve/CVE-2015-8897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8897/">CVE-2015-8897</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8898" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8898" ref_url="https://www.suse.com/security/cve/CVE-2015-8898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8898/">CVE-2015-8898</cve>
	<bugzilla href="https://bugzilla.suse.com/982969">SUSE bug 982969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983739">SUSE bug 983739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983746">SUSE bug 983746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8899" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00004.html" source="SUSE-SU"/>
    <description>
    Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<bugzilla href="https://bugzilla.suse.com/983273">SUSE bug 983273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334577" comment="dnsmasq is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549276" comment="dnsmasq-2.71-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8900" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8900" ref_url="https://www.suse.com/security/cve/CVE-2015-8900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8900/">CVE-2015-8900</cve>
	<bugzilla href="https://bugzilla.suse.com/983232">SUSE bug 983232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8901" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8901" ref_url="https://www.suse.com/security/cve/CVE-2015-8901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted MIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8901/">CVE-2015-8901</cve>
	<bugzilla href="https://bugzilla.suse.com/983234">SUSE bug 983234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8902" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8902" ref_url="https://www.suse.com/security/cve/CVE-2015-8902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadBlobByte function in coders/pdb.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted PDB file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8902/">CVE-2015-8902</cve>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983253">SUSE bug 983253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8903" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8903" ref_url="https://www.suse.com/security/cve/CVE-2015-8903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadVICARImage function in coders/vicar.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted VICAR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8903/">CVE-2015-8903</cve>
	<bugzilla href="https://bugzilla.suse.com/983259">SUSE bug 983259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8915" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8915" ref_url="https://www.suse.com/security/cve/CVE-2015-8915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006190.html" source="SUSE-SU"/>
    <description>
    bsdcpio in libarchive before 3.2.0 allows remote attackers to cause a denial of service (invalid read and crash) via crafted cpio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8915/">CVE-2015-8915</cve>
	<bugzilla href="https://bugzilla.suse.com/985601">SUSE bug 985601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8918" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8918" ref_url="https://www.suse.com/security/cve/CVE-2015-8918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The archive_string_append function in archive_string.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted cab files, related to "overlapping memcpy."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8918/">CVE-2015-8918</cve>
	<bugzilla href="https://bugzilla.suse.com/985698">SUSE bug 985698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8919" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8919" ref_url="https://www.suse.com/security/cve/CVE-2015-8919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The lha_read_file_extended_header function in archive_read_support_format_lha.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds heap) via a crafted (1) lzh or (2) lha file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8919/">CVE-2015-8919</cve>
	<bugzilla href="https://bugzilla.suse.com/985697">SUSE bug 985697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8920" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8920" ref_url="https://www.suse.com/security/cve/CVE-2015-8920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The _ar_read_header function in archive_read_support_format_ar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds stack read) via a crafted ar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8920/">CVE-2015-8920</cve>
	<bugzilla href="https://bugzilla.suse.com/985675">SUSE bug 985675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8921" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8921" ref_url="https://www.suse.com/security/cve/CVE-2015-8921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The ae_strtofflags function in archive_entry.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8921/">CVE-2015-8921</cve>
	<bugzilla href="https://bugzilla.suse.com/985682">SUSE bug 985682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8922" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8922" ref_url="https://www.suse.com/security/cve/CVE-2015-8922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The read_CodersInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted 7z file, related to the _7z_folder struct.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8922/">CVE-2015-8922</cve>
	<bugzilla href="https://bugzilla.suse.com/985685">SUSE bug 985685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8923" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8923" ref_url="https://www.suse.com/security/cve/CVE-2015-8923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The process_extra function in libarchive before 3.2.0 uses the size field and a signed number in an offset, which allows remote attackers to cause a denial of service (crash) via a crafted zip file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8923/">CVE-2015-8923</cve>
	<bugzilla href="https://bugzilla.suse.com/985703">SUSE bug 985703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8924" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8924" ref_url="https://www.suse.com/security/cve/CVE-2015-8924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The archive_read_format_tar_read_header function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8924/">CVE-2015-8924</cve>
	<bugzilla href="https://bugzilla.suse.com/985609">SUSE bug 985609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8925" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8925" ref_url="https://www.suse.com/security/cve/CVE-2015-8925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006190.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The readline function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (invalid read) via a crafted mtree file, related to newline parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8925/">CVE-2015-8925</cve>
	<bugzilla href="https://bugzilla.suse.com/985706">SUSE bug 985706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8926" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8926" ref_url="https://www.suse.com/security/cve/CVE-2015-8926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The archive_read_format_rar_read_data function in archive_read_support_format_rar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted rar archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8926/">CVE-2015-8926</cve>
	<bugzilla href="https://bugzilla.suse.com/985704">SUSE bug 985704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8928" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The process_add_entry function in archive_read_support_format_mtree.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<bugzilla href="https://bugzilla.suse.com/985679">SUSE bug 985679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8929" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8929" ref_url="https://www.suse.com/security/cve/CVE-2015-8929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Memory leak in the __archive_read_get_extract function in archive_read_extract2.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service via a tar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8929/">CVE-2015-8929</cve>
	<bugzilla href="https://bugzilla.suse.com/985669">SUSE bug 985669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8930" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8930" ref_url="https://www.suse.com/security/cve/CVE-2015-8930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    bsdtar in libarchive before 3.2.0 allows remote attackers to cause a denial of service (infinite loop) via an ISO with a directory that is a member of itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8930/">CVE-2015-8930</cve>
	<bugzilla href="https://bugzilla.suse.com/985700">SUSE bug 985700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8931" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8931" ref_url="https://www.suse.com/security/cve/CVE-2015-8931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) get_time_t_max and (2) get_time_t_min functions in archive_read_support_format_mtree.c in libarchive before 3.2.0 allow remote attackers to have unspecified impact via a crafted mtree file, which triggers undefined behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8931/">CVE-2015-8931</cve>
	<bugzilla href="https://bugzilla.suse.com/985689">SUSE bug 985689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8932" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8932" ref_url="https://www.suse.com/security/cve/CVE-2015-8932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The compress_bidder_init function in archive_read_support_filter_compress.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file, which triggers an invalid left shift.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8932/">CVE-2015-8932</cve>
	<bugzilla href="https://bugzilla.suse.com/985665">SUSE bug 985665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8933" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the archive_read_format_tar_skip function in archive_read_support_format_tar.c in libarchive before 3.2.0 allows remote attackers to cause a denial of service (crash) via a crafted tar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<bugzilla href="https://bugzilla.suse.com/985688">SUSE bug 985688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8934" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The copy_from_lzss_window function in archive_read_support_format_rar.c in libarchive 3.2.0 and earlier allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted rar file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<bugzilla href="https://bugzilla.suse.com/985673">SUSE bug 985673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8936" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8936" ref_url="https://www.suse.com/security/cve/CVE-2015-8936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002922.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2580-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00073.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in squidGuard.cgi in squidGuard before 1.5 allows remote attackers to inject arbitrary web script or HTML via a blocked site link.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8936/">CVE-2015-8936</cve>
	<bugzilla href="https://bugzilla.suse.com/985612">SUSE bug 985612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550294" comment="squidGuard-1.4-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550295" comment="squidGuard-doc-1.4-29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8946" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8946" ref_url="https://www.suse.com/security/cve/CVE-2015-8946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00006.html" source="SUSE-SU"/>
    <description>
    ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8946/">CVE-2015-8946</cve>
	<bugzilla href="https://bugzilla.suse.com/989121">SUSE bug 989121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989122">SUSE bug 989122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550588" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550589" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
    <description>
    idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<bugzilla href="https://bugzilla.suse.com/1014473">SUSE bug 1014473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190777">SUSE bug 1190777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131905" comment="libidn-tools-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8950</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8950" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8950" ref_url="https://www.suse.com/security/cve/CVE-2015-8950" source="SUSE CVE"/>
    <description>
    arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8950/">CVE-2015-8950</cve>
	<bugzilla href="https://bugzilla.suse.com/1003931">SUSE bug 1003931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004045">SUSE bug 1004045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8961" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8961" ref_url="https://www.suse.com/security/cve/CVE-2015-8961" source="SUSE CVE"/>
    <description>
    The __ext4_journal_stop function in fs/ext4/ext4_jbd2.c in the Linux kernel before 4.3.3 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging improper access to a certain error field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8961/">CVE-2015-8961</cve>
	<bugzilla href="https://bugzilla.suse.com/1010492">SUSE bug 1010492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8962" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962</cve>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8963" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8963" ref_url="https://www.suse.com/security/cve/CVE-2015-8963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8963/">CVE-2015-8963</cve>
	<bugzilla href="https://bugzilla.suse.com/1010502">SUSE bug 1010502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8964" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8964" ref_url="https://www.suse.com/security/cve/CVE-2015-8964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-8964/">CVE-2015-8964</cve>
	<bugzilla href="https://bugzilla.suse.com/1010507">SUSE bug 1010507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8966" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8966" ref_url="https://www.suse.com/security/cve/CVE-2015-8966" source="SUSE CVE"/>
    <description>
    arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 4.4 allows local users to gain privileges via a crafted (1) F_OFD_GETLK, (2) F_OFD_SETLK, or (3) F_OFD_SETLKW command in an fcntl64 system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8966/">CVE-2015-8966</cve>
	<bugzilla href="https://bugzilla.suse.com/1014754">SUSE bug 1014754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8967" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8967" ref_url="https://www.suse.com/security/cve/CVE-2015-8967" source="SUSE CVE"/>
    <description>
    arch/arm64/kernel/sys.c in the Linux kernel before 4.0 allows local users to bypass the "strict page permissions" protection mechanism and modify the system-call table, and consequently gain privileges, by leveraging write access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8967/">CVE-2015-8967</cve>
	<bugzilla href="https://bugzilla.suse.com/1014749">SUSE bug 1014749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8970" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
    <description>
    crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970</cve>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008850">SUSE bug 1008850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9004" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9004" ref_url="https://www.suse.com/security/cve/CVE-2015-9004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    kernel/events/core.c in the Linux kernel before 3.19 mishandles counter grouping, which allows local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-9004/">CVE-2015-9004</cve>
	<bugzilla href="https://bugzilla.suse.com/1037306">SUSE bug 1037306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9016" ref_url="https://www.suse.com/security/cve/CVE-2015-9016" source="SUSE CVE"/>
    <description>
    In blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. This could lead to local escalation of privilege. Product: Android. Versions: Android kernel. Android ID: A-63083046.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9016/">CVE-2015-9016</cve>
	<bugzilla href="https://bugzilla.suse.com/1081683">SUSE bug 1081683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550224" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550225" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548046" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9096" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9096" ref_url="https://www.suse.com/security/cve/CVE-2015-9096" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-9096/">CVE-2015-9096</cve>
	<bugzilla href="https://bugzilla.suse.com/1043983">SUSE bug 1043983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334078" comment="ruby is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9230" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9230" ref_url="https://www.suse.com/security/cve/CVE-2015-9230" source="SUSE CVE"/>
    <description>
    In the admin/db-backup-security/db-backup-security.php page in the BulletProof Security plugin before .52.5 for WordPress, XSS is possible for remote authenticated administrators via the DBTablePrefix parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9230/">CVE-2015-9230</cve>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334206" comment="libqt5-qtbase is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9251</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9251" ref_url="https://www.suse.com/security/cve/CVE-2015-9251" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-9251/">CVE-2015-9251</cve>
	<bugzilla href="https://bugzilla.suse.com/1099458">SUSE bug 1099458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100133">SUSE bug 1100133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111660">SUSE bug 1111660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9252" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9252" ref_url="https://www.suse.com/security/cve/CVE-2015-9252" source="SUSE CVE"/>
    <description>
    An issue was discovered in QPDF before 7.0.0. Endless recursion causes stack exhaustion in QPDFTokenizer::resolveLiteral() in QPDFTokenizer.cc, related to the QPDF::resolve function in QPDF.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9252/">CVE-2015-9252</cve>
	<bugzilla href="https://bugzilla.suse.com/1080931">SUSE bug 1080931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9542" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KXPRDBUQG5DRAA3TWBMKHHZP4CR2QEX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42BXAKC6WUYJZ65BBT2CMMJRVQFPVQI3/" source="SUSE-SU"/>
    <description>
    add_password in pam_radius_auth.c in pam_radius 1.4.0 does not correctly check the length of the input password, and is vulnerable to a stack-based buffer overflow during memcpy(). An attacker could send a crafted password to an application (loading the pam_radius library) and crash it. Arbitrary code execution might be possible, depending on the application, C library, compiler, and other factors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542</cve>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530906" comment="pam_radius-1.3.16-239.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530907" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548962" comment="pam_radius-1.3.16-239.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548963" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595535" comment="pam_radius-1.3.16-239.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548963" comment="pam_radius-32bit-1.3.16-239.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9543</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9543" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9543" ref_url="https://www.suse.com/security/cve/CVE-2015-9543" source="SUSE CVE"/>
    <description>
    An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to NovaProxyRequestHandlerBase.new_websocket_client in console/websocketproxy.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-9543/">CVE-2015-9543</cve>
	<bugzilla href="https://bugzilla.suse.com/1164398">SUSE bug 1164398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339358" comment="openstack-nova is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0264" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<bugzilla href="https://bugzilla.suse.com/977648">SUSE bug 977648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0363" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
    <description>
    The com.ibm.CORBA.iiop.ClientDelegate class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) uses the invoke method of the java.lang.reflect.Method class in an AccessController doPrivileged block, which allows remote attackers to call setSecurityManager and bypass a sandbox protection mechanism via vectors related to a Proxy object instance implementing the java.lang.reflect.InvocationHandler interface.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-3009.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0376" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
    <description>
    The com.ibm.rmi.io.SunSerializableFactory class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) does not properly deserialize classes in an AccessController doPrivileged block, which allows remote attackers to bypass a sandbox protection mechanism and execute arbitrary code as demonstrated by the readValue method of the com.ibm.rmi.io.ValueHandlerPool.ValueHandlerSingleton class, which implements the javax.rmi.CORBA.ValueHandler interface.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-5456.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<bugzilla href="https://bugzilla.suse.com/977646">SUSE bug 977646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977650">SUSE bug 977650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981057">SUSE bug 981057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981060">SUSE bug 981060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981087">SUSE bug 981087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0475" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0502</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0502" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0502" ref_url="https://www.suse.com/security/cve/CVE-2016-0502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0502/">CVE-2016-0502</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0503</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0503" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0503" ref_url="https://www.suse.com/security/cve/CVE-2016-0503" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0504.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0503/">CVE-2016-0503</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0504</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0504" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0504" ref_url="https://www.suse.com/security/cve/CVE-2016-0504" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0503.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0504/">CVE-2016-0504</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0594</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0594" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0594" ref_url="https://www.suse.com/security/cve/CVE-2016-0594" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.21 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0594/">CVE-2016-0594</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0595</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0595" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0595" ref_url="https://www.suse.com/security/cve/CVE-2016-0595" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0595/">CVE-2016-0595</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0599</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0599" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0599" ref_url="https://www.suse.com/security/cve/CVE-2016-0599" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0599/">CVE-2016-0599</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0601</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0601" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0601" ref_url="https://www.suse.com/security/cve/CVE-2016-0601" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0601/">CVE-2016-0601</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0605</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0605" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0605" ref_url="https://www.suse.com/security/cve/CVE-2016-0605" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0605/">CVE-2016-0605</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0607</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0607" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0607" ref_url="https://www.suse.com/security/cve/CVE-2016-0607" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0607/">CVE-2016-0607</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0610</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0610" ref_url="https://www.suse.com/security/cve/CVE-2016-0610" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0610/">CVE-2016-0610</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0611</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0611" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0611" ref_url="https://www.suse.com/security/cve/CVE-2016-0611" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0367-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0377-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0611/">CVE-2016-0611</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<bugzilla href="https://bugzilla.suse.com/962779">SUSE bug 962779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962817">SUSE bug 962817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962930">SUSE bug 962930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962931">SUSE bug 962931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962932">SUSE bug 962932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962934">SUSE bug 962934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962935">SUSE bug 962935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962936">SUSE bug 962936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962937">SUSE bug 962937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962938">SUSE bug 962938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962939">SUSE bug 962939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962941">SUSE bug 962941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962942">SUSE bug 962942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962943">SUSE bug 962943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962944">SUSE bug 962944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962945">SUSE bug 962945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962946">SUSE bug 962946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962947">SUSE bug 962947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962948">SUSE bug 962948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962949">SUSE bug 962949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962950">SUSE bug 962950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962951">SUSE bug 962951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962952">SUSE bug 962952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0617" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0617" ref_url="https://www.suse.com/security/cve/CVE-2016-0617" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the kernel-uek component in Oracle Linux 6 allows local users to affect availability via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0617/">CVE-2016-0617</cve>
	<bugzilla href="https://bugzilla.suse.com/965794">SUSE bug 965794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0634" ref_url="https://www.suse.com/security/cve/CVE-2016-0634" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2715-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2961-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00100.html" source="SUSE-SU"/>
    <description>
    The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0634/">CVE-2016-0634</cve>
	<bugzilla href="https://bugzilla.suse.com/1000396">SUSE bug 1000396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188388">SUSE bug 1188388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520998" comment="bash-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521001" comment="libreadline6-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521002" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551004" comment="bash-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551005" comment="libreadline6-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551006" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594763" comment="bash-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594764" comment="libreadline6-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551006" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0959-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0971-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<bugzilla href="https://bugzilla.suse.com/972468">SUSE bug 972468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0639</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0639" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0639" ref_url="https://www.suse.com/security/cve/CVE-2016-0639" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0639/">CVE-2016-0639</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0643" ref_url="https://www.suse.com/security/cve/CVE-2016-0643" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0643/">CVE-2016-0643</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0647" ref_url="https://www.suse.com/security/cve/CVE-2016-0647" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0647/">CVE-2016-0647</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0648" ref_url="https://www.suse.com/security/cve/CVE-2016-0648" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0648/">CVE-2016-0648</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0651" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0652</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0652" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0652" ref_url="https://www.suse.com/security/cve/CVE-2016-0652" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.10 and earlier allows local users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0652/">CVE-2016-0652</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0653</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0653" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0653" ref_url="https://www.suse.com/security/cve/CVE-2016-0653" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.10 and earlier allows local users to affect availability via vectors related to FTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0653/">CVE-2016-0653</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0654</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0654" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0654" ref_url="https://www.suse.com/security/cve/CVE-2016-0654" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.10 and earlier allows local users to affect availability via vectors related to InnoDB, a different vulnerability than CVE-2016-0656.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0654/">CVE-2016-0654</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0655" ref_url="https://www.suse.com/security/cve/CVE-2016-0655" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0655/">CVE-2016-0655</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0656</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0656" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0656" ref_url="https://www.suse.com/security/cve/CVE-2016-0656" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.10 and earlier allows local users to affect availability via vectors related to InnoDB, a different vulnerability than CVE-2016-0654.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0656/">CVE-2016-0656</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0657</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0657" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0657" ref_url="https://www.suse.com/security/cve/CVE-2016-0657" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.11 and earlier allows local users to affect confidentiality via vectors related to JSON.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0657/">CVE-2016-0657</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0658</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0658" ref_url="https://www.suse.com/security/cve/CVE-2016-0658" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.10 and earlier allows local users to affect availability via vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0658/">CVE-2016-0658</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0659</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0659" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0659" ref_url="https://www.suse.com/security/cve/CVE-2016-0659" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.11 and earlier allows local users to affect availability via vectors related to Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0659/">CVE-2016-0659</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0661</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0661" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0661" ref_url="https://www.suse.com/security/cve/CVE-2016-0661" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Options.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0661/">CVE-2016-0661</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0662</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0662" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0662" ref_url="https://www.suse.com/security/cve/CVE-2016-0662" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.11 and earlier allows local users to affect availability via vectors related to Partition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0662/">CVE-2016-0662</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0663</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0663" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0663" ref_url="https://www.suse.com/security/cve/CVE-2016-0663" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.10 and earlier allows local users to affect availability via vectors related to Performance Schema.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0663/">CVE-2016-0663</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0665</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0665" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0665" ref_url="https://www.suse.com/security/cve/CVE-2016-0665" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Security: Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0665/">CVE-2016-0665</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0666" ref_url="https://www.suse.com/security/cve/CVE-2016-0666" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0666/">CVE-2016-0666</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0667</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0667" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0667" ref_url="https://www.suse.com/security/cve/CVE-2016-0667" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.7.11 and earlier allows local users to affect availability via vectors related to Locking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0667/">CVE-2016-0667</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality via vectors related to Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00027.html" source="SUSE-SU"/>
    <description>
    The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<bugzilla href="https://bugzilla.suse.com/1007806">SUSE bug 1007806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7017354" ref_url="https://www.suse.com/support/kb/doc/?id=7017354" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html" source="SUSE-SU"/>
    <description>
    Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706</cve>
	<bugzilla href="https://bugzilla.suse.com/967815">SUSE bug 967815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="TID7017354" ref_url="https://www.suse.com/support/kb/doc/?id=7017354" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html" source="SUSE-SU"/>
    <description>
    The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714</cve>
	<bugzilla href="https://bugzilla.suse.com/967964">SUSE bug 967964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1441-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128464" comment="expat-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128465" comment="libexpat1-2.1.0-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128466" comment="libexpat1-32bit-2.1.0-17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531736" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549064" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549065" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549066" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549067" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549068" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596194" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596195" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596196" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596197" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596198" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0723" ref_url="https://www.suse.com/security/cve/CVE-2016-0723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0723/">CVE-2016-0723</cve>
	<bugzilla href="https://bugzilla.suse.com/961500">SUSE bug 961500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0728" ref_url="https://www.suse.com/security/cve/CVE-2016-0728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0341-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0747-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0756-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="TID7017169" ref_url="https://www.suse.com/support/kb/doc?id=7017169" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0728/">CVE-2016-0728</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962075">SUSE bug 962075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962078">SUSE bug 962078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0729" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002000.html" source="SUSE-SU"/>
		<reference ref_id="TID7017306" ref_url="https://www.suse.com/support/kb/doc/?id=7017306" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0966-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1808-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in (1) internal/XMLReader.cpp, (2) util/XMLURL.cpp, and (3) util/XMLUri.cpp in the XML Parser library in Apache Xerces-C before 3.1.3 allow remote attackers to cause a denial of service (segmentation fault or memory corruption) or possibly execute arbitrary code via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<bugzilla href="https://bugzilla.suse.com/966822">SUSE bug 966822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0736" ref_url="https://www.suse.com/security/cve/CVE-2016-0736" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002741.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0903-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00120.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0736/">CVE-2016-0736</cve>
	<bugzilla href="https://bugzilla.suse.com/1016712">SUSE bug 1016712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033513">SUSE bug 1033513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550050" comment="apache2-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532772" comment="apache2-doc-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550051" comment="apache2-example-pages-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550052" comment="apache2-prefork-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550053" comment="apache2-utils-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550054" comment="apache2-worker-2.4.23-21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1725-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html" source="SUSE-SU"/>
    <description>
    The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0751</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0751" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0751" ref_url="https://www.suse.com/security/cve/CVE-2016-0751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html" source="SUSE-SU"/>
    <description>
    actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0751/">CVE-2016-0751</cve>
	<bugzilla href="https://bugzilla.suse.com/963331">SUSE bug 963331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963627">SUSE bug 963627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0752</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0752" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0752" ref_url="https://www.suse.com/security/cve/CVE-2016-0752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0372-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0752/">CVE-2016-0752</cve>
	<bugzilla href="https://bugzilla.suse.com/963332">SUSE bug 963332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963608">SUSE bug 963608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968850">SUSE bug 968850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009685552" comment="rubygem-actionmailer-4_2 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685557" comment="rubygem-activemodel-4_2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0360-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0373-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0376-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html" source="SUSE-SU"/>
    <description>
    The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0758" ref_url="https://www.suse.com/security/cve/CVE-2016-0758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0758/">CVE-2016-0758</cve>
	<bugzilla href="https://bugzilla.suse.com/979867">SUSE bug 979867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980856">SUSE bug 980856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0762" ref_url="https://www.suse.com/security/cve/CVE-2016-0762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00061.html" source="SUSE-SU"/>
    <description>
    The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0762/">CVE-2016-0762</cve>
	<bugzilla href="https://bugzilla.suse.com/1007854">SUSE bug 1007854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532091" comment="tomcat-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532092" comment="tomcat-admin-webapps-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532093" comment="tomcat-docs-webapp-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532094" comment="tomcat-el-3_0-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532095" comment="tomcat-javadoc-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532096" comment="tomcat-jsp-2_3-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532097" comment="tomcat-lib-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532098" comment="tomcat-servlet-3_1-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532099" comment="tomcat-webapps-8.0.36-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="TID7017354" ref_url="https://www.suse.com/support/kb/doc/?id=7017354" source="SUSE-SU"/>
		<reference ref_id="TID7017401" ref_url="https://www.suse.com/support/kb/doc/?id=7017401" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html" source="SUSE-SU"/>
    <description>
    The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763</cve>
	<bugzilla href="https://bugzilla.suse.com/967966">SUSE bug 967966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0764" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764" source="SUSE CVE"/>
    <description>
    Race condition in Network Manager before 1.0.12 as packaged in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows local users to obtain sensitive connection information by reading temporary files during ifcfg and keyfile changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<bugzilla href="https://bugzilla.suse.com/974072">SUSE bug 974072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140431" comment="libnm-glib-vpn1-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140432" comment="libnm-glib4-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140433" comment="libnm-util2-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140434" comment="libnm0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140435" comment="typelib-1_0-NMClient-1_0-1.0.12-8.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140436" comment="typelib-1_0-NetworkManager-1_0-1.0.12-8.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0766" ref_url="https://www.suse.com/security/cve/CVE-2016-0766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 does not properly restrict access to unspecified custom configuration settings (GUCS) for PL/Java, which allows attackers to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0766/">CVE-2016-0766</cve>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978323">SUSE bug 978323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html" source="SUSE-SU"/>
    <description>
    The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771</cve>
	<bugzilla href="https://bugzilla.suse.com/968223">SUSE bug 968223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549178" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549179" comment="python3-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549180" comment="python3-base-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549181" comment="python3-curses-3.4.5-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0773" ref_url="https://www.suse.com/security/cve/CVE-2016-0773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0531-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0773/">CVE-2016-0773</cve>
	<bugzilla href="https://bugzilla.suse.com/966435">SUSE bug 966435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966436">SUSE bug 966436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978323">SUSE bug 978323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983246">SUSE bug 983246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986409">SUSE bug 986409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0775</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0775" ref_url="https://www.suse.com/security/cve/CVE-2016-0775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0762-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00055.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0775/">CVE-2016-0775</cve>
	<bugzilla href="https://bugzilla.suse.com/965579">SUSE bug 965579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965582">SUSE bug 965582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="TID7017180" ref_url="https://www.suse.com/support/kb/doc/?id=7017180" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00008.html" source="SUSE-SU"/>
    <description>
    The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<bugzilla href="https://bugzilla.suse.com/1149968">SUSE bug 1149968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968174">SUSE bug 968174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974691">SUSE bug 974691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140952" comment="libssh2-1-1.4.3-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140953" comment="libssh2-1-32bit-1.4.3-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
    <description>
    Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968265">SUSE bug 968265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0799" ref_url="https://www.suse.com/security/cve/CVE-2016-0799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0799/">CVE-2016-0799</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968374">SUSE bug 968374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969517">SUSE bug 969517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989345">SUSE bug 989345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017316" ref_url="https://www.suse.com/support/kb/doc/?id=7017316" source="SUSE-SU"/>
		<reference ref_id="TID7017317" ref_url="https://www.suse.com/support/kb/doc/?id=7017317" source="SUSE-SU"/>
		<reference ref_id="TID7017338" ref_url="https://www.suse.com/support/kb/doc/?id=7017338" source="SUSE-SU"/>
		<reference ref_id="TID7017374" ref_url="https://www.suse.com/support/kb/doc/?id=7017374" source="SUSE-SU"/>
		<reference ref_id="TID7021979" ref_url="https://www.suse.com/support/kb/doc/?id=7021979" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<bugzilla href="https://bugzilla.suse.com/1106871">SUSE bug 1106871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961377">SUSE bug 961377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979060">SUSE bug 979060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0821" ref_url="https://www.suse.com/security/cve/CVE-2016-0821" source="SUSE CVE"/>
    <description>
    The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0821/">CVE-2016-0821</cve>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994624">SUSE bug 994624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000031" ref_url="https://www.suse.com/security/cve/CVE-2016-1000031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1212-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14044-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914044-1.html" source="SUSE-SU"/>
		<reference ref_id="TID7018113" ref_url="https://www.suse.com/support/kb/doc/?id=7018113" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00036.html" source="SUSE-SU"/>
    <description>
    Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1000031/">CVE-2016-1000031</cve>
	<bugzilla href="https://bugzilla.suse.com/1128963">SUSE bug 1128963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530483" comment="jakarta-commons-fileupload-1.1.1-122.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530484" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530483" comment="jakarta-commons-fileupload-1.1.1-122.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530484" comment="jakarta-commons-fileupload-javadoc-1.1.1-122.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549178" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549179" comment="python3-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549180" comment="python3-base-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549181" comment="python3-curses-3.4.5-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10002" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0192-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0223-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00124.html" source="SUSE-SU"/>
    <description>
    Incorrect processing of responses to If-None-Modified HTTP conditional requests in Squid HTTP Proxy 3.1.10 through 3.1.23, 3.2.0.3 through 3.5.22, and 4.0.1 through 4.0.16 leads to client-specific Cookie data being leaked to other clients. Attack requests can easily be crafted by a client to probe a cache for this information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002</cve>
	<bugzilla href="https://bugzilla.suse.com/1016168">SUSE bug 1016168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550189" comment="squid-3.5.21-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10003" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10003" ref_url="https://www.suse.com/security/cve/CVE-2016-10003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0192-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00107.html" source="SUSE-SU"/>
    <description>
    Incorrect HTTP Request header comparison in Squid HTTP Proxy 3.5.0.1 through 3.5.22, and 4.0.1 through 4.0.16 results in Collapsed Forwarding feature mistakenly identifying some private responses as being suitable for delivery to multiple clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10003/">CVE-2016-10003</cve>
	<bugzilla href="https://bugzilla.suse.com/1016169">SUSE bug 1016169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550189" comment="squid-3.5.21-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00032.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549575" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549576" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549577" comment="openssh-fips-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549578" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10010" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016368">SUSE bug 1016368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196721">SUSE bug 1196721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549575" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549576" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549577" comment="openssh-fips-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549578" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00032.html" source="SUSE-SU"/>
    <description>
    authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549575" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549576" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549577" comment="openssh-fips-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549578" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
    <description>
    The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<bugzilla href="https://bugzilla.suse.com/1006166">SUSE bug 1006166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035742">SUSE bug 1035742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073044">SUSE bug 1073044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092582">SUSE bug 1092582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549575" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549576" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549577" comment="openssh-fips-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549578" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549266" comment="xen-doc-html-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549267" comment="xen-tools-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549268" comment="xen-tools-domU-4.7.1_04-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549266" comment="xen-doc-html-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549267" comment="xen-tools-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549268" comment="xen-tools-domU-4.7.1_04-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10025" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00001.html" source="SUSE-SU"/>
    <description>
    VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025</cve>
	<bugzilla href="https://bugzilla.suse.com/1014300">SUSE bug 1014300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549266" comment="xen-doc-html-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549267" comment="xen-tools-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549268" comment="xen-tools-domU-4.7.1_04-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10028" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a VIRTIO_GPU_CMD_GET_CAPSET command with a maximum capabilities size with a value of 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<bugzilla href="https://bugzilla.suse.com/1017084">SUSE bug 1017084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017085">SUSE bug 1017085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185981">SUSE bug 1185981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10029" ref_url="https://www.suse.com/security/cve/CVE-2016-10029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10029/">CVE-2016-10029</cve>
	<bugzilla href="https://bugzilla.suse.com/1017081">SUSE bug 1017081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017082">SUSE bug 1017082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10040" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10040" ref_url="https://www.suse.com/security/cve/CVE-2016-10040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004250.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in QXmlSimpleReader in Qt 4.8.5 allows remote attackers to cause a denial of service (application crash) via a xml file with multiple nested open tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10040/">CVE-2016-10040</cve>
	<bugzilla href="https://bugzilla.suse.com/1039291">SUSE bug 1039291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334206" comment="libqt5-qtbase is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10044" ref_url="https://www.suse.com/security/cve/CVE-2016-10044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10044/">CVE-2016-10044</cve>
	<bugzilla href="https://bugzilla.suse.com/1023992">SUSE bug 1023992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10046" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10046" ref_url="https://www.suse.com/security/cve/CVE-2016-10046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10046/">CVE-2016-10046</cve>
	<bugzilla href="https://bugzilla.suse.com/1016742">SUSE bug 1016742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017308">SUSE bug 1017308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10047" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10047" ref_url="https://www.suse.com/security/cve/CVE-2016-10047" source="SUSE CVE"/>
    <description>
    Memory leak in the NewXMLTree function in magick/xml-tree.c in ImageMagick before 6.9.4-7 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10047/">CVE-2016-10047</cve>
	<bugzilla href="https://bugzilla.suse.com/1017309">SUSE bug 1017309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10048" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10048" ref_url="https://www.suse.com/security/cve/CVE-2016-10048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10048/">CVE-2016-10048</cve>
	<bugzilla href="https://bugzilla.suse.com/1017310">SUSE bug 1017310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10049" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10049" ref_url="https://www.suse.com/security/cve/CVE-2016-10049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick before 6.9.4-4 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10049/">CVE-2016-10049</cve>
	<bugzilla href="https://bugzilla.suse.com/1017311">SUSE bug 1017311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10050" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10050" ref_url="https://www.suse.com/security/cve/CVE-2016-10050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10050/">CVE-2016-10050</cve>
	<bugzilla href="https://bugzilla.suse.com/1017312">SUSE bug 1017312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10051" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10051" ref_url="https://www.suse.com/security/cve/CVE-2016-10051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10051/">CVE-2016-10051</cve>
	<bugzilla href="https://bugzilla.suse.com/1017313">SUSE bug 1017313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10052" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10052" ref_url="https://www.suse.com/security/cve/CVE-2016-10052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10052/">CVE-2016-10052</cve>
	<bugzilla href="https://bugzilla.suse.com/1017314">SUSE bug 1017314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10053" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10053" ref_url="https://www.suse.com/security/cve/CVE-2016-10053" source="SUSE CVE"/>
    <description>
    The WriteTIFFImage function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10053/">CVE-2016-10053</cve>
	<bugzilla href="https://bugzilla.suse.com/1017315">SUSE bug 1017315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10054" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10054" ref_url="https://www.suse.com/security/cve/CVE-2016-10054" source="SUSE CVE"/>
    <description>
    Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10054/">CVE-2016-10054</cve>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016585">SUSE bug 1016585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017316">SUSE bug 1017316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10055" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10055" ref_url="https://www.suse.com/security/cve/CVE-2016-10055" source="SUSE CVE"/>
    <description>
    Buffer overflow in the WritePDBImage function in coders/pdb.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10055/">CVE-2016-10055</cve>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016585">SUSE bug 1016585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017316">SUSE bug 1017316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10056" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10056" ref_url="https://www.suse.com/security/cve/CVE-2016-10056" source="SUSE CVE"/>
    <description>
    Buffer overflow in the sixel_decode function in coders/sixel.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10056/">CVE-2016-10056</cve>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016585">SUSE bug 1016585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017316">SUSE bug 1017316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10057" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10057" ref_url="https://www.suse.com/security/cve/CVE-2016-10057" source="SUSE CVE"/>
    <description>
    Buffer overflow in the WriteGROUP4Image function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10057/">CVE-2016-10057</cve>
	<bugzilla href="https://bugzilla.suse.com/1002209">SUSE bug 1002209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016585">SUSE bug 1016585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017316">SUSE bug 1017316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10058" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10058" ref_url="https://www.suse.com/security/cve/CVE-2016-10058" source="SUSE CVE"/>
    <description>
    Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagick before 6.9.6-3 allows remote attackers to cause a denial of service (memory consumption) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10058/">CVE-2016-10058</cve>
	<bugzilla href="https://bugzilla.suse.com/1017317">SUSE bug 1017317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10059" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10059" ref_url="https://www.suse.com/security/cve/CVE-2016-10059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.4-1 allows remote attackers to cause a denial of service (application crash) or have unspecified other impact via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10059/">CVE-2016-10059</cve>
	<bugzilla href="https://bugzilla.suse.com/1017318">SUSE bug 1017318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10060" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10060" ref_url="https://www.suse.com/security/cve/CVE-2016-10060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10060/">CVE-2016-10060</cve>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10061" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10061" ref_url="https://www.suse.com/security/cve/CVE-2016-10061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The ReadGROUP4Image function in coders/tiff.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10061/">CVE-2016-10061</cve>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10062" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10062" ref_url="https://www.suse.com/security/cve/CVE-2016-10062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The ReadGROUP4Image function in coders/tiff.c in ImageMagick does not check the return value of the fwrite function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10062/">CVE-2016-10062</cve>
	<bugzilla href="https://bugzilla.suse.com/1017319">SUSE bug 1017319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10063" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10063" ref_url="https://www.suse.com/security/cve/CVE-2016-10063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file, related to extend validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10063/">CVE-2016-10063</cve>
	<bugzilla href="https://bugzilla.suse.com/1016589">SUSE bug 1016589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017320">SUSE bug 1017320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10064" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10064" ref_url="https://www.suse.com/security/cve/CVE-2016-10064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10064/">CVE-2016-10064</cve>
	<bugzilla href="https://bugzilla.suse.com/1016590">SUSE bug 1016590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017321">SUSE bug 1017321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10065" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10065" ref_url="https://www.suse.com/security/cve/CVE-2016-10065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick before 7.0.1-0 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10065/">CVE-2016-10065</cve>
	<bugzilla href="https://bugzilla.suse.com/1016591">SUSE bug 1016591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017322">SUSE bug 1017322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10068" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10068" ref_url="https://www.suse.com/security/cve/CVE-2016-10068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10068/">CVE-2016-10068</cve>
	<bugzilla href="https://bugzilla.suse.com/1017324">SUSE bug 1017324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10069" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10069" ref_url="https://www.suse.com/security/cve/CVE-2016-10069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a mat file with an invalid number of frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10069/">CVE-2016-10069</cve>
	<bugzilla href="https://bugzilla.suse.com/1017325">SUSE bug 1017325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10070" ref_url="https://www.suse.com/security/cve/CVE-2016-10070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10070/">CVE-2016-10070</cve>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10071" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10071" ref_url="https://www.suse.com/security/cve/CVE-2016-10071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10071/">CVE-2016-10071</cve>
	<bugzilla href="https://bugzilla.suse.com/1017326">SUSE bug 1017326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0942-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1037-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00063.html" source="SUSE-SU"/>
    <description>
    The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149680">SUSE bug 1149680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550102" comment="libpng12-0-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547941" comment="libpng12-0-32bit-1.2.50-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550116" comment="libpng15-15-1.5.22-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550057" comment="libpng16-16-1.6.8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547892" comment="libpng16-16-32bit-1.6.8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10095" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the _TIFFVGetField function in tif_dir.c in LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7 and 4.0.8 allows remote attackers to cause a denial of service (crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550933" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550934" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550935" comment="tiff-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10109" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0178-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00099.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in pcsc-lite before 1.8.20 allows a remote attackers to cause denial of service (crash) via a command that uses "cardsList" after the handle has been released through the SCardReleaseContext function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109</cve>
	<bugzilla href="https://bugzilla.suse.com/1017902">SUSE bug 1017902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549628" comment="libpcsclite1-1.8.10-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549629" comment="pcsc-lite-1.8.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10127</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10127" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10127" ref_url="https://www.suse.com/security/cve/CVE-2016-10127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
    <description>
    PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafted SAML XML request or response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10127/">CVE-2016-10127</cve>
	<bugzilla href="https://bugzilla.suse.com/1019074">SUSE bug 1019074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595186" comment="crowbar-core-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595187" comment="crowbar-core-branding-upstream-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595188" comment="crowbar-openstack-4.0+git.1569429513.e7016b2b6-9.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595189" comment="grafana-4.6.5-1.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595190" comment="novnc-1.0.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595191" comment="openstack-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595192" comment="openstack-keystone-doc-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595193" comment="openstack-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595194" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595195" comment="openstack-neutron-doc-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595196" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595197" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595198" comment="openstack-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595199" comment="openstack-neutron-lbaas-agent-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595200" comment="openstack-neutron-lbaas-doc-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595201" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595202" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595203" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595204" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595205" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595206" comment="openstack-neutron-server-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595207" comment="openstack-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595208" comment="openstack-nova-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595209" comment="openstack-nova-cells-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595210" comment="openstack-nova-cert-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595211" comment="openstack-nova-compute-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595212" comment="openstack-nova-conductor-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595213" comment="openstack-nova-console-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595214" comment="openstack-nova-consoleauth-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595215" comment="openstack-nova-doc-14.0.11~dev13-4.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595216" comment="openstack-nova-novncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595217" comment="openstack-nova-placement-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595218" comment="openstack-nova-scheduler-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595219" comment="openstack-nova-serialproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595220" comment="openstack-nova-vncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595221" comment="openstack-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595222" comment="openstack-tempest-test-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595223" comment="python-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595224" comment="python-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595225" comment="python-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595226" comment="python-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595227" comment="python-pysaml2-4.0.2-3.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595228" comment="python-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595229" comment="python-urllib3-1.16-3.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595230" comment="ruby2.1-rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595231" comment="ruby2.1-rubygem-easy_diff-1.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595232" comment="rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595233" comment="sleshammer-aarch64-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595234" comment="sleshammer-ppc64le-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595235" comment="sleshammer-s390x-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595236" comment="sleshammer-x86_64-0.7.0-0.18.12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10144" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10144" ref_url="https://www.suse.com/security/cve/CVE-2016-10144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10144/">CVE-2016-10144</cve>
	<bugzilla href="https://bugzilla.suse.com/1020433">SUSE bug 1020433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10145" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10145" ref_url="https://www.suse.com/security/cve/CVE-2016-10145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via vectors related to a string copy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10145/">CVE-2016-10145</cve>
	<bugzilla href="https://bugzilla.suse.com/1020435">SUSE bug 1020435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10146" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10146" ref_url="https://www.suse.com/security/cve/CVE-2016-10146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in the caption and label handling code in ImageMagick allow remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10146/">CVE-2016-10146</cve>
	<bugzilla href="https://bugzilla.suse.com/1020443">SUSE bug 1020443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10147" ref_url="https://www.suse.com/security/cve/CVE-2016-10147" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10147/">CVE-2016-10147</cve>
	<bugzilla href="https://bugzilla.suse.com/1020381">SUSE bug 1020381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020429">SUSE bug 1020429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10150" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10150" ref_url="https://www.suse.com/security/cve/CVE-2016-10150" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10150/">CVE-2016-10150</cve>
	<bugzilla href="https://bugzilla.suse.com/1020693">SUSE bug 1020693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10153" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10153" ref_url="https://www.suse.com/security/cve/CVE-2016-10153" source="SUSE CVE"/>
    <description>
    The crypto scatterlist API in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging reliance on earlier net/ceph/crypto.c code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10153/">CVE-2016-10153</cve>
	<bugzilla href="https://bugzilla.suse.com/1021253">SUSE bug 1021253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10154" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10154" ref_url="https://www.suse.com/security/cve/CVE-2016-10154" source="SUSE CVE"/>
    <description>
    The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10154/">CVE-2016-10154</cve>
	<bugzilla href="https://bugzilla.suse.com/1021254">SUSE bug 1021254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10155" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00058.html" source="SUSE-SU"/>
    <description>
    A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156</cve>
	<bugzilla href="https://bugzilla.suse.com/1020601">SUSE bug 1020601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021969">SUSE bug 1021969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086936">SUSE bug 1086936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549619" comment="libsystemd0-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549620" comment="libsystemd0-32bit-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549621" comment="libudev1-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549622" comment="libudev1-32bit-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549623" comment="systemd-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549624" comment="systemd-32bit-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518084" comment="systemd-bash-completion-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549625" comment="systemd-sysvinit-228-132.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549626" comment="udev-228-132.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10163" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10163" ref_url="https://www.suse.com/security/cve/CVE-2016-10163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10163/">CVE-2016-10163</cve>
	<bugzilla href="https://bugzilla.suse.com/1021616">SUSE bug 1021616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10164" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10164" ref_url="https://www.suse.com/security/cve/CVE-2016-10164" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0557-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00103.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in libXpm before 3.5.12, when a program requests parsing XPM extensions on a 64-bit platform, allow remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via (1) the number of extensions or (2) their concatenated length in a crafted XPM file, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10164/">CVE-2016-10164</cve>
	<bugzilla href="https://bugzilla.suse.com/1021315">SUSE bug 1021315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123144">SUSE bug 1123144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549983" comment="libXpm4-3.5.11-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547824" comment="libXpm4-32bit-3.5.11-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10165" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<bugzilla href="https://bugzilla.suse.com/1021364">SUSE bug 1021364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064069">SUSE bug 1064069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334002" comment="lcms2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10166" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0588-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022263">SUSE bug 1022263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549984" comment="gd-2.1.0-23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0588-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022264">SUSE bug 1022264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549984" comment="gd-2.1.0-23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0588-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Integer overflow in gd_io.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<bugzilla href="https://bugzilla.suse.com/1022069">SUSE bug 1022069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022265">SUSE bug 1022265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549984" comment="gd-2.1.0-23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10169" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10169" ref_url="https://www.suse.com/security/cve/CVE-2016-10169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00017.html" source="SUSE-SU"/>
    <description>
    The read_code function in read_words.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10169/">CVE-2016-10169</cve>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550754" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10170" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10170" ref_url="https://www.suse.com/security/cve/CVE-2016-10170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00017.html" source="SUSE-SU"/>
    <description>
    The WriteCaffHeader function in cli/caff.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10170/">CVE-2016-10170</cve>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550754" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10171" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10171" ref_url="https://www.suse.com/security/cve/CVE-2016-10171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00017.html" source="SUSE-SU"/>
    <description>
    The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10171/">CVE-2016-10171</cve>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550754" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10172" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10172" ref_url="https://www.suse.com/security/cve/CVE-2016-10172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0623-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00017.html" source="SUSE-SU"/>
    <description>
    The read_new_config_info function in open_utils.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10172/">CVE-2016-10172</cve>
	<bugzilla href="https://bugzilla.suse.com/1021483">SUSE bug 1021483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550754" comment="libwavpack1-4.60.99-5.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10195" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10195" ref_url="https://www.suse.com/security/cve/CVE-2016-10195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0220-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00091.html" source="SUSE-SU"/>
    <description>
    The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10195/">CVE-2016-10195</cve>
	<bugzilla href="https://bugzilla.suse.com/1022917">SUSE bug 1022917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123122">SUSE bug 1123122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550441" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10196" ref_url="https://www.suse.com/security/cve/CVE-2016-10196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0220-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00091.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10196/">CVE-2016-10196</cve>
	<bugzilla href="https://bugzilla.suse.com/1022918">SUSE bug 1022918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550441" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10197" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10197" ref_url="https://www.suse.com/security/cve/CVE-2016-10197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0220-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00091.html" source="SUSE-SU"/>
    <description>
    The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10197/">CVE-2016-10197</cve>
	<bugzilla href="https://bugzilla.suse.com/1022919">SUSE bug 1022919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075618">SUSE bug 1075618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123122">SUSE bug 1123122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550441" comment="libevent-2_0-5-2.0.21-6.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The gst_aac_parse_sink_setcaps function in gst/audioparsers/gstaacparse.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024014">SUSE bug 1024014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550143" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted tag value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024017">SUSE bug 1024017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550143" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10200" ref_url="https://www.suse.com/security/cve/CVE-2016-10200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10200/">CVE-2016-10200</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028415">SUSE bug 1028415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10207" ref_url="https://www.suse.com/security/cve/CVE-2016-10207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00020.html" source="SUSE-SU"/>
    <description>
    The Xvnc server in TigerVNC allows remote attackers to cause a denial of service (invalid memory access and crash) by terminating a TLS handshake early.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10207/">CVE-2016-10207</cve>
	<bugzilla href="https://bugzilla.suse.com/1023012">SUSE bug 1023012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550018" comment="libXvnc1-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550019" comment="tigervnc-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550020" comment="xorg-x11-Xvnc-1.6.0-16.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10208" ref_url="https://www.suse.com/security/cve/CVE-2016-10208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10208/">CVE-2016-10208</cve>
	<bugzilla href="https://bugzilla.suse.com/1023377">SUSE bug 1023377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10209" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10209" ref_url="https://www.suse.com/security/cve/CVE-2016-10209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    The archive_wstring_append_from_mbs function in archive_string.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10209/">CVE-2016-10209</cve>
	<bugzilla href="https://bugzilla.suse.com/1032089">SUSE bug 1032089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10214" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virgl_resource_attach_backing function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214</cve>
	<bugzilla href="https://bugzilla.suse.com/1024244">SUSE bug 1024244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10217" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10217" ref_url="https://www.suse.com/security/cve/CVE-2016-10217" source="SUSE CVE"/>
    <description>
    The pdf14_open function in base/gdevp14.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file that is mishandled in the color management module.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10217/">CVE-2016-10217</cve>
	<bugzilla href="https://bugzilla.suse.com/1032130">SUSE bug 1032130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10218" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10218" ref_url="https://www.suse.com/security/cve/CVE-2016-10218" source="SUSE CVE"/>
    <description>
    The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10218/">CVE-2016-10218</cve>
	<bugzilla href="https://bugzilla.suse.com/1032135">SUSE bug 1032135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10219" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The intersect function in base/gxfill.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<bugzilla href="https://bugzilla.suse.com/1032138">SUSE bug 1032138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10220" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The gs_makewordimagedevice function in base/gsdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file that is mishandled in the PDF Transparency module.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<bugzilla href="https://bugzilla.suse.com/1032120">SUSE bug 1032120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550292" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550293" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009781.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1560-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LDTHO3OJZ2XD7I3ONIRIUSKEMP42OY2/" source="SUSE-SU"/>
    <description>
    The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228</cve>
	<bugzilla href="https://bugzilla.suse.com/1027496">SUSE bug 1027496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334045" comment="glibc is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10243" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243" source="SUSE CVE"/>
    <description>
    TeX Live allows remote attackers to execute arbitrary commands by leveraging inclusion of mpost in shell_escape_commands in the texmf.cnf config file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243</cve>
	<bugzilla href="https://bugzilla.suse.com/1028271">SUSE bug 1028271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334486" comment="texlive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10244" ref_url="https://www.suse.com/security/cve/CVE-2016-10244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00016.html" source="SUSE-SU"/>
    <description>
    The parse_charstrings function in type1/t1load.c in FreeType 2 before 2.7 does not ensure that a font contains a glyph name, which allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10244/">CVE-2016-10244</cve>
	<bugzilla href="https://bugzilla.suse.com/1028103">SUSE bug 1028103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550672" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550673" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550674" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10251" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the jpc_pi_nextcprl function in jpc_t2cod.c in JasPer before 1.900.20 allows remote attackers to have unspecified impact via a crafted file, which triggers use of an uninitialized value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<bugzilla href="https://bugzilla.suse.com/1029497">SUSE bug 1029497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550117" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547958" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10254" ref_url="https://www.suse.com/security/cve/CVE-2016-10254" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
    <description>
    The allocate_elf function in common.h in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted ELF file, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10254/">CVE-2016-10254</cve>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334529" comment="elfutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10255" ref_url="https://www.suse.com/security/cve/CVE-2016-10255" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
    <description>
    The __libelf_set_rawdata_wrlock function in elf_getdata.c in elfutils before 0.168 allows remote attackers to cause a denial of service (crash) via a crafted (1) sh_off or (2) sh_size ELF header value, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10255/">CVE-2016-10255</cve>
	<bugzilla href="https://bugzilla.suse.com/1030472">SUSE bug 1030472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030476">SUSE bug 1030476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334529" comment="elfutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10266" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031263">SUSE bug 1031263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550164" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547997" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550165" comment="tiff-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10267" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<bugzilla href="https://bugzilla.suse.com/1017694">SUSE bug 1017694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031262">SUSE bug 1031262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550164" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547997" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550165" comment="tiff-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10268" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031255">SUSE bug 1031255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550164" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547997" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550165" comment="tiff-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10269" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6 and 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031254">SUSE bug 1031254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550164" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547997" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550165" comment="tiff-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10270" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<bugzilla href="https://bugzilla.suse.com/1031250">SUSE bug 1031250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550164" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547997" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550165" comment="tiff-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10271" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 1" and libtiff/tif_fax3.c:413:13.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<bugzilla href="https://bugzilla.suse.com/1031249">SUSE bug 1031249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550164" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547997" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550165" comment="tiff-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10272" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00032.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "WRITE of size 2048" and libtiff/tif_next.c:64:9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<bugzilla href="https://bugzilla.suse.com/1031247">SUSE bug 1031247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550164" comment="libtiff5-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547997" comment="libtiff5-32bit-4.0.7-43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550165" comment="tiff-4.0.7-43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10317" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The fill_threshhold_buffer function in base/gxht_thresh.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317</cve>
	<bugzilla href="https://bugzilla.suse.com/1032230">SUSE bug 1032230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10349" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10349" ref_url="https://www.suse.com/security/cve/CVE-2016-10349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    The archive_le32dec function in archive_endian.h in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10349/">CVE-2016-10349</cve>
	<bugzilla href="https://bugzilla.suse.com/1037008">SUSE bug 1037008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10350" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10350" ref_url="https://www.suse.com/security/cve/CVE-2016-10350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    The archive_read_format_cab_read_header function in archive_read_support_format_cab.c in libarchive 3.2.2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10350/">CVE-2016-10350</cve>
	<bugzilla href="https://bugzilla.suse.com/1037009">SUSE bug 1037009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10371" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The TIFFWriteDirectoryTagCheckedRational function in tif_dirwrite.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371</cve>
	<bugzilla href="https://bugzilla.suse.com/1038438">SUSE bug 1038438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10396" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0434-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00041.html" source="SUSE-SU"/>
    <description>
    The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396</cve>
	<bugzilla href="https://bugzilla.suse.com/1047443">SUSE bug 1047443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550675" comment="ipsec-tools-0.8.0-19.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10504" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10504" ref_url="https://www.suse.com/security/cve/CVE-2016-10504" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow vulnerability in the opj_mqc_byteout function in mqc.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (application crash) via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10504/">CVE-2016-10504</cve>
	<bugzilla href="https://bugzilla.suse.com/1056351">SUSE bug 1056351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179594">SUSE bug 1179594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10505" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10505" ref_url="https://www.suse.com/security/cve/CVE-2016-10505" source="SUSE CVE"/>
    <description>
    NULL pointer dereference vulnerabilities in the imagetopnm function in convert.c, sycc444_to_rgb function in color.c, color_esycc_to_rgb function in color.c, and sycc422_to_rgb function in color.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10505/">CVE-2016-10505</cve>
	<bugzilla href="https://bugzilla.suse.com/1056363">SUSE bug 1056363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10506" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10506" ref_url="https://www.suse.com/security/cve/CVE-2016-10506" source="SUSE CVE"/>
    <description>
    Division-by-zero vulnerabilities in the functions opj_pi_next_cprl, opj_pi_next_pcrl, and opj_pi_next_rpcl in pi.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10506/">CVE-2016-10506</cve>
	<bugzilla href="https://bugzilla.suse.com/1056396">SUSE bug 1056396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10507" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10507" ref_url="https://www.suse.com/security/cve/CVE-2016-10507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow vulnerability in the bmp24toimage function in convertbmp.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10507/">CVE-2016-10507</cve>
	<bugzilla href="https://bugzilla.suse.com/1056421">SUSE bug 1056421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549670" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10708" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10708" ref_url="https://www.suse.com/security/cve/CVE-2016-10708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2530-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00045.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10708/">CVE-2016-10708</cve>
	<bugzilla href="https://bugzilla.suse.com/1076957">SUSE bug 1076957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334176" comment="openssh is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530211" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530212" comment="openssh-askpass-gnome-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530213" comment="openssh-fips-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530214" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550507" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550508" comment="openssh-askpass-gnome-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550509" comment="openssh-fips-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550510" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594486" comment="openssh-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594487" comment="openssh-askpass-gnome-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594488" comment="openssh-fips-7.2p2-74.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594489" comment="openssh-helpers-7.2p2-74.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713</cve>
	<bugzilla href="https://bugzilla.suse.com/1080918">SUSE bug 1080918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334312" comment="patch is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10714" ref_url="https://www.suse.com/security/cve/CVE-2016-10714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10714/">CVE-2016-10714</cve>
	<bugzilla href="https://bugzilla.suse.com/1083250">SUSE bug 1083250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334085" comment="zsh is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10745</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10745" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745</cve>
	<bugzilla href="https://bugzilla.suse.com/1132174">SUSE bug 1132174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530065" comment="python-Jinja2-2.8-22.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10905" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10905" ref_url="https://www.suse.com/security/cve/CVE-2016-10905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10905/">CVE-2016-10905</cve>
	<bugzilla href="https://bugzilla.suse.com/1146312">SUSE bug 1146312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671786" comment="kernel-default-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671787" comment="kernel-default-base-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671788" comment="kernel-default-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671789" comment="kernel-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671790" comment="kernel-macros-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671791" comment="kernel-source-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671792" comment="kernel-syms-4.4.121-92.169.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10906" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906</cve>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1181</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1181" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1181" ref_url="https://www.suse.com/security/cve/CVE-2016-1181" source="SUSE CVE"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021937" ref_url="https://www.suse.com/support/kb/doc/?id=7021937" source="SUSE-SU"/>
    <description>
    ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1181/">CVE-2016-1181</cve>
	<bugzilla href="https://bugzilla.suse.com/983684">SUSE bug 983684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983728">SUSE bug 983728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1182</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1182" ref_url="https://www.suse.com/security/cve/CVE-2016-1182" source="SUSE CVE"/>
		<reference ref_id="TID7018709" ref_url="https://www.suse.com/support/kb/doc/?id=7018709" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021937" ref_url="https://www.suse.com/support/kb/doc/?id=7021937" source="SUSE-SU"/>
    <description>
    ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1182/">CVE-2016-1182</cve>
	<bugzilla href="https://bugzilla.suse.com/983684">SUSE bug 983684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1779-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988770">SUSE bug 988770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988782">SUSE bug 988782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989127">SUSE bug 989127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1237" ref_url="https://www.suse.com/security/cve/CVE-2016-1237" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1237/">CVE-2016-1237</cve>
	<bugzilla href="https://bugzilla.suse.com/986570">SUSE bug 986570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2011-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192011-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<bugzilla href="https://bugzilla.suse.com/1108749">SUSE bug 1108749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123389">SUSE bug 1123389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1245" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2569-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00061.html" source="SUSE-SU"/>
    <description>
    It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245</cve>
	<bugzilla href="https://bugzilla.suse.com/1005258">SUSE bug 1005258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549579" comment="libfpm_pb0-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549580" comment="libospf0-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549581" comment="libospfapiclient0-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549582" comment="libquagga_pb0-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549583" comment="libzebra1-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549584" comment="quagga-1.1.1-17.3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1246" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00127.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246</cve>
	<bugzilla href="https://bugzilla.suse.com/1002626">SUSE bug 1002626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550177" comment="perl-DBD-mysql-4.021-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1248" ref_url="https://www.suse.com/security/cve/CVE-2016-1248" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2942-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00007.html" source="SUSE-SU"/>
    <description>
    vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1248/">CVE-2016-1248</cve>
	<bugzilla href="https://bugzilla.suse.com/1010685">SUSE bug 1010685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173534">SUSE bug 1173534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549209" comment="gvim-7.4.326-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549210" comment="vim-7.4.326-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516672" comment="vim-data-7.4.326-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1249" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00127.html" source="SUSE-SU"/>
    <description>
    The DBD::mysql module before 4.039 for Perl, when using server-side prepared statement support, allows attackers to cause a denial of service (out-of-bounds read) via vectors involving an unaligned number of placeholders in WHERE condition and output fields in SELECT expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249</cve>
	<bugzilla href="https://bugzilla.suse.com/1010457">SUSE bug 1010457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550177" comment="perl-DBD-mysql-4.021-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1251" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00127.html" source="SUSE-SU"/>
    <description>
    There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251</cve>
	<bugzilla href="https://bugzilla.suse.com/1012546">SUSE bug 1012546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550177" comment="perl-DBD-mysql-4.021-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1255" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1255" ref_url="https://www.suse.com/security/cve/CVE-2016-1255" source="SUSE CVE"/>
    <description>
    The pg_ctlcluster script in postgresql-common package in Debian wheezy before 134wheezy5, in Debian jessie before 165+deb8u2, in Debian unstable before 178, in Ubuntu 12.04 LTS before 129ubuntu1.2, in Ubuntu 14.04 LTS before 154ubuntu1.1, in Ubuntu 16.04 LTS before 173ubuntu0.1, in Ubuntu 17.04 before 179ubuntu0.1, and in Ubuntu 17.10 before 184ubuntu1.1 allows local users to gain root privileges via a symlink attack on a logfile in /var/log/postgresql.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1255/">CVE-2016-1255</cve>
	<bugzilla href="https://bugzilla.suse.com/1016745">SUSE bug 1016745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'&lt;((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<bugzilla href="https://bugzilla.suse.com/960837">SUSE bug 960837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<bugzilla href="https://bugzilla.suse.com/970072">SUSE bug 970072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00084.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<bugzilla href="https://bugzilla.suse.com/970073">SUSE bug 970073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981200">SUSE bug 981200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1372" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1372" ref_url="https://www.suse.com/security/cve/CVE-2016-1372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00040.html" source="SUSE-SU"/>
    <description>
    ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted 7z file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1372/">CVE-2016-1372</cve>
	<bugzilla href="https://bugzilla.suse.com/984650">SUSE bug 984650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550716" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html" source="SUSE-SU"/>
    <description>
    The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009124729" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124730" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1523" ref_url="https://www.suse.com/security/cve/CVE-2016-1523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html" source="SUSE-SU"/>
    <description>
    The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1523/">CVE-2016-1523</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967087">SUSE bug 967087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124729" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124730" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1526" ref_url="https://www.suse.com/security/cve/CVE-2016-1526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html" source="SUSE-SU"/>
    <description>
    The TtfUtil:LocaLookup function in TtfUtil.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, incorrectly validates a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1526/">CVE-2016-1526</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966438">SUSE bug 966438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009124729" comment="libgraphite2-3-1.3.1-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124730" comment="libgraphite2-3-32bit-1.3.1-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1463-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1663-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00090.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<bugzilla href="https://bugzilla.suse.com/979005">SUSE bug 979005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1544" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00029.html" source="SUSE-SU"/>
    <description>
    nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140889" comment="libnghttp2-14-1.7.1-1.84 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552180" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596437" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1546" ref_url="https://www.suse.com/security/cve/CVE-2016-1546" source="SUSE CVE"/>
    <description>
    The Apache HTTP Server 2.4.17 and 2.4.18, when mod_http2 is enabled, does not limit the number of simultaneous stream workers for a single HTTP/2 connection, which allows remote attackers to cause a denial of service (stream-processing outage) via modified flow-control windows.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1546/">CVE-2016-1546</cve>
	<bugzilla href="https://bugzilla.suse.com/980370">SUSE bug 980370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-&gt;dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977451">SUSE bug 977451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548186" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548187" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594428" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594429" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977464">SUSE bug 977464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977450">SUSE bug 977450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1567" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1567" ref_url="https://www.suse.com/security/cve/CVE-2016-1567" source="SUSE CVE"/>
    <description>
    chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1567/">CVE-2016-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140487" comment="chrony-2.3-3.110 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001837.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0302-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00004.html" source="SUSE-SU"/>
    <description>
    mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<bugzilla href="https://bugzilla.suse.com/962052">SUSE bug 962052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009121566" comment="ecryptfs-utils-103-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009121567" comment="ecryptfs-utils-32bit-103-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="TID7017678" ref_url="https://www.suse.com/support/kb/doc/?id=7017678" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983144">SUSE bug 983144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1601" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00007.html" source="SUSE-SU"/>
    <description>
    yast2-users before 3.1.47, as used in SUSE Linux Enterprise 12 SP1, does not properly set empty password fields in /etc/shadow during an AutoYaST installation when the profile does not contain inst-sys users, which might allow attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601</cve>
	<bugzilla href="https://bugzilla.suse.com/973639">SUSE bug 973639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974220">SUSE bug 974220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141177" comment="yast2-users-3.1.57-16.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1602" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1602" ref_url="https://www.suse.com/security/cve/CVE-2016-1602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002102.html" source="SUSE-SU"/>
    <description>
    A code injection in the supportconfig data collection tool in supportutils in SUSE Linux Enterprise Server 12 and 12-SP1 and SUSE Linux Enterprise Desktop 12 and 12-SP1 could be used by local attackers to execute code as the user running supportconfig (usually root).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1602/">CVE-2016-1602</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980670">SUSE bug 980670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141131" comment="supportutils-3.0-85.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1667</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1667" ref_url="https://www.suse.com/security/cve/CVE-2016-1667" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" source="SUSE-SU"/>
    <description>
    The TreeScope::adoptIfNeeded function in WebKit/Source/core/dom/TreeScope.cpp in the DOM implementation in Blink, as used in Google Chrome before 50.0.2661.102, does not prevent script execution during node-adoption operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1667/">CVE-2016-1667</cve>
	<bugzilla href="https://bugzilla.suse.com/979859">SUSE bug 979859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1668</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1668" ref_url="https://www.suse.com/security/cve/CVE-2016-1668" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" source="SUSE-SU"/>
    <description>
    The forEachForBinding function in WebKit/Source/bindings/core/v8/Iterable.h in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.102, uses an improper creation context, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1668/">CVE-2016-1668</cve>
	<bugzilla href="https://bugzilla.suse.com/979859">SUSE bug 979859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1669</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1669" ref_url="https://www.suse.com/security/cve/CVE-2016-1669" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1834-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
    <description>
    The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1669/">CVE-2016-1669</cve>
	<bugzilla href="https://bugzilla.suse.com/979859">SUSE bug 979859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987919">SUSE bug 987919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1670</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1670" ref_url="https://www.suse.com/security/cve/CVE-2016-1670" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1670/">CVE-2016-1670</cve>
	<bugzilla href="https://bugzilla.suse.com/979859">SUSE bug 979859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1671</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1671" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1671" ref_url="https://www.suse.com/security/cve/CVE-2016-1671" source="SUSE CVE"/>
    <description>
    Google Chrome before 50.0.2661.102 on Android mishandles / (slash) and \ (backslash) characters, which allows attackers to conduct directory traversal attacks via a file: URL, related to net/base/escape.cc and net/base/filename_util.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1671/">CVE-2016-1671</cve>
	<bugzilla href="https://bugzilla.suse.com/979859">SUSE bug 979859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<bugzilla href="https://bugzilla.suse.com/1174862">SUSE bug 1174862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981110">SUSE bug 981110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
    <description>
    The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550312" comment="libxml2-2-2.9.4-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550313" comment="libxml2-2-32bit-2.9.4-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532986" comment="libxml2-doc-2.9.4-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550314" comment="libxml2-tools-2.9.4-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550315" comment="python-libxml2-2.9.4-36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1856" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856" source="SUSE CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1854, CVE-2016-1855, and CVE-2016-1857.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1857" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857" source="SUSE CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1854, CVE-2016-1855, and CVE-2016-1856.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0217-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_pi_nextcprl function in JasPer 1.900.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961886">SUSE bug 961886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1908" ref_url="https://www.suse.com/security/cve/CVE-2016-1908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1455-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00132.html" source="SUSE-SU"/>
    <description>
    The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1908/">CVE-2016-1908</cve>
	<bugzilla href="https://bugzilla.suse.com/1001712">SUSE bug 1001712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005738">SUSE bug 1005738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962313">SUSE bug 962313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962321">SUSE bug 962321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1924" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1924" ref_url="https://www.suse.com/security/cve/CVE-2016-1924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
    <description>
    The opj_tgt_reset function in OpenJpeg 2016.1.18 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1924/">CVE-2016-1924</cve>
	<bugzilla href="https://bugzilla.suse.com/962522">SUSE bug 962522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963632">SUSE bug 963632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1931" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931</cve>
	<bugzilla href="https://bugzilla.suse.com/963633">SUSE bug 963633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0488-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00105.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<bugzilla href="https://bugzilla.suse.com/963520">SUSE bug 963520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963635">SUSE bug 963635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0334-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<bugzilla href="https://bugzilla.suse.com/963731">SUSE bug 963731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970257">SUSE bug 970257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970377">SUSE bug 970377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970378">SUSE bug 970378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970379">SUSE bug 970379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970380">SUSE bug 970380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970381">SUSE bug 970381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970431">SUSE bug 970431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970433">SUSE bug 970433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550209" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550210" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1953" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
    <description>
    The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1978" ref_url="https://www.suse.com/security/cve/CVE-2016-1978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the ssl3_HandleECDHServerKeyExchange function in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact by making an SSL (1) DHE or (2) ECDHE handshake at a time of high memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1978/">CVE-2016-1978</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009129282" comment="libfreebl3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129283" comment="libfreebl3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129312" comment="libfreebl3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129313" comment="libfreebl3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129284" comment="libsoftokn3-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129285" comment="libsoftokn3-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129314" comment="libsoftokn3-hmac-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129315" comment="libsoftokn3-hmac-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129288" comment="mozilla-nss-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129289" comment="mozilla-nss-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129290" comment="mozilla-nss-certs-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129291" comment="mozilla-nss-certs-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129292" comment="mozilla-nss-sysinit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129293" comment="mozilla-nss-sysinit-32bit-3.21.1-46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009129294" comment="mozilla-nss-tools-3.21.1-46.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0389-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00026.html" source="SUSE-SU"/>
    <description>
    The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<bugzilla href="https://bugzilla.suse.com/1028410">SUSE bug 1028410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549825" comment="cpio-2.11-32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517073" comment="cpio-lang-2.11-32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1686-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html" source="SUSE-SU"/>
    <description>
    The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<bugzilla href="https://bugzilla.suse.com/963806">SUSE bug 963806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980904">SUSE bug 980904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2089" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0408-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-02/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jas_matrix_clip function in jas_seq.c in JasPer 1.900.1 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted JPEG 2000 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963983">SUSE bug 963983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2098</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2098" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2098" ref_url="https://www.suse.com/security/cve/CVE-2016-2098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0867-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003293.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html" source="SUSE-SU"/>
    <description>
    Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2098/">CVE-2016-2098</cve>
	<bugzilla href="https://bugzilla.suse.com/968849">SUSE bug 968849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969943">SUSE bug 969943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993313">SUSE bug 993313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594289" comment="ruby2.1-rubygem-actionmailer-4_2-4.2.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594290" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594291" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594292" comment="ruby2.1-rubygem-activejob-4_2-4.2.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594293" comment="ruby2.1-rubygem-activemodel-4_2-4.2.9-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594294" comment="ruby2.1-rubygem-activerecord-4_2-4.2.9-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594295" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594296" comment="ruby2.1-rubygem-rails-4_2-4.2.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594297" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594298" comment="ruby2.1-rubygem-railties-4_2-4.2.9-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2099" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1744-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1808-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099</cve>
	<bugzilla href="https://bugzilla.suse.com/979208">SUSE bug 979208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989902">SUSE bug 989902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="TID7017793" ref_url="https://www.suse.com/support/kb/doc/?id=7017793" source="SUSE-SU"/>
		<reference ref_id="TID7017881" ref_url="https://www.suse.com/support/kb/doc/?id=7017881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html" source="SUSE-SU"/>
    <description>
    The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html" source="SUSE-SU"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<bugzilla href="https://bugzilla.suse.com/1015243">SUSE bug 1015243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1440-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html" source="SUSE-SU"/>
    <description>
    The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<bugzilla href="https://bugzilla.suse.com/1009711">SUSE bug 1009711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<bugzilla href="https://bugzilla.suse.com/973032">SUSE bug 973032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<bugzilla href="https://bugzilla.suse.com/973031">SUSE bug 973031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973033">SUSE bug 973033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973034">SUSE bug 973034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<bugzilla href="https://bugzilla.suse.com/973036">SUSE bug 973036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968373">SUSE bug 968373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2117" ref_url="https://www.suse.com/security/cve/CVE-2016-2117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2117/">CVE-2016-2117</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968697">SUSE bug 968697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="TID7017473" ref_url="https://www.suse.com/support/kb/doc?id=7017473" source="SUSE-SU"/>
		<reference ref_id="TID7017482" ref_url="https://www.suse.com/support/kb/doc/?id=7017482" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html" source="SUSE-SU"/>
    <description>
    The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<bugzilla href="https://bugzilla.suse.com/971965">SUSE bug 971965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975276">SUSE bug 975276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977416">SUSE bug 977416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1830-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2371-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00086.html" source="SUSE-SU"/>
    <description>
    libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<bugzilla href="https://bugzilla.suse.com/986869">SUSE bug 986869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131768" comment="libdcerpc-atsvc0-4.2.4-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140794" comment="libdcerpc-binding0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140795" comment="libdcerpc-binding0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140796" comment="libdcerpc0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140797" comment="libdcerpc0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140798" comment="libndr-krb5pac0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140799" comment="libndr-krb5pac0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140800" comment="libndr-nbt0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140801" comment="libndr-nbt0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140802" comment="libndr-standard0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140803" comment="libndr-standard0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140804" comment="libndr0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140805" comment="libndr0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140806" comment="libnetapi0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140807" comment="libnetapi0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140808" comment="libsamba-credentials0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140809" comment="libsamba-credentials0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140810" comment="libsamba-errors0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140811" comment="libsamba-errors0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140812" comment="libsamba-hostconfig0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140813" comment="libsamba-hostconfig0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140814" comment="libsamba-passdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140815" comment="libsamba-passdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140816" comment="libsamba-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140817" comment="libsamba-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140818" comment="libsamdb0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140819" comment="libsamdb0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140820" comment="libsmbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140821" comment="libsmbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140822" comment="libsmbconf0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140823" comment="libsmbconf0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140824" comment="libsmbldap0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140825" comment="libsmbldap0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140826" comment="libtevent-util0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140827" comment="libtevent-util0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140828" comment="libwbclient0-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140829" comment="libwbclient0-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140830" comment="samba-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140831" comment="samba-client-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140832" comment="samba-client-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140833" comment="samba-doc-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140834" comment="samba-libs-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140835" comment="samba-libs-32bit-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140836" comment="samba-winbind-4.4.2-29.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140837" comment="samba-winbind-32bit-4.4.2-29.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2123" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00010.html" source="SUSE-SU"/>
    <description>
    A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<bugzilla href="https://bugzilla.suse.com/1014437">SUSE bug 1014437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549321" comment="libdcerpc-atsvc0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549278" comment="libdcerpc-binding0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549279" comment="libdcerpc-binding0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549280" comment="libdcerpc0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549281" comment="libdcerpc0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549282" comment="libndr-krb5pac0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549283" comment="libndr-krb5pac0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549284" comment="libndr-nbt0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549285" comment="libndr-nbt0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549286" comment="libndr-standard0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549287" comment="libndr-standard0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549288" comment="libndr0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549289" comment="libndr0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549290" comment="libnetapi0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549291" comment="libnetapi0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549292" comment="libsamba-credentials0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549293" comment="libsamba-credentials0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549294" comment="libsamba-errors0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549295" comment="libsamba-errors0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549296" comment="libsamba-hostconfig0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549297" comment="libsamba-hostconfig0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549298" comment="libsamba-passdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549299" comment="libsamba-passdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549300" comment="libsamba-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549301" comment="libsamba-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549302" comment="libsamdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549303" comment="libsamdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549304" comment="libsmbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549305" comment="libsmbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549306" comment="libsmbconf0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549307" comment="libsmbconf0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549308" comment="libsmbldap0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549309" comment="libsmbldap0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549310" comment="libtevent-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549311" comment="libtevent-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549312" comment="libwbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549313" comment="libwbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549314" comment="samba-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549315" comment="samba-client-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549316" comment="samba-client-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517588" comment="samba-doc-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549317" comment="samba-libs-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549318" comment="samba-libs-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549319" comment="samba-winbind-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549320" comment="samba-winbind-32bit-4.4.2-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6W4QSQCTUGSIZCTRT4FGJNMRLZDUZS6Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36K5HNX67LYX5XOVQRL3MSIC5YSJ5M5W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZU5FWTEOBTHR7WNP3HEICT3NJTBNV2V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYEHJEQQ7LEL2T775B7QLR3IFR6LJGLZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334028" comment="samba is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655206" comment="libdcerpc-binding0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655207" comment="libdcerpc-binding0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655208" comment="libdcerpc0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655209" comment="libdcerpc0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655210" comment="libndr-krb5pac0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655211" comment="libndr-krb5pac0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655212" comment="libndr-nbt0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655213" comment="libndr-nbt0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655214" comment="libndr-standard0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655215" comment="libndr-standard0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655216" comment="libndr0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655217" comment="libndr0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655218" comment="libnetapi0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655219" comment="libnetapi0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655220" comment="libsamba-credentials0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655221" comment="libsamba-credentials0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655222" comment="libsamba-errors0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655223" comment="libsamba-errors0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655224" comment="libsamba-hostconfig0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655225" comment="libsamba-hostconfig0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655226" comment="libsamba-passdb0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655227" comment="libsamba-passdb0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655228" comment="libsamba-util0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655229" comment="libsamba-util0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655230" comment="libsamdb0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655231" comment="libsamdb0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655232" comment="libsmbclient0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655233" comment="libsmbclient0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655234" comment="libsmbconf0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655235" comment="libsmbconf0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655236" comment="libsmbldap0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655237" comment="libsmbldap0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655238" comment="libtevent-util0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655239" comment="libtevent-util0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655240" comment="libwbclient0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655241" comment="libwbclient0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655242" comment="samba-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655243" comment="samba-client-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655244" comment="samba-client-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655245" comment="samba-doc-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655246" comment="samba-libs-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655247" comment="samba-libs-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655248" comment="samba-winbind-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655249" comment="samba-winbind-32bit-4.4.2-38.45.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00010.html" source="SUSE-SU"/>
    <description>
    It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<bugzilla href="https://bugzilla.suse.com/1014441">SUSE bug 1014441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549321" comment="libdcerpc-atsvc0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549278" comment="libdcerpc-binding0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549279" comment="libdcerpc-binding0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549280" comment="libdcerpc0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549281" comment="libdcerpc0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549282" comment="libndr-krb5pac0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549283" comment="libndr-krb5pac0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549284" comment="libndr-nbt0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549285" comment="libndr-nbt0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549286" comment="libndr-standard0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549287" comment="libndr-standard0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549288" comment="libndr0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549289" comment="libndr0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549290" comment="libnetapi0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549291" comment="libnetapi0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549292" comment="libsamba-credentials0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549293" comment="libsamba-credentials0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549294" comment="libsamba-errors0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549295" comment="libsamba-errors0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549296" comment="libsamba-hostconfig0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549297" comment="libsamba-hostconfig0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549298" comment="libsamba-passdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549299" comment="libsamba-passdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549300" comment="libsamba-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549301" comment="libsamba-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549302" comment="libsamdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549303" comment="libsamdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549304" comment="libsmbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549305" comment="libsmbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549306" comment="libsmbconf0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549307" comment="libsmbconf0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549308" comment="libsmbldap0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549309" comment="libsmbldap0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549310" comment="libtevent-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549311" comment="libtevent-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549312" comment="libwbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549313" comment="libwbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549314" comment="samba-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549315" comment="samba-client-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549316" comment="samba-client-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517588" comment="samba-doc-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549317" comment="samba-libs-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549318" comment="samba-libs-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549319" comment="samba-winbind-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549320" comment="samba-winbind-32bit-4.4.2-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0021-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00010.html" source="SUSE-SU"/>
    <description>
    Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<bugzilla href="https://bugzilla.suse.com/1014442">SUSE bug 1014442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549321" comment="libdcerpc-atsvc0-4.2.4-28.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549278" comment="libdcerpc-binding0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549279" comment="libdcerpc-binding0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549280" comment="libdcerpc0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549281" comment="libdcerpc0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549282" comment="libndr-krb5pac0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549283" comment="libndr-krb5pac0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549284" comment="libndr-nbt0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549285" comment="libndr-nbt0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549286" comment="libndr-standard0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549287" comment="libndr-standard0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549288" comment="libndr0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549289" comment="libndr0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549290" comment="libnetapi0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549291" comment="libnetapi0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549292" comment="libsamba-credentials0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549293" comment="libsamba-credentials0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549294" comment="libsamba-errors0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549295" comment="libsamba-errors0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549296" comment="libsamba-hostconfig0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549297" comment="libsamba-hostconfig0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549298" comment="libsamba-passdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549299" comment="libsamba-passdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549300" comment="libsamba-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549301" comment="libsamba-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549302" comment="libsamdb0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549303" comment="libsamdb0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549304" comment="libsmbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549305" comment="libsmbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549306" comment="libsmbconf0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549307" comment="libsmbconf0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549308" comment="libsmbldap0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549309" comment="libsmbldap0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549310" comment="libtevent-util0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549311" comment="libtevent-util0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549312" comment="libwbclient0-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549313" comment="libwbclient0-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549314" comment="samba-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549315" comment="samba-client-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549316" comment="samba-client-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517588" comment="samba-doc-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549317" comment="samba-libs-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549318" comment="samba-libs-32bit-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549319" comment="samba-winbind-4.4.2-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549320" comment="samba-winbind-32bit-4.4.2-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2143" ref_url="https://www.suse.com/security/cve/CVE-2016-2143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The fork implementation in the Linux kernel before 4.5 on s390 platforms mishandles the case of four page-table levels, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted application, related to arch/s390/include/asm/mmu_context.h and arch/s390/include/asm/pgalloc.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2143/">CVE-2016-2143</cve>
	<bugzilla href="https://bugzilla.suse.com/970504">SUSE bug 970504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993872">SUSE bug 993872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1725-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1726-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html" source="SUSE-SU"/>
    <description>
    SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140950" comment="libspice-server1-0.12.7-6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002741.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0903-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00120.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161</cve>
	<bugzilla href="https://bugzilla.suse.com/1016714">SUSE bug 1016714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033513">SUSE bug 1033513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550050" comment="apache2-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532772" comment="apache2-doc-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550051" comment="apache2-example-pages-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550052" comment="apache2-prefork-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550053" comment="apache2-utils-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550054" comment="apache2-worker-2.4.23-21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176" source="SUSE CVE"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
    <description>
    The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<bugzilla href="https://bugzilla.suse.com/978224">SUSE bug 978224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999075">SUSE bug 999075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983519">SUSE bug 983519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995959">SUSE bug 995959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017985" ref_url="https://www.suse.com/support/kb/doc/?id=7017985" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="TID7020150" ref_url="https://www.suse.com/support/kb/doc/?id=7020150" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034689">SUSE bug 1034689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171693">SUSE bug 1171693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545314" comment="java-1_7_1-ibm-1.7.1_sr4.1-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534345" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.1-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545315" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.1-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534348" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.1-34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547888" comment="java-1_8_0-ibm-1.8.0_sr4.1-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547889" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.1-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547890" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.1-26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2184" ref_url="https://www.suse.com/security/cve/CVE-2016-2184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2184/">CVE-2016-2184</cve>
	<bugzilla href="https://bugzilla.suse.com/971125">SUSE bug 971125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2185" ref_url="https://www.suse.com/security/cve/CVE-2016-2185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2185/">CVE-2016-2185</cve>
	<bugzilla href="https://bugzilla.suse.com/971124">SUSE bug 971124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2186" ref_url="https://www.suse.com/security/cve/CVE-2016-2186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2186/">CVE-2016-2186</cve>
	<bugzilla href="https://bugzilla.suse.com/970958">SUSE bug 970958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2188" ref_url="https://www.suse.com/security/cve/CVE-2016-2188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2188/">CVE-2016-2188</cve>
	<bugzilla href="https://bugzilla.suse.com/1067912">SUSE bug 1067912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132190">SUSE bug 1132190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970956">SUSE bug 970956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964415">SUSE bug 964415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    revision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315</cve>
	<bugzilla href="https://bugzilla.suse.com/971328">SUSE bug 971328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124820" comment="git-core-1.8.5.6-18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00011.html" source="SUSE-SU"/>
    <description>
    Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324</cve>
	<bugzilla href="https://bugzilla.suse.com/971328">SUSE bug 971328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124820" comment="git-core-1.8.5.6-18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2335" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1464-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1675-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1850-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00069.html" source="SUSE-SU"/>
    <description>
    The CInArchive::ReadFileItem method in Archive/Udf/UdfIn.cpp in 7zip 9.20 and 15.05 beta and p7zip allows remote attackers to cause a denial of service (out-of-bounds read) or execute arbitrary code via the PartitionRef field in the Long Allocation Descriptor in a UDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<bugzilla href="https://bugzilla.suse.com/979823">SUSE bug 979823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128891" comment="p7zip-9.20.1-6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2336" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2336" ref_url="https://www.suse.com/security/cve/CVE-2016-2336" source="SUSE CVE"/>
    <description>
    Type confusion exists in two methods of Ruby's WIN32OLE class, ole_invoke and ole_query_interface. Attacker passing different type of object than this assumed by developers can cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2336/">CVE-2016-2336</cve>
	<bugzilla href="https://bugzilla.suse.com/1018810">SUSE bug 1018810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2339" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2339" ref_url="https://www.suse.com/security/cve/CVE-2016-2339" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html" source="SUSE-SU"/>
    <description>
    An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2339/">CVE-2016-2339</cve>
	<bugzilla href="https://bugzilla.suse.com/1018808">SUSE bug 1018808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550168" comment="libruby2_1-2_1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550169" comment="ruby2.1-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550170" comment="ruby2.1-stdlib-2.1.9-15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334078" comment="ruby is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2342" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0863-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0888-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00117.html" source="SUSE-SU"/>
    <description>
    The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342</cve>
	<bugzilla href="https://bugzilla.suse.com/970952">SUSE bug 970952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128392" comment="quagga-0.99.22.1-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2381" ref_url="https://www.suse.com/security/cve/CVE-2016-2381" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0881-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00057.html" source="SUSE-SU"/>
    <description>
    Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2381/">CVE-2016-2381</cve>
	<bugzilla href="https://bugzilla.suse.com/967082">SUSE bug 967082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2383" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2383" ref_url="https://www.suse.com/security/cve/CVE-2016-2383" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
    <description>
    The adjust_branches function in kernel/bpf/verifier.c in the Linux kernel before 4.5 does not consider the delta in the backward-jump case, which allows local users to obtain sensitive information from kernel memory by creating a packet filter and then loading crafted BPF instructions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2383/">CVE-2016-2383</cve>
	<bugzilla href="https://bugzilla.suse.com/966684">SUSE bug 966684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384</cve>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967773">SUSE bug 967773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2390" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
    <description>
    The FwdState::connectedToPeer method in FwdState.cc in Squid before 3.5.14 and 4.0.x before 4.0.6 does not properly handle SSL handshake errors when built with the --with-openssl option, which allows remote attackers to cause a denial of service (application crash) via a plaintext HTTP message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390</cve>
	<bugzilla href="https://bugzilla.suse.com/967011">SUSE bug 967011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967090">SUSE bug 967090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2399" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0552-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00102.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the quicktime_read_pascal function in libquicktime 1.2.4 and earlier allows remote attackers to cause a denial of service or possibly have other unspecified impact via a crafted hdlr MP4 atom.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<bugzilla href="https://bugzilla.suse.com/1022805">SUSE bug 1022805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549494" comment="libquicktime0-1.2.4-14.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2512</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2512" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2512" ref_url="https://www.suse.com/security/cve/CVE-2016-2512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004226.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    The utils.http.is_safe_url function in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or possibly conduct cross-site scripting (XSS) attacks via a URL containing basic authentication, as demonstrated by http://mysite.example.com\@attacker.com.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2512/">CVE-2016-2512</cve>
	<bugzilla href="https://bugzilla.suse.com/967999">SUSE bug 967999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334688" comment="python-Django is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2513</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2513" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2513" ref_url="https://www.suse.com/security/cve/CVE-2016-2513" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    The password hasher in contrib/auth/hashers.py in Django before 1.8.10 and 1.9.x before 1.9.3 allows remote attackers to enumerate users via a timing attack involving login requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2513/">CVE-2016-2513</cve>
	<bugzilla href="https://bugzilla.suse.com/968000">SUSE bug 968000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977452">SUSE bug 977452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977455">SUSE bug 977455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977457">SUSE bug 977457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<bugzilla href="https://bugzilla.suse.com/959243">SUSE bug 959243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977446">SUSE bug 977446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977458">SUSE bug 977458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0660-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0661-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" source="SUSE-SU"/>
    <description>
    The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0660-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0661-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" source="SUSE-SU"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0660-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0661-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0660-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0661-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html" source="SUSE-SU"/>
    <description>
    The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<bugzilla href="https://bugzilla.suse.com/968565">SUSE bug 968565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2533</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2533" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2533" ref_url="https://www.suse.com/security/cve/CVE-2016-2533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006784.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2533/">CVE-2016-2533</cve>
	<bugzilla href="https://bugzilla.suse.com/967970">SUSE bug 967970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595130" comment="python-Pillow-2.8.1-4.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968004">SUSE bug 968004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2569" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569</cve>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2570" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML document, related to esi/CustomParser.cc and esi/CustomParser.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570</cve>
	<bugzilla href="https://bugzilla.suse.com/968392">SUSE bug 968392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968393">SUSE bug 968393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2571" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571</cve>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2572" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    http.cc in Squid 4.x before 4.0.7 relies on the HTTP status code after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572</cve>
	<bugzilla href="https://bugzilla.suse.com/968394">SUSE bug 968394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968395">SUSE bug 968395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2774" ref_url="https://www.suse.com/security/cve/CVE-2016-2774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1843-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html" source="SUSE-SU"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2774/">CVE-2016-2774</cve>
	<bugzilla href="https://bugzilla.suse.com/969820">SUSE bug 969820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130039" comment="dhcp-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130040" comment="dhcp-client-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130042" comment="dhcp-relay-4.3.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130043" comment="dhcp-server-4.3.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2775" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
    <description>
    ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<bugzilla href="https://bugzilla.suse.com/989528">SUSE bug 989528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550136" comment="bind-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550137" comment="bind-chrootenv-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532836" comment="bind-doc-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550138" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547968" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550139" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7018100" ref_url="https://www.suse.com/support/kb/doc/?id=7018100" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00030.html" source="SUSE-SU"/>
    <description>
    buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<bugzilla href="https://bugzilla.suse.com/1000362">SUSE bug 1000362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001595">SUSE bug 1001595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001597">SUSE bug 1001597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131135" comment="bind-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131947" comment="bind-chrootenv-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131948" comment="bind-doc-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131136" comment="bind-libs-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131137" comment="bind-libs-32bit-9.9.9P1-46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131138" comment="bind-utils-9.9.9P1-46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2782</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2782" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782</cve>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2805" ref_url="https://www.suse.com/security/cve/CVE-2016-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox ESR 38.x before 38.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2805/">CVE-2016-2805</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977374">SUSE bug 977374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977376">SUSE bug 977376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977386">SUSE bug 977386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1352-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<bugzilla href="https://bugzilla.suse.com/977333">SUSE bug 977333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977381">SUSE bug 977381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983638">SUSE bug 983638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983655">SUSE bug 983655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983653">SUSE bug 983653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983652">SUSE bug 983652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    The TSymbolTableLevel class in ANGLE, as used in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows, allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact by triggering use of a WebGL shader that writes to an array.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983651">SUSE bug 983651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2827" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2827" ref_url="https://www.suse.com/security/cve/CVE-2016-2827" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    The mozilla::net::IsValidReferrerPolicy function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a Content Security Policy (CSP) referrer directive with zero values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2827/">CVE-2016-2827</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983646">SUSE bug 983646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<bugzilla href="https://bugzilla.suse.com/983922">SUSE bug 983922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983632">SUSE bug 983632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983643">SUSE bug 983643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550209" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550210" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2835" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 on Linux make cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10, which allows remote attackers to cause a denial of service (application crash) via a crafted video.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
    <description>
    The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2847" ref_url="https://www.suse.com/security/cve/CVE-2016-2847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2847/">CVE-2016-2847</cve>
	<bugzilla href="https://bugzilla.suse.com/970948">SUSE bug 970948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974646">SUSE bug 974646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2851" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<bugzilla href="https://bugzilla.suse.com/969785">SUSE bug 969785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009124478" comment="libotr5-4.0.0-9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3070" ref_url="https://www.suse.com/security/cve/CVE-2016-3070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3070/">CVE-2016-3070</cve>
	<bugzilla href="https://bugzilla.suse.com/979215">SUSE bug 979215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1779-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3076</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3076" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3076" ref_url="https://www.suse.com/security/cve/CVE-2016-3076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005487.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 through 3.1.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3076/">CVE-2016-3076</cve>
	<bugzilla href="https://bugzilla.suse.com/973786">SUSE bug 973786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594745" comment="python-Pillow-2.8.1-4.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2252-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html" source="SUSE-SU"/>
    <description>
    The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092</cve>
	<bugzilla href="https://bugzilla.suse.com/1068865">SUSE bug 1068865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986359">SUSE bug 986359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141142" comment="tomcat-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141143" comment="tomcat-admin-webapps-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141144" comment="tomcat-docs-webapp-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141145" comment="tomcat-el-3_0-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141146" comment="tomcat-javadoc-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141147" comment="tomcat-jsp-2_3-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141148" comment="tomcat-lib-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141149" comment="tomcat-servlet-3_1-api-8.0.36-11.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141150" comment="tomcat-webapps-8.0.36-11.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3096</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3096" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3096" ref_url="https://www.suse.com/security/cve/CVE-2016-3096" source="SUSE CVE"/>
    <description>
    The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3096/">CVE-2016-3096</cve>
	<bugzilla href="https://bugzilla.suse.com/973546">SUSE bug 973546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334676" comment="ansible is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3099" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3099" ref_url="https://www.suse.com/security/cve/CVE-2016-3099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002292.html" source="SUSE-SU"/>
    <description>
    mod_ns in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to force the use of ciphers that were not intended to be enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3099/">CVE-2016-3099</cve>
	<bugzilla href="https://bugzilla.suse.com/973996">SUSE bug 973996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131934" comment="apache2-mod_nss-1.0.14-18.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="TID7022313" ref_url="https://www.suse.com/support/kb/doc/?id=7022313" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1455-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00132.html" source="SUSE-SU"/>
    <description>
    Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115</cve>
	<bugzilla href="https://bugzilla.suse.com/1005738">SUSE bug 1005738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059233">SUSE bug 1059233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992296">SUSE bug 992296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00055.html" source="SUSE-SU"/>
    <description>
    The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002222.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00035.html" source="SUSE-SU"/>
    <description>
    The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<bugzilla href="https://bugzilla.suse.com/991088">SUSE bug 991088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140703" comment="krb5-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140704" comment="krb5-32bit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140705" comment="krb5-client-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140706" comment="krb5-doc-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140707" comment="krb5-plugin-kdb-ldap-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140708" comment="krb5-plugin-preauth-otp-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140709" comment="krb5-plugin-preauth-pkinit-1.12.5-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140710" comment="krb5-server-1.12.5-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971793">SUSE bug 971793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986377">SUSE bug 986377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3135" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3135" ref_url="https://www.suse.com/security/cve/CVE-2016-3135" source="SUSE CVE"/>
    <description>
    Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3135/">CVE-2016-3135</cve>
	<bugzilla href="https://bugzilla.suse.com/970904">SUSE bug 970904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971794">SUSE bug 971794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3136" ref_url="https://www.suse.com/security/cve/CVE-2016-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3136/">CVE-2016-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/970955">SUSE bug 970955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3137" ref_url="https://www.suse.com/security/cve/CVE-2016-3137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3137/">CVE-2016-3137</cve>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3138" ref_url="https://www.suse.com/security/cve/CVE-2016-3138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3138/">CVE-2016-3138</cve>
	<bugzilla href="https://bugzilla.suse.com/970911">SUSE bug 970911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970970">SUSE bug 970970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3140" ref_url="https://www.suse.com/security/cve/CVE-2016-3140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3140/">CVE-2016-3140</cve>
	<bugzilla href="https://bugzilla.suse.com/970892">SUSE bug 970892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3156" ref_url="https://www.suse.com/security/cve/CVE-2016-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3156/">CVE-2016-3156</cve>
	<bugzilla href="https://bugzilla.suse.com/971360">SUSE bug 971360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3183" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3183" ref_url="https://www.suse.com/security/cve/CVE-2016-3183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
    <description>
    The sycc422_t_rgb function in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted jpeg2000 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3183/">CVE-2016-3183</cve>
	<bugzilla href="https://bugzilla.suse.com/971617">SUSE bug 971617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1103-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<bugzilla href="https://bugzilla.suse.com/973340">SUSE bug 973340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983268">SUSE bug 983268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1206-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00056.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521995" comment="bzip2-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521996" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521997" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548654" comment="bzip2-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548655" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548656" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595031" comment="bzip2-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530594" comment="bzip2-doc-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595032" comment="libbz2-1-1.0.6-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548656" comment="libbz2-1-32bit-1.0.6-30.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2035-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3099-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00076.html" source="SUSE-SU"/>
    <description>
    The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549262" comment="libpcre1-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544450" comment="libpcre1-32bit-8.39-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549263" comment="libpcre16-0-8.39-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3422" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect availability via vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3443" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D.  NOTE: the previous information is from the April 2016 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information via crafted font data, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3449" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<bugzilla href="https://bugzilla.suse.com/976340">SUSE bug 976340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979252">SUSE bug 979252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128388" comment="java-1_8_0-ibm-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128390" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128391" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; and Java SE Embedded 8u91 allows remote attackers to affect integrity via vectors related to CORBA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<bugzilla href="https://bugzilla.suse.com/989732">SUSE bug 989732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3461</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3461" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3461" ref_url="https://www.suse.com/security/cve/CVE-2016-3461" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Enterprise Monitor component in Oracle MySQL 3.0.25 and earlier and 3.1.2 and earlier allows remote administrators to affect confidentiality, integrity, and availability via vectors related to Monitoring: Server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-3461/">CVE-2016-3461</cve>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3473</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3473" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3473" ref_url="https://www.suse.com/security/cve/CVE-2016-3473" source="SUSE CVE"/>
    <description>
    Unspecified vulnerability in the BI Publisher (formerly XML Publisher) component in Oracle Fusion Middleware 11.1.1.7.0, 11.1.1.9.0, and 12.2.1.0.0 allows remote authenticated users to affect confidentiality via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3473/">CVE-2016-3473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2278-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<bugzilla href="https://bugzilla.suse.com/989913">SUSE bug 989913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3485" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2726-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows local users to affect integrity via vectors related to Networking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989734">SUSE bug 989734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<bugzilla href="https://bugzilla.suse.com/1005555">SUSE bug 1005555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549204" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547200" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549205" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549206" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549207" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549208" comment="mariadb-tools-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows remote attackers to affect availability via vectors related to JavaFX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<bugzilla href="https://bugzilla.suse.com/989729">SUSE bug 989729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3508.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<bugzilla href="https://bugzilla.suse.com/989730">SUSE bug 989730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3503" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<bugzilla href="https://bugzilla.suse.com/989728">SUSE bug 989728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3500.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<bugzilla href="https://bugzilla.suse.com/989731">SUSE bug 989731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3511" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2726-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989727">SUSE bug 989727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2278-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<bugzilla href="https://bugzilla.suse.com/989919">SUSE bug 989919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<bugzilla href="https://bugzilla.suse.com/989733">SUSE bug 989733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3552" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552</cve>
	<bugzilla href="https://bugzilla.suse.com/989726">SUSE bug 989726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3587" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00004.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587</cve>
	<bugzilla href="https://bugzilla.suse.com/989721">SUSE bug 989721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998845">SUSE bug 998845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2726-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989723">SUSE bug 989723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131658" comment="java-1_7_1-ibm-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131659" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131661" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131662" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.50-28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<bugzilla href="https://bugzilla.suse.com/989722">SUSE bug 989722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<bugzilla href="https://bugzilla.suse.com/989725">SUSE bug 989725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130960" comment="java-1_7_0-openjdk-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131900" comment="java-1_7_0-openjdk-demo-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131901" comment="java-1_7_0-openjdk-devel-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130961" comment="java-1_7_0-openjdk-headless-1.7.0.111-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130962" comment="java-1_8_0-openjdk-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131902" comment="java-1_8_0-openjdk-demo-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131903" comment="java-1_8_0-openjdk-devel-1.8.0.101-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130963" comment="java-1_8_0-openjdk-headless-1.8.0.101-14.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2278-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<bugzilla href="https://bugzilla.suse.com/989922">SUSE bug 989922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2526-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<bugzilla href="https://bugzilla.suse.com/974449">SUSE bug 974449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2275-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<bugzilla href="https://bugzilla.suse.com/974617">SUSE bug 974617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974618">SUSE bug 974618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1298-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
    <description>
    The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<bugzilla href="https://bugzilla.suse.com/1026099">SUSE bug 1026099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<bugzilla href="https://bugzilla.suse.com/974840">SUSE bug 974840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3672" ref_url="https://www.suse.com/security/cve/CVE-2016-3672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3672/">CVE-2016-3672</cve>
	<bugzilla href="https://bugzilla.suse.com/974308">SUSE bug 974308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3689" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3689" ref_url="https://www.suse.com/security/cve/CVE-2016-3689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3689/">CVE-2016-3689</cve>
	<bugzilla href="https://bugzilla.suse.com/971628">SUSE bug 971628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1779-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997423">SUSE bug 997423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3713" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3713" ref_url="https://www.suse.com/security/cve/CVE-2016-3713" source="SUSE CVE"/>
    <description>
    The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3713/">CVE-2016-3713</cve>
	<bugzilla href="https://bugzilla.suse.com/979715">SUSE bug 979715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="TID7017647" ref_url="https://www.suse.com/support/kb/doc/?id=7017647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html" source="SUSE-SU"/>
    <description>
    The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html" source="SUSE-SU"/>
    <description>
    The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
    <description>
    The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to move arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html" source="SUSE-SU"/>
    <description>
    The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html" source="SUSE-SU"/>
    <description>
    The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105592">SUSE bug 1105592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978061">SUSE bug 978061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
    <description>
    The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992569">SUSE bug 992569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2275-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<bugzilla href="https://bugzilla.suse.com/974614">SUSE bug 974614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3947" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Icmp6::Recv function in icmp/Icmp6.cc in the pinger utility in Squid before 3.5.16 and 4.x before 4.0.8 allows remote servers to cause a denial of service (performance degradation or transition failures) or write sensitive information to log files via an ICMPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947</cve>
	<bugzilla href="https://bugzilla.suse.com/973782">SUSE bug 973782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3948" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly perform bounds checking, which allows remote attackers to cause a denial of service via a crafted HTTP response, related to Vary headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948</cve>
	<bugzilla href="https://bugzilla.suse.com/973783">SUSE bug 973783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951</cve>
	<bugzilla href="https://bugzilla.suse.com/974418">SUSE bug 974418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3977" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010963.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1111-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1118-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-04/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1219-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00019.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009126715" comment="giflib-progs-5.0.5-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009126709" comment="libgif6-5.0.5-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009126710" comment="libgif6-32bit-5.0.5-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2275-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<bugzilla href="https://bugzilla.suse.com/975069">SUSE bug 975069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002326.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2275-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00048.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991</cve>
	<bugzilla href="https://bugzilla.suse.com/975070">SUSE bug 975070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4000</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4000" ref_url="https://www.suse.com/security/cve/CVE-2016-4000" source="SUSE CVE"/>
    <description>
    Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4000/">CVE-2016-4000</cve>
	<bugzilla href="https://bugzilla.suse.com/1044655">SUSE bug 1044655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1567-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html" source="SUSE-SU"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128901" comment="libtasn1-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128902" comment="libtasn1-6-3.7-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128903" comment="libtasn1-6-32bit-3.7-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4009</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4009" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4009" ref_url="https://www.suse.com/security/cve/CVE-2016-4009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006784.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4009/">CVE-2016-4009</cve>
	<bugzilla href="https://bugzilla.suse.com/975500">SUSE bug 975500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595130" comment="python-Pillow-2.8.1-4.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975907">SUSE bug 975907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4049" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00062.html" source="SUSE-SU"/>
    <description>
    The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049</cve>
	<bugzilla href="https://bugzilla.suse.com/977012">SUSE bug 977012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128392" comment="quagga-0.99.22.1-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4051" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002226.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in cachemgr.cgi in Squid 2.x, 3.x before 3.5.17, and 4.x before 4.0.9 might allow remote attackers to cause a denial of service or execute arbitrary code by seeding manager reports with crafted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051</cve>
	<bugzilla href="https://bugzilla.suse.com/976553">SUSE bug 976553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4052" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote HTTP servers to cause a denial of service or execute arbitrary code via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052</cve>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4053" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053</cve>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4054" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allows remote attackers to execute arbitrary code via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054</cve>
	<bugzilla href="https://bugzilla.suse.com/976556">SUSE bug 976556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4070</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00056.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not)."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070</cve>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4300" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<bugzilla href="https://bugzilla.suse.com/985832">SUSE bug 985832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4301" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the parse_device function in archive_read_support_format_mtree.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a crafted mtree file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<bugzilla href="https://bugzilla.suse.com/985826">SUSE bug 985826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4302" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4302" ref_url="https://www.suse.com/security/cve/CVE-2016-4302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4302/">CVE-2016-4302</cve>
	<bugzilla href="https://bugzilla.suse.com/985835">SUSE bug 985835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4425" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4425" ref_url="https://www.suse.com/security/cve/CVE-2016-4425" source="SUSE CVE"/>
    <description>
    Jansson 2.7 and earlier allows context-dependent attackers to cause a denial of service (deep recursion, stack consumption, and crash) via crafted JSON data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4425/">CVE-2016-4425</cve>
	<bugzilla href="https://bugzilla.suse.com/978163">SUSE bug 978163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338898" comment="libjansson is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1779-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140618" comment="glibc-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140619" comment="glibc-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140620" comment="glibc-devel-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140621" comment="glibc-devel-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140622" comment="glibc-html-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140623" comment="glibc-i18ndata-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140624" comment="glibc-info-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140625" comment="glibc-locale-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140626" comment="glibc-locale-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140627" comment="glibc-profile-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140628" comment="glibc-profile-32bit-2.22-49.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140629" comment="nscd-2.22-49.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<bugzilla href="https://bugzilla.suse.com/982223">SUSE bug 982223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<bugzilla href="https://bugzilla.suse.com/982222">SUSE bug 982222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4463" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1808-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2232-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<bugzilla href="https://bugzilla.suse.com/985860">SUSE bug 985860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131022" comment="libxerces-c-3_1-3.1.1-12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131023" comment="libxerces-c-3_1-32bit-3.1.1-12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4470" ref_url="https://www.suse.com/security/cve/CVE-2016-4470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4470/">CVE-2016-4470</cve>
	<bugzilla href="https://bugzilla.suse.com/984755">SUSE bug 984755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984764">SUSE bug 984764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
    <description>
    The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472</cve>
	<bugzilla href="https://bugzilla.suse.com/1034050">SUSE bug 1034050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531736" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549064" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549065" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549066" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549067" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549068" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596194" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596195" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596196" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596197" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596198" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482</cve>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978445">SUSE bug 978445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization.  NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141032" comment="libxml2-2-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141033" comment="libxml2-2-32bit-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141034" comment="libxml2-doc-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141035" comment="libxml2-tools-2.9.4-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141083" comment="python-libxml2-2.9.4-27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485</cve>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4486" ref_url="https://www.suse.com/security/cve/CVE-2016-4486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
    <description>
    The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4486/">CVE-2016-4486</cve>
	<bugzilla href="https://bugzilla.suse.com/978822">SUSE bug 978822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4553" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553</cve>
	<bugzilla href="https://bugzilla.suse.com/979009">SUSE bug 979009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990451">SUSE bug 990451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4554" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002226.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a "header smuggling" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554</cve>
	<bugzilla href="https://bugzilla.suse.com/979010">SUSE bug 979010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990451">SUSE bug 990451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4555" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555</cve>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4556" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556</cve>
	<bugzilla href="https://bugzilla.suse.com/979008">SUSE bug 979008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979011">SUSE bug 979011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141127" comment="squid-3.5.21-23.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4557" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4557" ref_url="https://www.suse.com/security/cve/CVE-2016-4557" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4557/">CVE-2016-4557</cve>
	<bugzilla href="https://bugzilla.suse.com/979018">SUSE bug 979018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979077">SUSE bug 979077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4558" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4558" ref_url="https://www.suse.com/security/cve/CVE-2016-4558" source="SUSE CVE"/>
    <description>
    The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4558/">CVE-2016-4558</cve>
	<bugzilla href="https://bugzilla.suse.com/979019">SUSE bug 979019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4562" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4562" ref_url="https://www.suse.com/security/cve/CVE-2016-4562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calculations of certain vertices integer data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4562/">CVE-2016-4562</cve>
	<bugzilla href="https://bugzilla.suse.com/983292">SUSE bug 983292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983309">SUSE bug 983309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4563" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4563" ref_url="https://www.suse.com/security/cve/CVE-2016-4563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles the relationship between the BezierQuantum value and certain strokes data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4563/">CVE-2016-4563</cve>
	<bugzilla href="https://bugzilla.suse.com/983305">SUSE bug 983305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4564" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4564" ref_url="https://www.suse.com/security/cve/CVE-2016-4564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DrawImage function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 makes an incorrect function call in attempting to locate the next token, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4564/">CVE-2016-4564</cve>
	<bugzilla href="https://bugzilla.suse.com/983308">SUSE bug 983308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569</cve>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1370-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<bugzilla href="https://bugzilla.suse.com/1135436">SUSE bug 1135436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4578" ref_url="https://www.suse.com/security/cve/CVE-2016-4578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4578/">CVE-2016-4578</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4579" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1525-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00028.html" source="SUSE-SU"/>
    <description>
    Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<bugzilla href="https://bugzilla.suse.com/1135436">SUSE bug 1135436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128468" comment="libksba8-1.3.0-23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4590" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590" source="SUSE CVE"/>
    <description>
    WebKit in Apple iOS before 9.3.3 and Safari before 9.1.2 mishandles about: URLs, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4591" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591" source="SUSE CVE"/>
    <description>
    WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 mishandles the location variable, which allows remote attackers to access the local filesystem via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4612</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4612" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4612" ref_url="https://www.suse.com/security/cve/CVE-2016-4612" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-1683.  Reason: This candidate is a reservation duplicate of CVE-2016-1683.  Notes: All CVE users should reference CVE-2016-1683 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4612/">CVE-2016-4612</cve>
	<bugzilla href="https://bugzilla.suse.com/1135231">SUSE bug 1135231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135233">SUSE bug 1135233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135235">SUSE bug 1135235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135238">SUSE bug 1135238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4619</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4619" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4619" ref_url="https://www.suse.com/security/cve/CVE-2016-4619" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2015-8317.  Reason: This candidate is a reservation duplicate of CVE-2015-8317.  Notes: All CVE users should reference CVE-2015-8317 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4619/">CVE-2016-4619</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4622" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622" source="SUSE CVE"/>
    <description>
    WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4589, CVE-2016-4623, and CVE-2016-4624.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624" source="SUSE CVE"/>
    <description>
    WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-4589, CVE-2016-4622, and CVE-2016-4623.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140865" comment="libjavascriptcoregtk-4_0-18-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140866" comment="libwebkit2gtk-4_0-37-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140867" comment="typelib-1_0-JavaScriptCore-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140868" comment="typelib-1_0-WebKit2-4_0-2.12.5-1.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140869" comment="webkit2gtk-4_0-injected-bundles-2.12.5-1.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2711-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html" source="SUSE-SU"/>
    <description>
    xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549888" comment="libxml2-2-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549889" comment="libxml2-2-32bit-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532625" comment="libxml2-doc-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549890" comment="libxml2-tools-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549891" comment="python-libxml2-2.9.4-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4692" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4738" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550224" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550225" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548046" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4743" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00014.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794</cve>
	<bugzilla href="https://bugzilla.suse.com/980265">SUSE bug 980265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981517">SUSE bug 981517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4797" ref_url="https://www.suse.com/security/cve/CVE-2016-4797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
    <description>
    Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. NOTE: this issue exists because of an incorrect fix for CVE-2014-7947.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-4797/">CVE-2016-4797</cve>
	<bugzilla href="https://bugzilla.suse.com/979911">SUSE bug 979911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980504">SUSE bug 980504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4804" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002225.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1461-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2233-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00014.html" source="SUSE-SU"/>
    <description>
    The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804</cve>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980377">SUSE bug 980377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131020" comment="dosfstools-3.0.26-6.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4805" ref_url="https://www.suse.com/security/cve/CVE-2016-4805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4805/">CVE-2016-4805</cve>
	<bugzilla href="https://bugzilla.suse.com/980371">SUSE bug 980371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4809" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1679-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00031.html" source="SUSE-SU"/>
    <description>
    The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<bugzilla href="https://bugzilla.suse.com/984990">SUSE bug 984990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130724" comment="libarchive13-3.1.2-22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003598.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2712-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00005.html" source="SUSE-SU"/>
    <description>
    The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a large number of crafted packets, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<bugzilla href="https://bugzilla.suse.com/1074356">SUSE bug 1074356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980722">SUSE bug 980722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550962" comment="openslp-2.0.0-18.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550963" comment="openslp-32bit-2.0.0-18.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550964" comment="openslp-server-2.0.0-18.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4913" ref_url="https://www.suse.com/security/cve/CVE-2016-4913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
    <description>
    The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4913/">CVE-2016-4913</cve>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980725">SUSE bug 980725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4951" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4951" ref_url="https://www.suse.com/security/cve/CVE-2016-4951" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
    <description>
    The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4951/">CVE-2016-4951</cve>
	<bugzilla href="https://bugzilla.suse.com/981058">SUSE bug 981058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985132">SUSE bug 985132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<bugzilla href="https://bugzilla.suse.com/981266">SUSE bug 981266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981276">SUSE bug 981276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<bugzilla href="https://bugzilla.suse.com/962784">SUSE bug 962784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982065">SUSE bug 982065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982066">SUSE bug 982066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982067">SUSE bug 982067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<bugzilla href="https://bugzilla.suse.com/977461">SUSE bug 977461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982068">SUSE bug 982068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1563-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00040.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<bugzilla href="https://bugzilla.suse.com/977459">SUSE bug 977459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982056">SUSE bug 982056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982064">SUSE bug 982064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128799" comment="ntp-4.2.8p8-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128800" comment="ntp-doc-4.2.8p8-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964" source="SUSE CVE"/>
    <description>
    The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s-&gt;state.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<bugzilla href="https://bugzilla.suse.com/981399">SUSE bug 981399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981401">SUSE bug 981401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2277-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00041.html" source="SUSE-SU"/>
    <description>
    GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<bugzilla href="https://bugzilla.suse.com/1023231">SUSE bug 1023231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984060">SUSE bug 984060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131037" comment="wget-1.14-10.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4975" ref_url="https://www.suse.com/security/cve/CVE-2016-4975" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2815-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00076.html" source="SUSE-SU"/>
    <description>
    Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-4975/">CVE-2016-4975</cve>
	<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530249" comment="apache2-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530251" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530252" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530253" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530254" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550538" comment="apache2-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550539" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550540" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550541" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550542" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594565" comment="apache2-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594566" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594567" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594568" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594569" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4979" ref_url="https://www.suse.com/security/cve/CVE-2016-4979" source="SUSE CVE"/>
    <description>
    The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4979/">CVE-2016-4979</cve>
	<bugzilla href="https://bugzilla.suse.com/987365">SUSE bug 987365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4983" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4983" ref_url="https://www.suse.com/security/cve/CVE-2016-4983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2876-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00096.html" source="SUSE-SU"/>
    <description>
    A postinstall script in the dovecot rpm allows local users to read the contents of newly created SSL/TLS key files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4983/">CVE-2016-4983</cve>
	<bugzilla href="https://bugzilla.suse.com/984639">SUSE bug 984639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549200" comment="dovecot22-2.2.13-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549201" comment="dovecot22-backend-mysql-2.2.13-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549202" comment="dovecot22-backend-pgsql-2.2.13-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549203" comment="dovecot22-backend-sqlite-2.2.13-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4997" ref_url="https://www.suse.com/security/cve/CVE-2016-4997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2659-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017773" ref_url="https://www.suse.com/support/kb/doc/?id=7017773" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4997/">CVE-2016-4997</cve>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986377">SUSE bug 986377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4998" ref_url="https://www.suse.com/security/cve/CVE-2016-4998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7017773" ref_url="https://www.suse.com/support/kb/doc/?id=7017773" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
    <description>
    The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4998/">CVE-2016-4998</cve>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5009" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5009" ref_url="https://www.suse.com/security/cve/CVE-2016-5009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3201-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00126.html" source="SUSE-SU"/>
    <description>
    The handle_command function in mon/Monitor.cc in Ceph allows remote authenticated users to cause a denial of service (segmentation fault and ceph monitor crash) via an (1) empty or (2) crafted prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5009/">CVE-2016-5009</cve>
	<bugzilla href="https://bugzilla.suse.com/987144">SUSE bug 987144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549826" comment="ceph-common-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549827" comment="libcephfs1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549828" comment="librados2-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549829" comment="libradosstriper1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549830" comment="librbd1-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549831" comment="python-cephfs-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549832" comment="python-rados-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549833" comment="python-rbd-10.2.4+git.1481215985.12b091b-16.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5010" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5010" ref_url="https://www.suse.com/security/cve/CVE-2016-5010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2148-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00100.html" source="SUSE-SU"/>
    <description>
    coders/tiff.c in ImageMagick before 6.9.5-3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5010/">CVE-2016-5010</cve>
	<bugzilla href="https://bugzilla.suse.com/991444">SUSE bug 991444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2840-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3102-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00078.html" source="SUSE-SU"/>
    <description>
    The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<bugzilla href="https://bugzilla.suse.com/988361">SUSE bug 988361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549217" comment="libblkid1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549218" comment="libblkid1-32bit-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549219" comment="libfdisk1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549220" comment="libmount1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549221" comment="libmount1-32bit-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549222" comment="libsmartcols1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549223" comment="libuuid1-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549224" comment="libuuid1-32bit-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549225" comment="python-libmount-2.28-42.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549226" comment="util-linux-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517525" comment="util-linux-lang-2.28-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549227" comment="util-linux-systemd-2.28-42.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549228" comment="uuidd-2.28-42.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5018" ref_url="https://www.suse.com/security/cve/CVE-2016-5018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00061.html" source="SUSE-SU"/>
    <description>
    In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5018/">CVE-2016-5018</cve>
	<bugzilla href="https://bugzilla.suse.com/1007855">SUSE bug 1007855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532091" comment="tomcat-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532092" comment="tomcat-admin-webapps-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532093" comment="tomcat-docs-webapp-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532094" comment="tomcat-el-3_0-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532095" comment="tomcat-javadoc-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532096" comment="tomcat-jsp-2_3-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532097" comment="tomcat-lib-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532098" comment="tomcat-servlet-3_1-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532099" comment="tomcat-webapps-8.0.36-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5104" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1526-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00029.html" source="SUSE-SU"/>
    <description>
    The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<bugzilla href="https://bugzilla.suse.com/982014">SUSE bug 982014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140847" comment="libimobiledevice6-1.2.0-7.31 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140975" comment="libusbmuxd4-1.0.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<bugzilla href="https://bugzilla.suse.com/982017">SUSE bug 982017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982024">SUSE bug 982024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<bugzilla href="https://bugzilla.suse.com/982018">SUSE bug 982018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982025">SUSE bug 982025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<bugzilla href="https://bugzilla.suse.com/982019">SUSE bug 982019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982026">SUSE bug 982026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1516-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
    <description>
    gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<bugzilla href="https://bugzilla.suse.com/982176">SUSE bug 982176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1610-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1522-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1653-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<bugzilla href="https://bugzilla.suse.com/1000484">SUSE bug 1000484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982178">SUSE bug 982178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982286">SUSE bug 982286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5131" ref_url="https://www.suse.com/security/cve/CVE-2016-5131" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1918-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5131/">CVE-2016-5131</cve>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989901">SUSE bug 989901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550651" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550652" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533151" comment="libxml2-doc-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550653" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550654" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002530.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2752-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0082-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00055.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<bugzilla href="https://bugzilla.suse.com/1007728">SUSE bug 1007728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549322" comment="libcares2-1.9.1-5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5195" ref_url="https://www.suse.com/security/cve/CVE-2016-5195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2585-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2592-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2596-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2657-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2659-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2673-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="TID7018178" ref_url="https://www.suse.com/support/kb/doc/?id=7018178" source="SUSE-SU"/>
		<reference ref_id="TID7018287" ref_url="https://www.suse.com/support/kb/doc/?id=7018287" source="SUSE-SU"/>
		<reference ref_id="TID7022455" ref_url="https://www.suse.com/support/kb/doc/?id=7022455" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" source="SUSE-SU"/>
    <description>
    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5195/">CVE-2016-5195</cve>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004419">SUSE bug 1004419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004436">SUSE bug 1004436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006323">SUSE bug 1006323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006695">SUSE bug 1006695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008110">SUSE bug 1008110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030118">SUSE bug 1030118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986445">SUSE bug 986445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998689">SUSE bug 998689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5200</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5200" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5200" ref_url="https://www.suse.com/security/cve/CVE-2016-5200" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00029.html" source="SUSE-SU"/>
    <description>
    V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5200/">CVE-2016-5200</cve>
	<bugzilla href="https://bugzilla.suse.com/1009893">SUSE bug 1009893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334390" comment="nodejs6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<bugzilla href="https://bugzilla.suse.com/982959">SUSE bug 982959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244</cve>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0, Firefox ESR &lt; 45.4 and Thunderbird &lt; 45.4 allow remote attackers to obtain sensitive information about the previously retrieved page via Resource Timing API calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5251" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5251" ref_url="https://www.suse.com/security/cve/CVE-2016-5251" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 allows remote attackers to spoof the location bar via crafted characters in the media type of a data: URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5251/">CVE-2016-5251</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5255" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5255" ref_url="https://www.suse.com/security/cve/CVE-2016-5255" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the js::PreliminaryObjectArray::sweep function in Mozilla Firefox before 48.0 allows remote attackers to execute arbitrary code via crafted JavaScript that is mishandled during incremental garbage collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5255/">CVE-2016-5255</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5256" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5256" ref_url="https://www.suse.com/security/cve/CVE-2016-5256" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5256/">CVE-2016-5256</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4 and Thunderbird &lt; 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the WebSocketChannel class in the WebSockets subsystem in Mozilla Firefox before 48.0 and Firefox ESR &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets that trigger incorrect buffer-resize operations during buffering.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox="allow-scripts" attribute value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    The nsDisplayList::HitTest function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 mishandles rendering display transformation, which allows remote attackers to execute arbitrary code via a crafted web site that leverages "type confusion."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow user-assisted remote attackers to bypass the Same Origin Policy, and conduct Universal XSS (UXSS) attacks or read arbitrary files, by arranging for the presence of a crafted HTML document and a crafted shortcut file in the same local directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5266" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5266" ref_url="https://www.suse.com/security/cve/CVE-2016-5266" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 does not properly restrict drag-and-drop (aka dataTransfer) actions for file: URIs, which allows user-assisted remote attackers to access local files via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5266/">CVE-2016-5266</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5268" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5268" ref_url="https://www.suse.com/security/cve/CVE-2016-5268" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 48.0 does not properly set the LINKABLE and URI_SAFE_FOR_UNTRUSTED_CONTENT flags of about: URLs that are used for error pages, which makes it easier for remote attackers to conduct spoofing attacks via a crafted URL, as demonstrated by misleading text after an about:neterror?d= substring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5268/">CVE-2016-5268</cve>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5271" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5271" ref_url="https://www.suse.com/security/cve/CVE-2016-5271" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    The PropertyProvider::GetSpacingInternal function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via text runs in conjunction with a "display: contents" Cascading Style Sheets (CSS) property.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5271/">CVE-2016-5271</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    The nsImageGeometryMixin class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5273" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5273" ref_url="https://www.suse.com/security/cve/CVE-2016-5273" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    The mozilla::a11y::HyperTextAccessible::GetChildOffset function in the accessibility implementation in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5273/">CVE-2016-5273</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5275" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5275" ref_url="https://www.suse.com/security/cve/CVE-2016-5275" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mozilla::gfx::FilterSupport::ComputeSourceNeededRegions function in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code by leveraging improper interaction between empty filters and CANVAS element rendering.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5275/">CVE-2016-5275</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5279" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5279" ref_url="https://www.suse.com/security/cve/CVE-2016-5279" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 49.0 allows user-assisted remote attackers to obtain sensitive full-pathname information during a local-file drag-and-drop operation via crafted JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5279/">CVE-2016-5279</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via bidirectional text.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5282" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5282" ref_url="https://www.suse.com/security/cve/CVE-2016-5282" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 49.0 does not properly restrict the scheme in favicon requests, which might allow remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by a jar: URL for a favicon resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5282/">CVE-2016-5282</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5283" ref_url="https://www.suse.com/security/cve/CVE-2016-5283" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5283/">CVE-2016-5283</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<bugzilla href="https://bugzilla.suse.com/999701">SUSE bug 999701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5285" ref_url="https://www.suse.com/security/cve/CVE-2016-5285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
    <description>
    A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5285/">CVE-2016-5285</cve>
	<bugzilla href="https://bugzilla.suse.com/1010517">SUSE bug 1010517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549233" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549234" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549235" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544426" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549236" comment="libfreebl3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544428" comment="libfreebl3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549237" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544430" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549238" comment="libsoftokn3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544432" comment="libsoftokn3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549239" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544434" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549240" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544436" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549241" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544438" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549242" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5287" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5287" ref_url="https://www.suse.com/security/cve/CVE-2016-5287" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2735-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00015.html" source="SUSE-SU"/>
    <description>
    A potentially exploitable use-after-free crash during actor destruction with service workers. This issue does not affect releases earlier than Firefox 49. This vulnerability affects Firefox &lt; 49.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5287/">CVE-2016-5287</cve>
	<bugzilla href="https://bugzilla.suse.com/1006475">SUSE bug 1006475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5288" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5288" ref_url="https://www.suse.com/security/cve/CVE-2016-5288" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2639-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2735-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00015.html" source="SUSE-SU"/>
    <description>
    Web content could access information in the HTTP cache if e10s is disabled. This can reveal some visited URLs and the contents of those pages. This issue affects Firefox 48 and 49. This vulnerability affects Firefox &lt; 49.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5288/">CVE-2016-5288</cve>
	<bugzilla href="https://bugzilla.suse.com/1006476">SUSE bug 1006476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5289" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 49. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010426">SUSE bug 1010426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010427">SUSE bug 1010427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549233" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549234" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549235" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544426" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549236" comment="libfreebl3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544428" comment="libfreebl3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549237" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544430" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549238" comment="libsoftokn3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544432" comment="libsoftokn3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549239" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544434" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549240" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544436" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549241" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544438" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549242" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010410">SUSE bug 1010410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549233" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549234" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549235" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544426" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549236" comment="libfreebl3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544428" comment="libfreebl3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549237" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544430" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549238" comment="libsoftokn3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544432" comment="libsoftokn3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549239" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544434" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549240" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544436" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549241" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544438" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549242" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5292" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    During URL parsing, a maliciously crafted URL can cause a potentially exploitable crash. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010399">SUSE bug 1010399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5293" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5293" ref_url="https://www.suse.com/security/cve/CVE-2016-5293" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    When the Mozilla Updater is run, if the Updater's log file in the working directory points to a hardlink, data can be appended to an arbitrary local file. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Firefox ESR &lt; 45.5 and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5293/">CVE-2016-5293</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010400">SUSE bug 1010400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5294" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5294" ref_url="https://www.suse.com/security/cve/CVE-2016-5294" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    The Mozilla Updater can be made to choose an arbitrary target working directory for output files resulting from the update process. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5294/">CVE-2016-5294</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010396">SUSE bug 1010396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5295" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5295" ref_url="https://www.suse.com/security/cve/CVE-2016-5295" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    This vulnerability allows an attacker to use the Mozilla Maintenance Service to escalate privilege by having the Maintenance Service invoke the Mozilla Updater to run malicious local files. This vulnerability requires local system access and is a variant of MFSA2013-44. Note: this issue only affects Windows operating systems. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5295/">CVE-2016-5295</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010411">SUSE bug 1010411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010395">SUSE bug 1010395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549233" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549234" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549235" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544426" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549236" comment="libfreebl3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544428" comment="libfreebl3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549237" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544430" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549238" comment="libsoftokn3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544432" comment="libsoftokn3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549239" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544434" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549240" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544436" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549241" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544438" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549242" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010401">SUSE bug 1010401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549233" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549234" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549235" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544426" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549236" comment="libfreebl3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544428" comment="libfreebl3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549237" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544430" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549238" comment="libsoftokn3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544432" comment="libsoftokn3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549239" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544434" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549240" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544436" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549241" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544438" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549242" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5298" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5298" ref_url="https://www.suse.com/security/cve/CVE-2016-5298" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A mechanism where disruption of the loading of a new web page can cause the previous page's favicon and SSL indicator to not be reset when the new page is loaded. Note: this issue only affects Firefox for Android. Desktop Firefox is unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5298/">CVE-2016-5298</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010412">SUSE bug 1010412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5299" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5299" ref_url="https://www.suse.com/security/cve/CVE-2016-5299" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A previously installed malicious Android application with same signature-level permissions as Firefox can intercept AuthTokens meant for Firefox only. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5299/">CVE-2016-5299</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010413">SUSE bug 1010413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00071.html" source="SUSE-SU"/>
    <description>
    The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549936" comment="expat-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549937" comment="libexpat1-2.1.0-20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547802" comment="libexpat1-32bit-2.1.0-20.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<bugzilla href="https://bugzilla.suse.com/984837">SUSE bug 984837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<bugzilla href="https://bugzilla.suse.com/984842">SUSE bug 984842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the _TIFFVGetField function in libtiff 4.0.6 and earlier allows remote attackers to crash the application via a crafted tiff.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017690">SUSE bug 1017690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040322">SUSE bug 1040322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960341">SUSE bug 960341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974621">SUSE bug 974621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983436">SUSE bug 983436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550933" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550934" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550935" comment="tiff-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5320" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<bugzilla href="https://bugzilla.suse.com/1007284">SUSE bug 1007284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984808">SUSE bug 984808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131042" comment="libtiff5-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131043" comment="libtiff5-32bit-4.0.6-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131044" comment="tiff-4.0.6-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<bugzilla href="https://bugzilla.suse.com/984813">SUSE bug 984813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<bugzilla href="https://bugzilla.suse.com/984815">SUSE bug 984815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5325</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5325" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5325" ref_url="https://www.suse.com/security/cve/CVE-2016-5325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5325/">CVE-2016-5325</cve>
	<bugzilla href="https://bugzilla.suse.com/985201">SUSE bug 985201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985202">SUSE bug 985202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<bugzilla href="https://bugzilla.suse.com/983961">SUSE bug 983961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983973">SUSE bug 983973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<bugzilla href="https://bugzilla.suse.com/983982">SUSE bug 983982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5350" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5351" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
    <description>
    epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5353" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5354" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5355" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5356" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5357" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5358" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-06/msg00068.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5359" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5359" ref_url="https://www.suse.com/security/cve/CVE-2016-5359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 1.12.x before 1.12.12 mishandles offsets, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5359/">CVE-2016-5359</cve>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5384" ref_url="https://www.suse.com/security/cve/CVE-2016-5384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2272-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00036.html" source="SUSE-SU"/>
    <description>
    fontconfig before 2.12.1 does not validate offsets, which allows local users to trigger arbitrary free calls and consequently conduct double free attacks and execute arbitrary code via a crafted cache file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5384/">CVE-2016-5384</cve>
	<bugzilla href="https://bugzilla.suse.com/1123116">SUSE bug 1123116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992534">SUSE bug 992534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140574" comment="fontconfig-2.11.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140575" comment="fontconfig-32bit-2.11.1-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002213.html" source="SUSE-SU"/>
		<reference ref_id="TID7017856" ref_url="https://www.suse.com/support/kb/doc/?id=7017856" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2115-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00084.html" source="SUSE-SU"/>
    <description>
    The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.  NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988486">SUSE bug 988486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988487">SUSE bug 988487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988488">SUSE bug 988488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988489">SUSE bug 988489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988491">SUSE bug 988491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988492">SUSE bug 988492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989125">SUSE bug 989125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989174">SUSE bug 989174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989684">SUSE bug 989684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140453" comment="apache2-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140454" comment="apache2-doc-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140455" comment="apache2-example-pages-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140456" comment="apache2-prefork-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140457" comment="apache2-utils-2.4.23-14.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140458" comment="apache2-worker-2.4.23-14.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5389" ref_url="https://www.suse.com/security/cve/CVE-2016-5389" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5696.  Reason: This candidate is a reservation duplicate of CVE-2016-5696.  Notes: All CVE users should reference CVE-2016-5696 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5389/">CVE-2016-5389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002477.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3033-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00047.html" source="SUSE-SU"/>
    <description>
    The (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXv before 1.0.11 allow remote X servers to trigger out-of-bounds memory access operations via vectors involving length specifications in received data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123148">SUSE bug 1123148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5412" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5412" ref_url="https://www.suse.com/security/cve/CVE-2016-5412" source="SUSE CVE"/>
    <description>
    arch/powerpc/kvm/book3s_hv_rmhandlers.S in the Linux kernel through 4.7 on PowerPC platforms, when CONFIG_KVM_BOOK3S_64_HV is enabled, allows guest OS users to cause a denial of service (host OS infinite loop) by making a H_CEDE hypercall during the existence of a suspended transaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5412/">CVE-2016-5412</cve>
	<bugzilla href="https://bugzilla.suse.com/1013013">SUSE bug 1013013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991065">SUSE bug 991065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5418" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<bugzilla href="https://bugzilla.suse.com/998677">SUSE bug 998677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549199" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5419" ref_url="https://www.suse.com/security/cve/CVE-2016-5419" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2227-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" source="SUSE-SU"/>
    <description>
    curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5419/">CVE-2016-5419</cve>
	<bugzilla href="https://bugzilla.suse.com/1033413">SUSE bug 1033413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033442">SUSE bug 1033442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5420" ref_url="https://www.suse.com/security/cve/CVE-2016-5420" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2227-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" source="SUSE-SU"/>
    <description>
    curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5420/">CVE-2016-5420</cve>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5421" ref_url="https://www.suse.com/security/cve/CVE-2016-5421" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2227-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5421/">CVE-2016-5421</cve>
	<bugzilla href="https://bugzilla.suse.com/991391">SUSE bug 991391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5423" ref_url="https://www.suse.com/security/cve/CVE-2016-5423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00017.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5423/">CVE-2016-5423</cve>
	<bugzilla href="https://bugzilla.suse.com/1041981">SUSE bug 1041981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042497">SUSE bug 1042497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052683">SUSE bug 1052683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993454">SUSE bug 993454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5424" ref_url="https://www.suse.com/security/cve/CVE-2016-5424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00017.html" source="SUSE-SU"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) " (double quote), (2) \ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5424/">CVE-2016-5424</cve>
	<bugzilla href="https://bugzilla.suse.com/1041981">SUSE bug 1041981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042497">SUSE bug 1042497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052683">SUSE bug 1052683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993453">SUSE bug 993453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131139" comment="libecpg6-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131140" comment="libpq5-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131141" comment="libpq5-32bit-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131142" comment="postgresql94-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131949" comment="postgresql94-contrib-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131950" comment="postgresql94-docs-9.4.9-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131951" comment="postgresql94-server-9.4.9-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2278-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<bugzilla href="https://bugzilla.suse.com/989926">SUSE bug 989926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991616">SUSE bug 991616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5507</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5507" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5507" ref_url="https://www.suse.com/security/cve/CVE-2016-5507" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.32 and earlier and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5507/">CVE-2016-5507</cve>
	<bugzilla href="https://bugzilla.suse.com/1005557">SUSE bug 1005557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549213" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549214" comment="java-1_7_0-openjdk-demo-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549215" comment="java-1_7_0-openjdk-devel-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549216" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544440" comment="java-1_7_1-ibm-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534008" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544441" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534011" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547248" comment="java-1_8_0-ibm-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547249" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547250" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549193" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549194" comment="java-1_8_0-openjdk-demo-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549195" comment="java-1_8_0-openjdk-devel-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549196" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="TID7020150" ref_url="https://www.suse.com/support/kb/doc/?id=7020150" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5549" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to JMX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<bugzilla href="https://bugzilla.suse.com/1005523">SUSE bug 1005523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549213" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549214" comment="java-1_7_0-openjdk-demo-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549215" comment="java-1_7_0-openjdk-devel-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549216" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544440" comment="java-1_7_1-ibm-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534008" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544441" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534011" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547248" comment="java-1_8_0-ibm-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547249" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547250" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549193" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549194" comment="java-1_8_0-openjdk-demo-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549195" comment="java-1_8_0-openjdk-devel-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549196" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5556" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<bugzilla href="https://bugzilla.suse.com/1005524">SUSE bug 1005524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549213" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549214" comment="java-1_7_0-openjdk-demo-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549215" comment="java-1_7_0-openjdk-devel-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549216" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544440" comment="java-1_7_1-ibm-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534008" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544441" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534011" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547248" comment="java-1_8_0-ibm-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547249" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547250" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549193" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549194" comment="java-1_8_0-openjdk-demo-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549195" comment="java-1_8_0-openjdk-devel-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549196" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<bugzilla href="https://bugzilla.suse.com/1005525">SUSE bug 1005525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549213" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549214" comment="java-1_7_0-openjdk-demo-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549215" comment="java-1_7_0-openjdk-devel-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549216" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544440" comment="java-1_7_1-ibm-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534008" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544441" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534011" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547248" comment="java-1_8_0-ibm-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547249" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547250" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549193" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549194" comment="java-1_8_0-openjdk-demo-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549195" comment="java-1_8_0-openjdk-devel-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549196" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5582.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<bugzilla href="https://bugzilla.suse.com/1005526">SUSE bug 1005526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549213" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549214" comment="java-1_7_0-openjdk-demo-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549215" comment="java-1_7_0-openjdk-devel-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549216" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544440" comment="java-1_7_1-ibm-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534008" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544441" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534011" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547248" comment="java-1_8_0-ibm-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547249" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547250" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549193" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549194" comment="java-1_8_0-openjdk-demo-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549195" comment="java-1_8_0-openjdk-devel-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549196" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5573.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<bugzilla href="https://bugzilla.suse.com/1005527">SUSE bug 1005527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549213" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549214" comment="java-1_7_0-openjdk-demo-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549215" comment="java-1_7_0-openjdk-devel-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549216" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549193" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549194" comment="java-1_8_0-openjdk-demo-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549195" comment="java-1_8_0-openjdk-devel-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549196" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<bugzilla href="https://bugzilla.suse.com/1005558">SUSE bug 1005558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549204" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547200" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549205" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549206" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549207" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549208" comment="mariadb-tools-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2900-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2990-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00069.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<bugzilla href="https://bugzilla.suse.com/1005528">SUSE bug 1005528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009280">SUSE bug 1009280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549213" comment="java-1_7_0-openjdk-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549214" comment="java-1_7_0-openjdk-demo-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549215" comment="java-1_7_0-openjdk-devel-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549216" comment="java-1_7_0-openjdk-headless-1.7.0.121-36.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544440" comment="java-1_7_1-ibm-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534008" comment="java-1_7_1-ibm-alsa-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544441" comment="java-1_7_1-ibm-jdbc-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534011" comment="java-1_7_1-ibm-plugin-1.7.1_sr3.60-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547248" comment="java-1_8_0-ibm-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547249" comment="java-1_8_0-ibm-alsa-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547250" comment="java-1_8_0-ibm-plugin-1.8.0_sr3.21-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549193" comment="java-1_8_0-openjdk-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549194" comment="java-1_8_0-openjdk-demo-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549195" comment="java-1_8_0-openjdk-devel-1.8.0.111-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549196" comment="java-1_8_0-openjdk-headless-1.8.0.111-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5612</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5612" ref_url="https://www.suse.com/security/cve/CVE-2016-5612" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5612/">CVE-2016-5612</cve>
	<bugzilla href="https://bugzilla.suse.com/1005561">SUSE bug 1005561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<bugzilla href="https://bugzilla.suse.com/1005564">SUSE bug 1005564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549204" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547200" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549205" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549206" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549207" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549208" comment="mariadb-tools-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<bugzilla href="https://bugzilla.suse.com/1005566">SUSE bug 1005566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549204" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547200" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549205" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549206" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549207" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549208" comment="mariadb-tools-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<bugzilla href="https://bugzilla.suse.com/1005569">SUSE bug 1005569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549204" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547200" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549205" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549206" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549207" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549208" comment="mariadb-tools-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5630</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5630" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5630" ref_url="https://www.suse.com/security/cve/CVE-2016-5630" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5630/">CVE-2016-5630</cve>
	<bugzilla href="https://bugzilla.suse.com/1005570">SUSE bug 1005570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<bugzilla href="https://bugzilla.suse.com/1065451">SUSE bug 1065451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106262">SUSE bug 1106262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549178" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549179" comment="python3-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549180" comment="python3-base-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549181" comment="python3-curses-3.4.5-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5687" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5687" ref_url="https://www.suse.com/security/cve/CVE-2016-5687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The VerticalFilter function in the DDS coder in ImageMagick before 6.9.4-3 and 7.x before 7.0.1-4 allows remote attackers to have unspecified impact via a crafted DDS file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5687/">CVE-2016-5687</cve>
	<bugzilla href="https://bugzilla.suse.com/1000713">SUSE bug 1000713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000714">SUSE bug 1000714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985448">SUSE bug 985448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5688" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5688" ref_url="https://www.suse.com/security/cve/CVE-2016-5688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
    <description>
    The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5688/">CVE-2016-5688</cve>
	<bugzilla href="https://bugzilla.suse.com/985442">SUSE bug 985442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5689" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5689" ref_url="https://www.suse.com/security/cve/CVE-2016-5689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of NULL pointer checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5689/">CVE-2016-5689</cve>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5690" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5690" ref_url="https://www.suse.com/security/cve/CVE-2016-5690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The ReadDCMImage function in DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact via vectors involving the for statement in computing the pixel scaling table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5690/">CVE-2016-5690</cve>
	<bugzilla href="https://bugzilla.suse.com/985451">SUSE bug 985451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5691" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5691" ref_url="https://www.suse.com/security/cve/CVE-2016-5691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of validation of (1) pixel.red, (2) pixel.green, and (3) pixel.blue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5691/">CVE-2016-5691</cve>
	<bugzilla href="https://bugzilla.suse.com/985456">SUSE bug 985456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985460">SUSE bug 985460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696</cve>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1885-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985351">SUSE bug 985351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130996" comment="libpython2_7-1_0-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130997" comment="libpython2_7-1_0-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549178" comment="libpython3_4m1_0-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130999" comment="python-base-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131910" comment="python-base-32bit-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131003" comment="python-xml-2.7.9-24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549179" comment="python3-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549180" comment="python3-base-3.4.5-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549181" comment="python3-curses-3.4.5-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5759" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002337.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2605-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00083.html" source="SUSE-SU"/>
    <description>
    The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759</cve>
	<bugzilla href="https://bugzilla.suse.com/990200">SUSE bug 990200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140694" comment="kdump-0.8.15-28.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5824" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    libical 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549495" comment="libical1-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549496" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5827" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00108.html" source="SUSE-SU"/>
    <description>
    The icaltime_from_string function in libical 0.47 and 1.0 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted string to the icalparser_parse_string function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<bugzilla href="https://bugzilla.suse.com/986631">SUSE bug 986631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986642">SUSE bug 986642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986658">SUSE bug 986658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549495" comment="libical1-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549496" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828</cve>
	<bugzilla href="https://bugzilla.suse.com/986569">SUSE bug 986569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991065">SUSE bug 991065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5829" ref_url="https://www.suse.com/security/cve/CVE-2016-5829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5829/">CVE-2016-5829</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054127">SUSE bug 1054127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986573">SUSE bug 986573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991651">SUSE bug 991651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5841" ref_url="https://www.suse.com/security/cve/CVE-2016-5841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5841/">CVE-2016-5841</cve>
	<bugzilla href="https://bugzilla.suse.com/986609">SUSE bug 986609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5842" ref_url="https://www.suse.com/security/cve/CVE-2016-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-07/msg00018.html" source="SUSE-SU"/>
    <description>
    MagickCore/property.c in ImageMagick before 7.0.2-1 allows remote attackers to obtain sensitive memory information via vectors involving the q variable, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5842/">CVE-2016-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/986608">SUSE bug 986608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5844" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<bugzilla href="https://bugzilla.suse.com/986566">SUSE bug 986566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549199" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5863" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5863" ref_url="https://www.suse.com/security/cve/CVE-2016-5863" source="SUSE CVE"/>
    <description>
    In an ioctl handler in all Qualcomm products with Android for MSM, Firefox OS for MSM, or QRD Android, several sanity checks are missing which can lead to out-of-bounds accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5863/">CVE-2016-5863</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054127">SUSE bug 1054127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986572">SUSE bug 986572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5875" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1889-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2321-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2375-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5314.  Reason: This candidate is a reservation duplicate of CVE-2016-5314.  Notes: All CVE users should reference CVE-2016-5314 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<bugzilla href="https://bugzilla.suse.com/1007284">SUSE bug 1007284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984809">SUSE bug 984809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/984831">SUSE bug 984831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987351">SUSE bug 987351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2071-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00004.html" source="SUSE-SU"/>
    <description>
    The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<bugzilla href="https://bugzilla.suse.com/987580">SUSE bug 987580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991710">SUSE bug 991710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
    <description>
    The gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<bugzilla href="https://bugzilla.suse.com/987577">SUSE bug 987577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991436">SUSE bug 991436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995034">SUSE bug 995034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6153" ref_url="https://www.suse.com/security/cve/CVE-2016-6153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1932-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2041-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html" source="SUSE-SU"/>
    <description>
    os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6153/">CVE-2016-6153</cve>
	<bugzilla href="https://bugzilla.suse.com/1149969">SUSE bug 1149969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987394">SUSE bug 987394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130774" comment="libsqlite3-0-3.8.10.2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130775" comment="libsqlite3-0-32bit-3.8.10.2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130776" comment="sqlite3-3.8.10.2-3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6161" ref_url="https://www.suse.com/security/cve/CVE-2016-6161" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2071-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00004.html" source="SUSE-SU"/>
    <description>
    The output function in gd_gif_out.c in the GD Graphics Library (aka libgd) allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6161/">CVE-2016-6161</cve>
	<bugzilla href="https://bugzilla.suse.com/988032">SUSE bug 988032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6170" ref_url="https://www.suse.com/security/cve/CVE-2016-6170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
    <description>
    ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6170/">CVE-2016-6170</cve>
	<bugzilla href="https://bugzilla.suse.com/1028603">SUSE bug 1028603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987866">SUSE bug 987866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550136" comment="bind-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550137" comment="bind-chrootenv-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532836" comment="bind-doc-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550138" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547968" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550139" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6185" ref_url="https://www.suse.com/security/cve/CVE-2016-6185" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2313-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6185/">CVE-2016-6185</cve>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999993">SUSE bug 999993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131038" comment="perl-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131039" comment="perl-32bit-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131040" comment="perl-base-5.18.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131041" comment="perl-doc-5.18.2-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6197" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6197" ref_url="https://www.suse.com/security/cve/CVE-2016-6197" source="SUSE CVE"/>
    <description>
    fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6197/">CVE-2016-6197</cve>
	<bugzilla href="https://bugzilla.suse.com/988708">SUSE bug 988708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2460-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2071-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00004.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<bugzilla href="https://bugzilla.suse.com/991434">SUSE bug 991434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991622">SUSE bug 991622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00068.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<bugzilla href="https://bugzilla.suse.com/1001712">SUSE bug 1001712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2117-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
    <description>
    gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<bugzilla href="https://bugzilla.suse.com/987577">SUSE bug 987577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991436">SUSE bug 991436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995034">SUSE bug 995034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6224" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6224" ref_url="https://www.suse.com/security/cve/CVE-2016-6224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00006.html" source="SUSE-SU"/>
    <description>
    ecryptfs-setup-swap in eCryptfs does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning on a (1) NVMe or (2) MMC drive, which allows local users to obtain sensitive information via unspecified vectors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8946.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6224/">CVE-2016-6224</cve>
	<bugzilla href="https://bugzilla.suse.com/989121">SUSE bug 989121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989122">SUSE bug 989122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550588" comment="ecryptfs-utils-103-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550589" comment="ecryptfs-utils-32bit-103-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6225</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6225" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6225" ref_url="https://www.suse.com/security/cve/CVE-2016-6225" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0250-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00125.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0251-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00126.html" source="SUSE-SU"/>
    <description>
    xbcrypt in Percona XtraBackup before 2.3.6 and 2.4.x before 2.4.5 does not properly set the initialization vector (IV) for encryption, which makes it easier for context-dependent attackers to obtain sensitive information from encrypted backup files via a Chosen-Plaintext attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6394.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6225/">CVE-2016-6225</cve>
	<bugzilla href="https://bugzilla.suse.com/1019858">SUSE bug 1019858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339425" comment="xtrabackup is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6250" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the ISO9660 writer in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors related to verifying filename lengths when writing an ISO9660 archive, which trigger a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<bugzilla href="https://bugzilla.suse.com/989980">SUSE bug 989980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549199" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6252" ref_url="https://www.suse.com/security/cve/CVE-2016-6252" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1997-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004475.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00044.html" source="SUSE-SU"/>
    <description>
    Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-6252/">CVE-2016-6252</cve>
	<bugzilla href="https://bugzilla.suse.com/1099310">SUSE bug 1099310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979282">SUSE bug 979282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519796" comment="shadow-4.2.1-27.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550436" comment="shadow-4.2.1-27.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594453" comment="shadow-4.2.1-27.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988692">SUSE bug 988692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6259" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<bugzilla href="https://bugzilla.suse.com/988676">SUSE bug 988676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988694">SUSE bug 988694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
    <description>
    The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131905" comment="libidn-tools-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
    <description>
    idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<bugzilla href="https://bugzilla.suse.com/1014473">SUSE bug 1014473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190777">SUSE bug 1190777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131905" comment="libidn-tools-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1924-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html" source="SUSE-SU"/>
    <description>
    The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131905" comment="libidn-tools-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130989" comment="libidn11-1.28-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130990" comment="libidn11-32bit-1.28-4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6293" ref_url="https://www.suse.com/security/cve/CVE-2016-6293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there is a '\0' character at the end of a certain temporary array, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a call with a long httpAcceptLanguage argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6293/">CVE-2016-6293</cve>
	<bugzilla href="https://bugzilla.suse.com/1035111">SUSE bug 1035111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990636">SUSE bug 990636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546245" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546246" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546248" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594765" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594766" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594767" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<bugzilla href="https://bugzilla.suse.com/1001706">SUSE bug 1001706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005579">SUSE bug 1005579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021375">SUSE bug 1021375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2423-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00108.html" source="SUSE-SU"/>
    <description>
    The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<bugzilla href="https://bugzilla.suse.com/1123792">SUSE bug 1123792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131105" comment="libgcrypt20-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131106" comment="libgcrypt20-32bit-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131935" comment="libgcrypt20-hmac-1.6.1-16.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131936" comment="libgcrypt20-hmac-32bit-1.6.1-16.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6316</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6316" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6316" ref_url="https://www.suse.com/security/cve/CVE-2016-6316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003293.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6316/">CVE-2016-6316</cve>
	<bugzilla href="https://bugzilla.suse.com/993302">SUSE bug 993302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993313">SUSE bug 993313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594289" comment="ruby2.1-rubygem-actionmailer-4_2-4.2.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594290" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594291" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594292" comment="ruby2.1-rubygem-activejob-4_2-4.2.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594293" comment="ruby2.1-rubygem-activemodel-4_2-4.2.9-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594294" comment="ruby2.1-rubygem-activerecord-4_2-4.2.9-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594295" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594296" comment="ruby2.1-rubygem-rails-4_2-4.2.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594297" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594298" comment="ruby2.1-rubygem-railties-4_2-4.2.9-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6317</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6317" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6317" ref_url="https://www.suse.com/security/cve/CVE-2016-6317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003293.html" source="SUSE-SU"/>
    <description>
    Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6317/">CVE-2016-6317</cve>
	<bugzilla href="https://bugzilla.suse.com/993313">SUSE bug 993313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594289" comment="ruby2.1-rubygem-actionmailer-4_2-4.2.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594290" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594291" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594292" comment="ruby2.1-rubygem-activejob-4_2-4.2.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594293" comment="ruby2.1-rubygem-activemodel-4_2-4.2.9-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594294" comment="ruby2.1-rubygem-activerecord-4_2-4.2.9-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594295" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594296" comment="ruby2.1-rubygem-rails-4_2-4.2.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594297" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594298" comment="ruby2.1-rubygem-railties-4_2-4.2.9-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<bugzilla href="https://bugzilla.suse.com/1123113">SUSE bug 1123113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130930" comment="cracklib-2.9.0-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131013" comment="libcrack2-2.9.0-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131014" comment="libcrack2-32bit-2.9.0-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2874-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3003-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00028.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123796">SUSE bug 1123796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549198" comment="tar-1.27.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516651" comment="tar-lang-1.27.1-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6328" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libexif. An integer overflow when parsing the MNOTE entry data of the input file. This can cause Denial-of-Service (DoS) and Information Disclosure (disclosing some critical heap chunk metadata, even other applications' private data).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550437" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550438" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6329" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6329" ref_url="https://www.suse.com/security/cve/CVE-2016-6329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00077.html" source="SUSE-SU"/>
    <description>
    OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTP-over-OpenVPN session using Blowfish in CBC mode, aka a "Sweet32" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6329/">CVE-2016-6329</cve>
	<bugzilla href="https://bugzilla.suse.com/1026864">SUSE bug 1026864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995374">SUSE bug 995374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550378" comment="openvpn-2.3.8-16.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550379" comment="openvpn-auth-pam-plugin-2.3.8-16.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<bugzilla href="https://bugzilla.suse.com/990835">SUSE bug 990835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6352" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002333.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2276-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00040.html" source="SUSE-SU"/>
    <description>
    The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991450">SUSE bug 991450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140591" comment="gdk-pixbuf-lang-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140592" comment="gdk-pixbuf-query-loaders-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140593" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140594" comment="libgdk_pixbuf-2_0-0-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140595" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140596" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-16.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2195-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2167-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2182-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2253-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2254-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2378-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2450-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<bugzilla href="https://bugzilla.suse.com/1026047">SUSE bug 1026047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990856">SUSE bug 990856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131144" comment="MozillaFirefox-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131145" comment="MozillaFirefox-translations-45.4.0esr-81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131107" comment="at-3.1.14-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131796" comment="flex-2.5.37-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131938" comment="flex-32bit-2.5.37-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131109" comment="libQtWebKit4-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131110" comment="libQtWebKit4-32bit-4.8.6+2.3.3-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131111" comment="libbonobo-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131112" comment="libbonobo-32bit-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131939" comment="libbonobo-doc-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131113" comment="libbonobo-lang-2.32.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131114" comment="libkde4-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131115" comment="libkde4-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131116" comment="libkdecore4-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131117" comment="libkdecore4-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131118" comment="libksuseinstall1-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131119" comment="libksuseinstall1-32bit-4.12.0-7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131120" comment="libnetpbm11-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131121" comment="libnetpbm11-32bit-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131122" comment="netpbm-10.66.3-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131123" comment="openslp-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131124" comment="openslp-32bit-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131940" comment="openslp-server-2.0.0-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480</cve>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991667">SUSE bug 991667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992568">SUSE bug 992568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1533-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489</cve>
	<bugzilla href="https://bugzilla.suse.com/991464">SUSE bug 991464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550320" comment="libhogweed2-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550321" comment="libhogweed2-32bit-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550322" comment="libnettle4-2.7.1-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550323" comment="libnettle4-32bit-2.7.1-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<bugzilla href="https://bugzilla.suse.com/991466">SUSE bug 991466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993854">SUSE bug 993854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6491" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6491" ref_url="https://www.suse.com/security/cve/CVE-2016-6491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2148-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00100.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the Get8BIMProperty function in MagickCore/property.c in ImageMagick before 6.9.5-4 and 7.x before 7.0.2-6 allows remote attackers to cause a denial of service (out-of-bounds read, memory leak, and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6491/">CVE-2016-6491</cve>
	<bugzilla href="https://bugzilla.suse.com/991445">SUSE bug 991445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6504" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6504" ref_url="https://www.suse.com/security/cve/CVE-2016-6504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wireshark 1.12.x before 1.12.13 does not properly maintain a ptvc data structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6504/">CVE-2016-6504</cve>
	<bugzilla href="https://bugzilla.suse.com/991012">SUSE bug 991012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<bugzilla href="https://bugzilla.suse.com/991013">SUSE bug 991013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6506" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6506" ref_url="https://www.suse.com/security/cve/CVE-2016-6506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6506/">CVE-2016-6506</cve>
	<bugzilla href="https://bugzilla.suse.com/991015">SUSE bug 991015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6507" ref_url="https://www.suse.com/security/cve/CVE-2016-6507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12.x before 1.12.13 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6507/">CVE-2016-6507</cve>
	<bugzilla href="https://bugzilla.suse.com/991016">SUSE bug 991016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6508" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<bugzilla href="https://bugzilla.suse.com/991017">SUSE bug 991017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6509" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 mishandles conversations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<bugzilla href="https://bugzilla.suse.com/991018">SUSE bug 991018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6510" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<bugzilla href="https://bugzilla.suse.com/991019">SUSE bug 991019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6511" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1974-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00023.html" source="SUSE-SU"/>
    <description>
    epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (OpenFlow dissector large loop) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<bugzilla href="https://bugzilla.suse.com/991020">SUSE bug 991020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131146" comment="wireshark-1.12.13-31.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2339-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00068.html" source="SUSE-SU"/>
    <description>
    The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141045" comment="openssh-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141046" comment="openssh-fips-7.2p2-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141047" comment="openssh-helpers-7.2p2-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6520" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6520" ref_url="https://www.suse.com/security/cve/CVE-2016-6520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2148-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00100.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in MagickCore/enhance.c in ImageMagick before 7.0.2-7 allows remote attackers to have unspecified impact via vectors related to pixel cache morphology.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6520/">CVE-2016-6520</cve>
	<bugzilla href="https://bugzilla.suse.com/991872">SUSE bug 991872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009130985" comment="libMagickCore-6_Q16-1-6.8.8.1-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009130987" comment="libMagickWand-6_Q16-1-6.8.8.1-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2746-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
    <description>
    Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005580">SUSE bug 1005580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021755">SUSE bug 1021755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131128" comment="libmysqlclient18-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131129" comment="libmysqlclient18-32bit-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131132" comment="mariadb-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131133" comment="mariadb-client-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131134" comment="mariadb-errormessages-10.0.27-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131946" comment="mariadb-tools-10.0.27-12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<bugzilla href="https://bugzilla.suse.com/1001367">SUSE bug 1001367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008253">SUSE bug 1008253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021755">SUSE bug 1021755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549204" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547200" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549205" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549206" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549207" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549208" comment="mariadb-tools-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
    <description>
    mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<bugzilla href="https://bugzilla.suse.com/1008253">SUSE bug 1008253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6786" ref_url="https://www.suse.com/security/cve/CVE-2016-6786" source="SUSE CVE"/>
    <description>
    kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 30955111.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6786/">CVE-2016-6786</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025626">SUSE bug 1025626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6787" ref_url="https://www.suse.com/security/cve/CVE-2016-6787" source="SUSE CVE"/>
    <description>
    kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 31095224.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6787/">CVE-2016-6787</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6794" ref_url="https://www.suse.com/security/cve/CVE-2016-6794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00061.html" source="SUSE-SU"/>
    <description>
    When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6794/">CVE-2016-6794</cve>
	<bugzilla href="https://bugzilla.suse.com/1007857">SUSE bug 1007857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532091" comment="tomcat-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532092" comment="tomcat-admin-webapps-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532093" comment="tomcat-docs-webapp-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532094" comment="tomcat-el-3_0-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532095" comment="tomcat-javadoc-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532096" comment="tomcat-jsp-2_3-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532097" comment="tomcat-lib-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532098" comment="tomcat-servlet-3_1-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532099" comment="tomcat-webapps-8.0.36-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6796" ref_url="https://www.suse.com/security/cve/CVE-2016-6796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00061.html" source="SUSE-SU"/>
    <description>
    A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6796/">CVE-2016-6796</cve>
	<bugzilla href="https://bugzilla.suse.com/1007858">SUSE bug 1007858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532091" comment="tomcat-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532092" comment="tomcat-admin-webapps-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532093" comment="tomcat-docs-webapp-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532094" comment="tomcat-el-3_0-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532095" comment="tomcat-javadoc-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532096" comment="tomcat-jsp-2_3-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532097" comment="tomcat-lib-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532098" comment="tomcat-servlet-3_1-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532099" comment="tomcat-webapps-8.0.36-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6797" ref_url="https://www.suse.com/security/cve/CVE-2016-6797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00061.html" source="SUSE-SU"/>
    <description>
    The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6797/">CVE-2016-6797</cve>
	<bugzilla href="https://bugzilla.suse.com/1007853">SUSE bug 1007853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532091" comment="tomcat-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532092" comment="tomcat-admin-webapps-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532093" comment="tomcat-docs-webapp-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532094" comment="tomcat-el-3_0-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532095" comment="tomcat-javadoc-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532096" comment="tomcat-jsp-2_3-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532097" comment="tomcat-lib-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532098" comment="tomcat-servlet-3_1-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532099" comment="tomcat-webapps-8.0.36-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6816" ref_url="https://www.suse.com/security/cve/CVE-2016-6816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7018326" ref_url="https://www.suse.com/support/kb/doc/?id=7018326" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00061.html" source="SUSE-SU"/>
    <description>
    The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6816/">CVE-2016-6816</cve>
	<bugzilla href="https://bugzilla.suse.com/1011812">SUSE bug 1011812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532091" comment="tomcat-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532092" comment="tomcat-admin-webapps-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532093" comment="tomcat-docs-webapp-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532094" comment="tomcat-el-3_0-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532095" comment="tomcat-javadoc-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532096" comment="tomcat-jsp-2_3-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532097" comment="tomcat-lib-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532098" comment="tomcat-servlet-3_1-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532099" comment="tomcat-webapps-8.0.36-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6823" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6823" ref_url="https://www.suse.com/security/cve/CVE-2016-6823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2641-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2644-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3089-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3091-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00072.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6823/">CVE-2016-6823</cve>
	<bugzilla href="https://bugzilla.suse.com/1001066">SUSE bug 1001066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1002207">SUSE bug 1002207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549211" comment="libMagickCore-6_Q16-1-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549212" comment="libMagickWand-6_Q16-1-6.8.8.1-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<bugzilla href="https://bugzilla.suse.com/994774">SUSE bug 994774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994775">SUSE bug 994775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6834" ref_url="https://www.suse.com/security/cve/CVE-2016-6834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6834/">CVE-2016-6834</cve>
	<bugzilla href="https://bugzilla.suse.com/994418">SUSE bug 994418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994421">SUSE bug 994421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<bugzilla href="https://bugzilla.suse.com/994760">SUSE bug 994760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994761">SUSE bug 994761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6855" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002405.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2242-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 3.19.x, and 3.20.x before 3.20.4, when used with glib before 2.44.1, allow remote attackers to cause a denial of service (out-of-bounds write and crash) via vectors involving passing invalid UTF-8 to GMarkup.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855</cve>
	<bugzilla href="https://bugzilla.suse.com/994819">SUSE bug 994819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140555" comment="eog-3.20.4-7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140556" comment="eog-lang-3.20.4-7.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<bugzilla href="https://bugzilla.suse.com/994771">SUSE bug 994771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994772">SUSE bug 994772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6893" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6893" ref_url="https://www.suse.com/security/cve/CVE-2016-6893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005519.html" source="SUSE-SU"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the user options page in GNU Mailman 2.1.x before 2.1.23 allows remote attackers to hijack the authentication of arbitrary users for requests that modify an option, as demonstrated by gaining access to the credentials of a victim's account.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6893/">CVE-2016-6893</cve>
	<bugzilla href="https://bugzilla.suse.com/995352">SUSE bug 995352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997205">SUSE bug 997205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530378" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546036" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594734" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2203-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-08/msg00121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2363-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00078.html" source="SUSE-SU"/>
    <description>
    The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<bugzilla href="https://bugzilla.suse.com/995034">SUSE bug 995034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131048" comment="gd-2.1.0-12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6906" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6906" ref_url="https://www.suse.com/security/cve/CVE-2016-6906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
    <description>
    The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6906/">CVE-2016-6906</cve>
	<bugzilla href="https://bugzilla.suse.com/1022553">SUSE bug 1022553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549984" comment="gd-2.1.0-23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the gdImageWebPtr function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via large width and height values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<bugzilla href="https://bugzilla.suse.com/1022284">SUSE bug 1022284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549984" comment="gd-2.1.0-23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2983-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3004-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549197" comment="sudo-1.8.10p3-8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7039" ref_url="https://www.suse.com/security/cve/CVE-2016-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" source="SUSE-SU"/>
    <description>
    The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7039/">CVE-2016-7039</cve>
	<bugzilla href="https://bugzilla.suse.com/1001486">SUSE bug 1001486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001487">SUSE bug 1001487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003964">SUSE bug 1003964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7042" ref_url="https://www.suse.com/security/cve/CVE-2016-7042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7042/">CVE-2016-7042</cve>
	<bugzilla href="https://bugzilla.suse.com/1004517">SUSE bug 1004517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7052" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<bugzilla href="https://bugzilla.suse.com/1001148">SUSE bug 1001148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140890" comment="libopenssl-devel-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140891" comment="libopenssl1_0_0-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140892" comment="libopenssl1_0_0-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140893" comment="libopenssl1_0_0-hmac-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140894" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140895" comment="openssl-1.0.2j-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140896" comment="openssl-doc-1.0.2j-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7053" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7053" ref_url="https://www.suse.com/security/cve/CVE-2016-7053" source="SUSE CVE"/>
    <description>
    In OpenSSL 1.1.0 before 1.1.0c, applications parsing invalid CMS structures can crash with a NULL pointer dereference. This is caused by a bug in the handling of the ASN.1 CHOICE type in OpenSSL 1.1.0 which can result in a NULL value being passed to the structure callback if an attempt is made to free certain invalid encodings. Only CHOICE structures using a callback which do not handle NULL value are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7053/">CVE-2016-7053</cve>
	<bugzilla href="https://bugzilla.suse.com/1009533">SUSE bug 1009533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7054" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7054" ref_url="https://www.suse.com/security/cve/CVE-2016-7054" source="SUSE CVE"/>
    <description>
    In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7054/">CVE-2016-7054</cve>
	<bugzilla href="https://bugzilla.suse.com/1009531">SUSE bug 1009531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<bugzilla href="https://bugzilla.suse.com/1009528">SUSE bug 1009528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541126" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549976" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549977" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549978" comment="libopenssl1_0_0-hmac-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549979" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549980" comment="openssl-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532709" comment="openssl-doc-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0409-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0487-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1212-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2983-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3004-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549197" comment="sudo-1.8.10p3-8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    The get_page_from_l3e function in arch/x86/mm.c in Xen allows local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7093" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<bugzilla href="https://bugzilla.suse.com/995789">SUSE bug 995789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00022.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141159" comment="xen-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141160" comment="xen-doc-html-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141161" comment="xen-libs-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141162" comment="xen-libs-32bit-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141163" comment="xen-tools-4.7.0_12-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141164" comment="xen-tools-domU-4.7.0_12-23.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="TID7018489" ref_url="https://www.suse.com/support/kb/doc/?id=7018489" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097</cve>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7098" ref_url="https://www.suse.com/security/cve/CVE-2016-7098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002523.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2284-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0015-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00007.html" source="SUSE-SU"/>
    <description>
    Race condition in wget 1.17 and earlier, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7098/">CVE-2016-7098</cve>
	<bugzilla href="https://bugzilla.suse.com/995964">SUSE bug 995964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549275" comment="wget-1.14-17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7099</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7099" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7099" ref_url="https://www.suse.com/security/cve/CVE-2016-7099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html" source="SUSE-SU"/>
    <description>
    The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7099/">CVE-2016-7099</cve>
	<bugzilla href="https://bugzilla.suse.com/1001652">SUSE bug 1001652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7103</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7103" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7103" ref_url="https://www.suse.com/security/cve/CVE-2016-7103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003185.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote attackers to inject arbitrary web script or HTML via the closeText parameter of the dialog function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7103/">CVE-2016-7103</cve>
	<bugzilla href="https://bugzilla.suse.com/996004">SUSE bug 996004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996014">SUSE bug 996014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594273" comment="python-XStatic-jquery-ui-1.11.0.1-2.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<bugzilla href="https://bugzilla.suse.com/996441">SUSE bug 996441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117</cve>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003253">SUSE bug 1003253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057478">SUSE bug 1057478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7141" ref_url="https://www.suse.com/security/cve/CVE-2016-7141" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2379-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00094.html" source="SUSE-SU"/>
    <description>
    curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7141/">CVE-2016-7141</cve>
	<bugzilla href="https://bugzilla.suse.com/991390">SUSE bug 991390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997420">SUSE bug 997420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009131101" comment="curl-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131102" comment="libcurl4-7.37.0-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009131103" comment="libcurl4-32bit-7.37.0-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<bugzilla href="https://bugzilla.suse.com/997858">SUSE bug 997858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00060.html" source="SUSE-SU"/>
    <description>
    The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<bugzilla href="https://bugzilla.suse.com/997859">SUSE bug 997859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157" source="SUSE CVE"/>
    <description>
    The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<bugzilla href="https://bugzilla.suse.com/997860">SUSE bug 997860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009141087" comment="qemu-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141088" comment="qemu-arm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141089" comment="qemu-block-curl-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141090" comment="qemu-block-rbd-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141091" comment="qemu-block-ssh-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141092" comment="qemu-guest-agent-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141093" comment="qemu-ipxe-1.0.0-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141094" comment="qemu-kvm-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141095" comment="qemu-lang-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141096" comment="qemu-ppc-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141097" comment="qemu-s390-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141098" comment="qemu-seabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141099" comment="qemu-sgabios-8-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141100" comment="qemu-tools-2.6.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141101" comment="qemu-vgabios-1.9.1-27.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009141102" comment="qemu-x86-2.6.1-27.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7161" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001152">SUSE bug 1001152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2186-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997857">SUSE bug 997857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549547" comment="libopenjp2-7-2.1.0-4.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7170" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7175" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998761">SUSE bug 998761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7176" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark 2.x before 2.0.6 calls snprintf with one of its input buffers as the output buffer, which allows remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998762">SUSE bug 998762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7177" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 does not restrict the number of channels, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998763">SUSE bug 998763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7178" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 2.x before 2.0.6 does not ensure that memory is allocated for certain data structures, which allows remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998964">SUSE bug 998964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7179" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998963">SUSE bug 998963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark 2.x before 2.0.6 does not properly consider whether a string is constant, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<bugzilla href="https://bugzilla.suse.com/998099">SUSE bug 998099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998800">SUSE bug 998800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7401</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7401" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7401" ref_url="https://www.suse.com/security/cve/CVE-2016-7401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2016-7401/">CVE-2016-7401</cve>
	<bugzilla href="https://bugzilla.suse.com/1001374">SUSE bug 1001374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594740" comment="python-Django-1.8.19-3.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7404</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7404" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7404" ref_url="https://www.suse.com/security/cve/CVE-2016-7404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002853.html" source="SUSE-SU"/>
    <description>
    OpenStack Magnum passes OpenStack credentials into the Heat templates creating its instances. While these should just be used for retrieving the instances' SSL certificates, they allow full API access, though and can be used to perform any API operation the user is authorized to perform.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-7404/">CVE-2016-7404</cve>
	<bugzilla href="https://bugzilla.suse.com/1004677">SUSE bug 1004677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998182">SUSE bug 998182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594320" comment="openstack-magnum-3.1.2~a0~dev20-9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594321" comment="openstack-magnum-api-3.1.2~a0~dev20-9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594322" comment="openstack-magnum-conductor-3.1.2~a0~dev20-9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594323" comment="openstack-magnum-doc-3.1.2~a0~dev20-9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594324" comment="python-magnum-3.1.2~a0~dev20-9.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7422" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<bugzilla href="https://bugzilla.suse.com/1000346">SUSE bug 1000346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425</cve>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<bugzilla href="https://bugzilla.suse.com/1011406">SUSE bug 1011406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<bugzilla href="https://bugzilla.suse.com/1011390">SUSE bug 1011390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<bugzilla href="https://bugzilla.suse.com/1011417">SUSE bug 1011417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<bugzilla href="https://bugzilla.suse.com/1011404">SUSE bug 1011404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero.  NOTE: this vulnerability exists because of a CVE-2015-8138 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<bugzilla href="https://bugzilla.suse.com/1011395">SUSE bug 1011395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a "root distance that did not include the peer dispersion."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<bugzilla href="https://bugzilla.suse.com/1011411">SUSE bug 1011411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<bugzilla href="https://bugzilla.suse.com/1011398">SUSE bug 1011398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<bugzilla href="https://bugzilla.suse.com/1005581">SUSE bug 1005581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549204" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547200" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549205" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549206" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549207" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549208" comment="mariadb-tools-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7444" ref_url="https://www.suse.com/security/cve/CVE-2016-7444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7444/">CVE-2016-7444</cve>
	<bugzilla href="https://bugzilla.suse.com/999646">SUSE bug 999646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549762" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549763" comment="libgnutls-openssl27-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549764" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547668" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7445" ref_url="https://www.suse.com/security/cve/CVE-2016-7445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2424-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-09/msg00109.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2568-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00104.html" source="SUSE-SU"/>
    <description>
    convert.c in OpenJPEG before 2.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors involving the variable s.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7445/">CVE-2016-7445</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999817">SUSE bug 999817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<bugzilla href="https://bugzilla.suse.com/1000345">SUSE bug 1000345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7530" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7530" ref_url="https://www.suse.com/security/cve/CVE-2016-7530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2671-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2770-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7530/">CVE-2016-7530</cve>
	<bugzilla href="https://bugzilla.suse.com/1000399">SUSE bug 1000399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1000703">SUSE bug 1000703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054924">SUSE bug 1054924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7543" ref_url="https://www.suse.com/security/cve/CVE-2016-7543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2715-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2961-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00100.html" source="SUSE-SU"/>
    <description>
    Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7543/">CVE-2016-7543</cve>
	<bugzilla href="https://bugzilla.suse.com/1001299">SUSE bug 1001299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520998" comment="bash-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521001" comment="libreadline6-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521002" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551004" comment="bash-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551005" comment="libreadline6-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551006" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594763" comment="bash-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520999" comment="bash-doc-4.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594764" comment="libreadline6-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551006" comment="libreadline6-32bit-6.3-83.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521003" comment="readline-doc-6.3-83.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7545" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002612.html" source="SUSE-SU"/>
    <description>
    SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545</cve>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968375">SUSE bug 968375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968674">SUSE bug 968674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549751" comment="policycoreutils-2.5-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549752" comment="policycoreutils-python-2.5-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7567" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003598.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2712-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00005.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<bugzilla href="https://bugzilla.suse.com/1001600">SUSE bug 1001600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074356">SUSE bug 1074356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550962" comment="openslp-2.0.0-18.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550963" comment="openslp-32bit-2.0.0-18.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550964" comment="openslp-server-2.0.0-18.2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7586" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7587" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7589" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. watchOS before 3.1.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7592" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component, which allows remote attackers to obtain sensitive information via crafted JavaScript prompts on a web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7599" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses HTTP redirects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7623" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive information via a blob URL on a web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7632" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7635" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7639" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7641" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7645" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7652" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7654" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7656" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<bugzilla href="https://bugzilla.suse.com/1020950">SUSE bug 1020950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7795" ref_url="https://www.suse.com/security/cve/CVE-2016-7795" source="SUSE CVE"/>
    <description>
    The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7795/">CVE-2016-7795</cve>
	<bugzilla href="https://bugzilla.suse.com/1001765">SUSE bug 1001765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140954" comment="libsystemd0-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140955" comment="libsystemd0-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140956" comment="libudev1-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140957" comment="libudev1-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140958" comment="systemd-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140959" comment="systemd-32bit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140960" comment="systemd-bash-completion-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140961" comment="systemd-sysvinit-228-117.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140962" comment="udev-228-117.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7798" ref_url="https://www.suse.com/security/cve/CVE-2016-7798" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7798/">CVE-2016-7798</cve>
	<bugzilla href="https://bugzilla.suse.com/1055265">SUSE bug 1055265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334078" comment="ruby is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7837" ref_url="https://www.suse.com/security/cve/CVE-2016-7837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2810-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00069.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7837/">CVE-2016-7837</cve>
	<bugzilla href="https://bugzilla.suse.com/1026652">SUSE bug 1026652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334188" comment="bluez is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7907" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<bugzilla href="https://bugzilla.suse.com/1002549">SUSE bug 1002549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910</cve>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7912" ref_url="https://www.suse.com/security/cve/CVE-2016-7912" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the ffs_user_copy_worker function in drivers/usb/gadget/function/f_fs.c in the Linux kernel before 4.5.3 allows local users to gain privileges by accessing an I/O data structure after a certain callback call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7912/">CVE-2016-7912</cve>
	<bugzilla href="https://bugzilla.suse.com/1010480">SUSE bug 1010480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010481">SUSE bug 1010481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913</cve>
	<bugzilla href="https://bugzilla.suse.com/1010478">SUSE bug 1010478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7914" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7914" ref_url="https://www.suse.com/security/cve/CVE-2016-7914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-7914/">CVE-2016-7914</cve>
	<bugzilla href="https://bugzilla.suse.com/1010475">SUSE bug 1010475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7917" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7917" ref_url="https://www.suse.com/security/cve/CVE-2016-7917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7917/">CVE-2016-7917</cve>
	<bugzilla href="https://bugzilla.suse.com/1010444">SUSE bug 1010444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The AH parser in tcpdump before 4.9.0 has a buffer overflow in print-ah.c:ah_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ARP parser in tcpdump before 4.9.0 has a buffer overflow in print-arp.c:arp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:oam_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The compressed SLIP parser in tcpdump before 4.9.0 has a buffer overflow in print-sl.c:sl_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Ethernet parser in tcpdump before 4.9.0 has a buffer overflow in print-ether.c:ethertype_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.0 has a buffer overflow in print-802_11.c:ieee802_11_radio_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The IPComp parser in tcpdump before 4.9.0 has a buffer overflow in print-ipcomp.c:ipcomp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Juniper PPPoE ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-juniper.c:juniper_parse_header().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The LLC/SNAP parser in tcpdump before 4.9.0 has a buffer overflow in print-llc.c:llc_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The MPLS parser in tcpdump before 4.9.0 has a buffer overflow in print-mpls.c:mpls_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The PIM parser in tcpdump before 4.9.0 has a buffer overflow in print-pim.c:pimv2_check_checksum().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The PPP parser in tcpdump before 4.9.0 has a buffer overflow in print-ppp.c:ppp_hdlc_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The RTCP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtcp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The RTP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:rtp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The UDP parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:udp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The VAT parser in tcpdump before 4.9.0 has a buffer overflow in print-udp.c:vat_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ZeroMQ parser in tcpdump before 4.9.0 has an integer overflow in print-zeromq.c:zmtp1_print_frame().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The GRE parser in tcpdump before 4.9.0 has a buffer overflow in print-gre.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The STP parser in tcpdump before 4.9.0 has a buffer overflow in print-stp.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7942" ref_url="https://www.suse.com/security/cve/CVE-2016-7942" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002455.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    The XGetImage function in X.org libX11 before 1.6.4 might allow remote X servers to gain privileges via vectors involving image type and geometry, which triggers out-of-bounds read operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7942/">CVE-2016-7942</cve>
	<bugzilla href="https://bugzilla.suse.com/1002991">SUSE bug 1002991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174752">SUSE bug 1174752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549231" comment="libX11-6-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547226" comment="libX11-6-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009516697" comment="libX11-data-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549232" comment="libX11-xcb1-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547228" comment="libX11-xcb1-32bit-1.6.2-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7944" ref_url="https://www.suse.com/security/cve/CVE-2016-7944" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3059-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00056.html" source="SUSE-SU"/>
    <description>
    Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7944/">CVE-2016-7944</cve>
	<bugzilla href="https://bugzilla.suse.com/1002995">SUSE bug 1002995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7945" ref_url="https://www.suse.com/security/cve/CVE-2016-7945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXi before 1.7.7 allow remote X servers to cause a denial of service (out-of-bounds memory access or infinite loop) via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7945/">CVE-2016-7945</cve>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134167">SUSE bug 1134167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549243" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547236" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7946" ref_url="https://www.suse.com/security/cve/CVE-2016-7946" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7946/">CVE-2016-7946</cve>
	<bugzilla href="https://bugzilla.suse.com/1002998">SUSE bug 1002998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134167">SUSE bug 1134167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549243" comment="libXi6-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547236" comment="libXi6-32bit-1.7.4-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXrandr before 1.5.1 allow remote X servers to trigger out-of-bounds write operations via a crafted response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00048.html" source="SUSE-SU"/>
    <description>
    X.org libXrandr before 1.5.1 allows remote X servers to trigger out-of-bounds write operations by leveraging mishandling of reply data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<bugzilla href="https://bugzilla.suse.com/1003000">SUSE bug 1003000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140759" comment="libXrandr2-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140760" comment="libXrandr2-32bit-1.5.0-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7949" ref_url="https://www.suse.com/security/cve/CVE-2016-7949" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3036-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00050.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXrender before 0.9.10 allow remote X servers to trigger out-of-bounds write operations via vectors involving length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7949/">CVE-2016-7949</cve>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015442">SUSE bug 1015442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123146">SUSE bug 1123146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7950" ref_url="https://www.suse.com/security/cve/CVE-2016-7950" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3036-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00050.html" source="SUSE-SU"/>
    <description>
    The XRenderQueryFilters function in X.org libXrender before 0.9.10 allows remote X servers to trigger out-of-bounds write operations via vectors involving filter name lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7950/">CVE-2016-7950</cve>
	<bugzilla href="https://bugzilla.suse.com/1003002">SUSE bug 1003002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015442">SUSE bug 1015442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123146">SUSE bug 1123146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7951" ref_url="https://www.suse.com/security/cve/CVE-2016-7951" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3037-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00051.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXtst before 1.2.3 allow remote X servers to trigger out-of-bounds memory access operations by leveraging the lack of range checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7951/">CVE-2016-7951</cve>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7952" ref_url="https://www.suse.com/security/cve/CVE-2016-7952" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3037-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00051.html" source="SUSE-SU"/>
    <description>
    X.org libXtst before 1.2.3 allows remote X servers to cause a denial of service (infinite loop) via a reply in the (1) XRecordStartOfData, (2) XRecordEndOfData, or (3) XRecordClientDied category without a client sequence and with attached data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7952/">CVE-2016-7952</cve>
	<bugzilla href="https://bugzilla.suse.com/1003012">SUSE bug 1003012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7953" ref_url="https://www.suse.com/security/cve/CVE-2016-7953" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2600-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00045.html" source="SUSE-SU"/>
    <description>
    Buffer underflow in X.org libXvMC before 1.0.10 allows remote X servers to have unspecified impact via an empty string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7953/">CVE-2016-7953</cve>
	<bugzilla href="https://bugzilla.suse.com/1003023">SUSE bug 1003023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549163" comment="libX11-6-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549164" comment="libX11-6-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517486" comment="libX11-data-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549165" comment="libX11-xcb1-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549166" comment="libX11-xcb1-32bit-1.6.2-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549167" comment="libXfixes3-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549168" comment="libXfixes3-32bit-5.0.1-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549169" comment="libXi6-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549170" comment="libXi6-32bit-1.7.4-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549171" comment="libXrender1-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549172" comment="libXrender1-32bit-0.9.8-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549173" comment="libXtst6-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549174" comment="libXtst6-32bit-1.2.2-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549175" comment="libXv1-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549176" comment="libXv1-32bit-1.0.10-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549177" comment="libXvMC1-1.0.8-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7957" ref_url="https://www.suse.com/security/cve/CVE-2016-7957" source="SUSE CVE"/>
    <description>
    In Wireshark 2.2.0, the Bluetooth L2CAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-btl2cap.c by avoiding use of a seven-byte memcmp for potentially shorter strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7957/">CVE-2016-7957</cve>
	<bugzilla href="https://bugzilla.suse.com/1033717">SUSE bug 1033717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7958" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7958" ref_url="https://www.suse.com/security/cve/CVE-2016-7958" source="SUSE CVE"/>
    <description>
    In Wireshark 2.2.0, the NCP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/CMakeLists.txt by registering this dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7958/">CVE-2016-7958</cve>
	<bugzilla href="https://bugzilla.suse.com/1033712">SUSE bug 1033712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7969" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00068.html" source="SUSE-SU"/>
    <description>
    The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to "0/3 line wrapping equalization."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969</cve>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549256" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7970" ref_url="https://www.suse.com/security/cve/CVE-2016-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7970/">CVE-2016-7970</cve>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549256" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7971" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7971" ref_url="https://www.suse.com/security/cve/CVE-2016-7971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7971/">CVE-2016-7971</cve>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549256" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7972" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002475.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00068.html" source="SUSE-SU"/>
    <description>
    The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972</cve>
	<bugzilla href="https://bugzilla.suse.com/1002982">SUSE bug 1002982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549256" comment="libass5-0.10.2-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The AppleTalk parser in tcpdump before 4.9.0 has a buffer overflow in print-atalk.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The IP parser in tcpdump before 4.9.0 has a buffer overflow in print-ip.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The TCP parser in tcpdump before 4.9.0 has a buffer overflow in print-tcp.c:tcp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The TFTP parser in tcpdump before 4.9.0 has a buffer overflow in print-tftp.c:tftp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The CALM FAST parser in tcpdump before 4.9.0 has a buffer overflow in print-calm-fast.c:calm_fast_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The GeoNetworking parser in tcpdump before 4.9.0 has a buffer overflow in print-geonet.c, multiple functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Classical IP over ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-cip.c:cip_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    A bug in util-print.c:relts_print() in tcpdump before 4.9.0 could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<bugzilla href="https://bugzilla.suse.com/1003613">SUSE bug 1003613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7995" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<bugzilla href="https://bugzilla.suse.com/1003612">SUSE bug 1003612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003870">SUSE bug 1003870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2932-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00015.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<bugzilla href="https://bugzilla.suse.com/1005582">SUSE bug 1005582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008318">SUSE bug 1008318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549204" comment="libmysqlclient18-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547200" comment="libmysqlclient18-32bit-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549205" comment="mariadb-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549206" comment="mariadb-client-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549207" comment="mariadb-errormessages-10.0.28-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549208" comment="mariadb-tools-10.0.28-17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8318" ref_url="https://www.suse.com/security/cve/CVE-2016-8318" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.8 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8318/">CVE-2016-8318</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020872">SUSE bug 1020872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8327" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8327" ref_url="https://www.suse.com/security/cve/CVE-2016-8327" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8327/">CVE-2016-8327</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020893">SUSE bug 1020893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8331" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8331" ref_url="https://www.suse.com/security/cve/CVE-2016-8331" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
    <description>
    An exploitable remote code execution vulnerability exists in the handling of TIFF images in LibTIFF version 4.0.6. A crafted TIFF document can lead to a type confusion vulnerability resulting in remote code execution. This vulnerability can be triggered via a TIFF file delivered to the application using LibTIFF's tag extension functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8331/">CVE-2016-8331</cve>
	<bugzilla href="https://bugzilla.suse.com/1007276">SUSE bug 1007276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary code execution. For a successful attack, the target user needs to open a malicious jpeg2000 file. The jpeg2000 image file format is mostly used for embedding images inside PDF documents and the OpenJpeg library is used by a number of popular PDF renderers making PDF documents a likely attack vector.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332</cve>
	<bugzilla href="https://bugzilla.suse.com/1002414">SUSE bug 1002414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8492" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8492" ref_url="https://www.suse.com/security/cve/CVE-2016-8492" source="SUSE CVE"/>
    <description>
    The implementation of an ANSI X9.31 RNG in Fortinet FortiGate allows attackers to gain unauthorized read access to data handled by the device via IPSec/TLS decryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8492/">CVE-2016-8492</cve>
	<bugzilla href="https://bugzilla.suse.com/1065013">SUSE bug 1065013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The FRF.15 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:frf15_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2017-5482.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004016">SUSE bug 1004016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004021">SUSE bug 1004021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004023">SUSE bug 1004023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8605" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2643-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2645-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-10/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0482-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00070.html" source="SUSE-SU"/>
    <description>
    The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.0.13. Prior versions are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<bugzilla href="https://bugzilla.suse.com/1004221">SUSE bug 1004221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549892" comment="guile-2.0.9-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549893" comment="guile-modules-2_0-2.0.9-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549894" comment="libguile-2_0-22-2.0.9-8.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0487-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00026.html" source="SUSE-SU"/>
    <description>
    A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120592">SUSE bug 1120592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549762" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549763" comment="libgnutls-openssl27-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549764" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547668" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8611</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8611" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8611" ref_url="https://www.suse.com/security/cve/CVE-2016-8611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Openstack Glance. No limits are enforced within the Glance image service for both v1 and v2 `/images` API POST method for authenticated users, resulting in possible denial of service attacks through database table saturation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8611/">CVE-2016-8611</cve>
	<bugzilla href="https://bugzilla.suse.com/1005886">SUSE bug 1005886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594527" comment="crowbar-4.0+git.1528801103.f5708341-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594528" comment="crowbar-core-4.0+git.1534246408.3ab19c567-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594529" comment="crowbar-core-branding-upstream-4.0+git.1534246408.3ab19c567-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594530" comment="crowbar-devel-4.0+git.1528801103.f5708341-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594531" comment="crowbar-ha-4.0+git.1533750802.5768e73-4.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596123" comment="crowbar-openstack-4.0+git.1604938545.30c10db18-9.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594533" comment="crowbar-ui-1.1.0+git.1533844061.4ac8e723-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596124" comment="grafana-6.7.4-1.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596125" comment="influxdb-1.2.4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596126" comment="python-urllib3-1.16-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8614</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8614" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8614" ref_url="https://www.suse.com/security/cve/CVE-2016-8614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2976-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2978-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00029.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8614/">CVE-2016-8614</cve>
	<bugzilla href="https://bugzilla.suse.com/1008038">SUSE bug 1008038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334676" comment="ansible is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<bugzilla href="https://bugzilla.suse.com/1005640">SUSE bug 1005640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<bugzilla href="https://bugzilla.suse.com/1005643">SUSE bug 1005643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00020.html" source="SUSE-SU"/>
    <description>
    curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009135211" comment="curl-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135212" comment="libcurl4-7.37.0-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009135213" comment="libcurl4-32bit-7.37.0-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8628</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8628" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8628" ref_url="https://www.suse.com/security/cve/CVE-2016-8628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2976-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2978-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00029.html" source="SUSE-SU"/>
    <description>
    Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8628/">CVE-2016-8628</cve>
	<bugzilla href="https://bugzilla.suse.com/1008037">SUSE bug 1008037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334676" comment="ansible is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8630" ref_url="https://www.suse.com/security/cve/CVE-2016-8630" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8630/">CVE-2016-8630</cve>
	<bugzilla href="https://bugzilla.suse.com/1009222">SUSE bug 1009222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8632" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00034.html" source="SUSE-SU"/>
    <description>
    The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632</cve>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549246" comment="kernel-default-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549247" comment="kernel-default-base-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549248" comment="kernel-default-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549249" comment="kernel-default-man-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517531" comment="kernel-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517532" comment="kernel-macros-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517533" comment="kernel-source-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549250" comment="kernel-syms-4.4.21-84.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633</cve>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8635" ref_url="https://www.suse.com/security/cve/CVE-2016-8635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
    <description>
    It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8635/">CVE-2016-8635</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015547">SUSE bug 1015547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550209" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550210" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8636" ref_url="https://www.suse.com/security/cve/CVE-2016-8636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving the "RDMA protocol over infiniband" (aka Soft RoCE) technology.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8636/">CVE-2016-8636</cve>
	<bugzilla href="https://bugzilla.suse.com/1024908">SUSE bug 1024908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8637" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003286.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0708-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00047.html" source="SUSE-SU"/>
    <description>
    A local information disclosure issue was found in dracut before 045 when generating initramfs images with world-readable permissions when 'early cpio' is used, such as when including microcode updates. Local attacker can use this to obtain sensitive information from these files, such as encryption keys or credentials.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637</cve>
	<bugzilla href="https://bugzilla.suse.com/1008340">SUSE bug 1008340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550114" comment="dracut-044-108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550115" comment="dracut-fips-044-108.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645</cve>
	<bugzilla href="https://bugzilla.suse.com/1009969">SUSE bug 1009969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646</cve>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8650" ref_url="https://www.suse.com/security/cve/CVE-2016-8650" source="SUSE CVE"/>
    <description>
    The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8650/">CVE-2016-8650</cve>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8654" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
    <description>
    A heap-buffer overflow vulnerability was found in QMFB code in JPC codec caused by buffer being allocated with too small size. jasper versions before 2.0.0 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<bugzilla href="https://bugzilla.suse.com/1012530">SUSE bug 1012530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549990" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547836" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="TID7018348" ref_url="https://www.suse.com/support/kb/doc/?id=7018348" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00034.html" source="SUSE-SU"/>
    <description>
    Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655</cve>
	<bugzilla href="https://bugzilla.suse.com/1012754">SUSE bug 1012754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012759">SUSE bug 1012759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013822">SUSE bug 1013822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549246" comment="kernel-default-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549247" comment="kernel-default-base-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549248" comment="kernel-default-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549249" comment="kernel-default-man-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517531" comment="kernel-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517532" comment="kernel-macros-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517533" comment="kernel-source-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549250" comment="kernel-syms-4.4.21-84.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8658" ref_url="https://www.suse.com/security/cve/CVE-2016-8658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00013.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8658/">CVE-2016-8658</cve>
	<bugzilla href="https://bugzilla.suse.com/1004462">SUSE bug 1004462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009140695" comment="kernel-default-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140696" comment="kernel-default-base-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140697" comment="kernel-default-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140698" comment="kernel-default-man-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140699" comment="kernel-devel-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140700" comment="kernel-macros-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140701" comment="kernel-source-4.4.21-69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009140702" comment="kernel-syms-4.4.21-69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8666" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8666" ref_url="https://www.suse.com/security/cve/CVE-2016-8666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2634-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2637-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2673-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2584-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
    <description>
    The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8666/">CVE-2016-8666</cve>
	<bugzilla href="https://bugzilla.suse.com/1001486">SUSE bug 1001486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001487">SUSE bug 1001487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003964">SUSE bug 1003964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8667" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<bugzilla href="https://bugzilla.suse.com/1004706">SUSE bug 1004706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8687" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006190.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<bugzilla href="https://bugzilla.suse.com/1005070">SUSE bug 1005070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549199" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8688" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<bugzilla href="https://bugzilla.suse.com/1005076">SUSE bug 1005076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549199" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8689" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002421.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3005-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00030.html" source="SUSE-SU"/>
    <description>
    The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<bugzilla href="https://bugzilla.suse.com/1005072">SUSE bug 1005072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549199" comment="libarchive13-3.1.2-25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8690" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<bugzilla href="https://bugzilla.suse.com/1005090">SUSE bug 1005090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<bugzilla href="https://bugzilla.suse.com/1005242">SUSE bug 1005242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8704" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8704" ref_url="https://www.suse.com/security/cve/CVE-2016-8704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2839-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2841-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00072.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the process_bin_append_prepend function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8704/">CVE-2016-8704</cve>
	<bugzilla href="https://bugzilla.suse.com/1007719">SUSE bug 1007719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007866">SUSE bug 1007866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007871">SUSE bug 1007871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334021" comment="memcached is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8705" ref_url="https://www.suse.com/security/cve/CVE-2016-8705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004166.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2839-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2841-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00072.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in process_bin_update function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8705/">CVE-2016-8705</cve>
	<bugzilla href="https://bugzilla.suse.com/1007866">SUSE bug 1007866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007870">SUSE bug 1007870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056865">SUSE bug 1056865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334021" comment="memcached is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8706</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8706" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8706" ref_url="https://www.suse.com/security/cve/CVE-2016-8706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2839-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2841-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00072.html" source="SUSE-SU"/>
    <description>
    An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8706/">CVE-2016-8706</cve>
	<bugzilla href="https://bugzilla.suse.com/1007866">SUSE bug 1007866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007869">SUSE bug 1007869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8707" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8707" ref_url="https://www.suse.com/security/cve/CVE-2016-8707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    An exploitable out of bounds write exists in the handling of compressed TIFF images in ImageMagicks's convert utility. A crafted TIFF document can lead to an out of bounds write which in particular circumstances could be leveraged into remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8707/">CVE-2016-8707</cve>
	<bugzilla href="https://bugzilla.suse.com/1014159">SUSE bug 1014159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549273" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549274" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8735" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8735" ref_url="https://www.suse.com/security/cve/CVE-2016-8735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3079-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7018326" ref_url="https://www.suse.com/support/kb/doc/?id=7018326" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00061.html" source="SUSE-SU"/>
    <description>
    Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8735/">CVE-2016-8735</cve>
	<bugzilla href="https://bugzilla.suse.com/1011805">SUSE bug 1011805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532091" comment="tomcat-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532092" comment="tomcat-admin-webapps-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532093" comment="tomcat-docs-webapp-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532094" comment="tomcat-el-3_0-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532095" comment="tomcat-javadoc-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532096" comment="tomcat-jsp-2_3-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532097" comment="tomcat-lib-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532098" comment="tomcat-servlet-3_1-api-8.0.36-17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532099" comment="tomcat-webapps-8.0.36-17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8740" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8740" ref_url="https://www.suse.com/security/cve/CVE-2016-8740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0297-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00149.html" source="SUSE-SU"/>
    <description>
    The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8740/">CVE-2016-8740</cve>
	<bugzilla href="https://bugzilla.suse.com/1013648">SUSE bug 1013648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550359" comment="apache2-2.4.23-16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533029" comment="apache2-doc-2.4.23-16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550360" comment="apache2-example-pages-2.4.23-16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550361" comment="apache2-prefork-2.4.23-16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550362" comment="apache2-utils-2.4.23-16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550363" comment="apache2-worker-2.4.23-16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2815-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004718.html" source="SUSE-SU"/>
		<reference ref_id="TID7018735" ref_url="https://www.suse.com/support/kb/doc/?id=7018735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0897-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0903-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00076.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<bugzilla href="https://bugzilla.suse.com/1016715">SUSE bug 1016715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033513">SUSE bug 1033513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104826">SUSE bug 1104826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930944">SUSE bug 930944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530249" comment="apache2-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530251" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530252" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530253" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530254" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550050" comment="apache2-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532772" comment="apache2-doc-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550051" comment="apache2-example-pages-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550052" comment="apache2-prefork-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550053" comment="apache2-utils-2.4.23-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550054" comment="apache2-worker-2.4.23-21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550538" comment="apache2-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550539" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550540" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550541" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550542" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594565" comment="apache2-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530250" comment="apache2-doc-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594566" comment="apache2-example-pages-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594567" comment="apache2-prefork-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594568" comment="apache2-utils-2.4.23-29.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594569" comment="apache2-worker-2.4.23-29.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00037.html" source="SUSE-SU"/>
    <description>
    A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745</cve>
	<bugzilla href="https://bugzilla.suse.com/1015119">SUSE bug 1015119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532890" comment="tomcat-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532891" comment="tomcat-admin-webapps-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532892" comment="tomcat-docs-webapp-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532893" comment="tomcat-el-3_0-api-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532894" comment="tomcat-javadoc-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532895" comment="tomcat-jsp-2_3-api-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532896" comment="tomcat-lib-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532897" comment="tomcat-servlet-3_1-api-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532898" comment="tomcat-webapps-8.0.43-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8747" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8747" ref_url="https://www.suse.com/security/cve/CVE-2016-8747" source="SUSE CVE"/>
    <description>
    An information disclosure issue was discovered in Apache Tomcat 8.5.7 to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations. Http11InputBuffer.java allows remote attackers to read data that was intended to be associated with a different request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8747/">CVE-2016-8747</cve>
	<bugzilla href="https://bugzilla.suse.com/1029460">SUSE bug 1029460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0344-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0674-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00032.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests.  NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549575" comment="openssh-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549576" comment="openssh-askpass-gnome-7.2p2-66.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549577" comment="openssh-fips-7.2p2-66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549578" comment="openssh-helpers-7.2p2-66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8862" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8862" ref_url="https://www.suse.com/security/cve/CVE-2016-8862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2964-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2838-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2842-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3089-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3091-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick before 7.0.3.3 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8862/">CVE-2016-8862</cve>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031267">SUSE bug 1031267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549211" comment="libMagickCore-6_Q16-1-6.8.8.1-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549212" comment="libMagickWand-6_Q16-1-6.8.8.1-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2697-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="TID7018224" ref_url="https://www.suse.com/support/kb/doc/?id=7018224" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00017.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<bugzilla href="https://bugzilla.suse.com/1007829">SUSE bug 1007829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020526">SUSE bug 1020526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549156" comment="bind-9.9.9P1-49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549157" comment="bind-chrootenv-9.9.9P1-49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532008" comment="bind-doc-9.9.9P1-49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549158" comment="bind-libs-9.9.9P1-49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547150" comment="bind-libs-32bit-9.9.9P1-49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549159" comment="bind-utils-9.9.9P1-49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8866" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8866" ref_url="https://www.suse.com/security/cve/CVE-2016-8866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3238-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in ImageMagick 7.0.3.3 before 7.0.3.8 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8866/">CVE-2016-8866</cve>
	<bugzilla href="https://bugzilla.suse.com/1007245">SUSE bug 1007245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009318">SUSE bug 1009318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031267">SUSE bug 1031267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549273" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549274" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8880" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4516. Reason: This candidate is a duplicate of CVE-2011-4516. Notes: All CVE users should reference CVE-2011-4516 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<bugzilla href="https://bugzilla.suse.com/1006591">SUSE bug 1006591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8881" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4517. Reason: This candidate is a duplicate of CVE-2011-4517. Notes: All CVE users should reference CVE-2011-4517 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<bugzilla href="https://bugzilla.suse.com/1006593">SUSE bug 1006593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8882" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_tilefini function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<bugzilla href="https://bugzilla.suse.com/1006597">SUSE bug 1006597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8883" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<bugzilla href="https://bugzilla.suse.com/1006598">SUSE bug 1006598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8884" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8690.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8885" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.9 allows remote attackers to cause a denial of service (NULL pointer dereference) by calling the imginfo command with a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<bugzilla href="https://bugzilla.suse.com/1005084">SUSE bug 1005084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007009">SUSE bug 1007009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8886" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2722-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<bugzilla href="https://bugzilla.suse.com/1006599">SUSE bug 1006599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8887" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2737-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2833-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00064.html" source="SUSE-SU"/>
    <description>
    The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<bugzilla href="https://bugzilla.suse.com/1006836">SUSE bug 1006836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1006839">SUSE bug 1006839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549160" comment="libjasper1-1.900.14-181.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547174" comment="libjasper1-32bit-1.900.14-181.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024178">SUSE bug 1024178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9013</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9013" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9013" ref_url="https://www.suse.com/security/cve/CVE-2016-9013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    Django 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3 use a hardcoded password for a temporary database user created when running tests with an Oracle database, which makes it easier for remote attackers to obtain access to the database server by leveraging failure to manually specify a password in the database settings TEST dictionary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9013/">CVE-2016-9013</cve>
	<bugzilla href="https://bugzilla.suse.com/1008050">SUSE bug 1008050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594740" comment="python-Django-1.8.19-3.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9014</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9014" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9014" ref_url="https://www.suse.com/security/cve/CVE-2016-9014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9014/">CVE-2016-9014</cve>
	<bugzilla href="https://bugzilla.suse.com/1008047">SUSE bug 1008047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594740" comment="python-Django-1.8.19-3.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9015</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9015" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015</cve>
	<bugzilla href="https://bugzilla.suse.com/1023502">SUSE bug 1023502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024540">SUSE bug 1024540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009561943" comment="python-PyJWT-1.4.2-3.10.27 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561946" comment="python-oauthlib-0.7.2-3.9.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561948" comment="python-rsa-3.1.4-12.9.17 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009561941" comment="python-setuptools-40.6.2-4.12.23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9042" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550166" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550167" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9061" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9061" ref_url="https://www.suse.com/security/cve/CVE-2016-9061" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A previously installed malicious Android application which defines a specific signature-level permissions used by Firefox can access API keys meant for Firefox only. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9061/">CVE-2016-9061</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010418">SUSE bug 1010418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9062" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9062" ref_url="https://www.suse.com/security/cve/CVE-2016-9062" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Private browsing mode leaves metadata information, such as URLs, for sites visited in "browser.db" and "browser.db-wal" files within the Firefox profile after the mode is exited. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9062/">CVE-2016-9062</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010419">SUSE bug 1010419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00004.html" source="SUSE-SU"/>
    <description>
    An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123115">SUSE bug 1123115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531736" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549064" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549065" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549066" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549067" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549068" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549585" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549586" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549587" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596194" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596195" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596196" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596197" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596198" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR &lt; 45.5 and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010402">SUSE bug 1010402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549233" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549234" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549235" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544426" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549236" comment="libfreebl3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544428" comment="libfreebl3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549237" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544430" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549238" comment="libsoftokn3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544432" comment="libsoftokn3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549239" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544434" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549240" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544436" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549241" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544438" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549242" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9065" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9065" ref_url="https://www.suse.com/security/cve/CVE-2016-9065" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    The location bar in Firefox for Android can be spoofed by forcing a user into fullscreen mode, blocking its exiting, and creating of a fake location bar without any user notification. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9065/">CVE-2016-9065</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010403">SUSE bug 1010403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010404">SUSE bug 1010404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549233" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549234" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549235" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544426" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549236" comment="libfreebl3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544428" comment="libfreebl3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549237" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544430" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549238" comment="libsoftokn3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544432" comment="libsoftokn3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549239" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544434" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549240" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544436" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549241" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544438" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549242" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9067" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Two use-after-free errors during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9068" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A use-after-free during web animations when working with timelines resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010406">SUSE bug 1010406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9069" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    A use-after-free in nsINode::ReplaceOrInsertBefore during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010405">SUSE bug 1010405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9071" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Content Security Policy combined with HTTP to HTTPS redirection can be used by malicious server to verify whether a known site is within a user's browser history. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010425">SUSE bug 1010425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9072" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9072" ref_url="https://www.suse.com/security/cve/CVE-2016-9072" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    When a new Firefox profile is created on 64-bit Windows installations, the sandbox for 64-bit NPAPI plugins is not enabled by default. Note: This issue only affects 64-bit Windows. 32-bit Windows and other operating systems are unaffected. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9072/">CVE-2016-9072</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010407">SUSE bug 1010407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9073" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    WebExtensions can bypass security checks to load privileged URLs and potentially escape the WebExtension sandbox. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010421">SUSE bug 1010421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010422">SUSE bug 1010422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549233" comment="MozillaFirefox-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549234" comment="MozillaFirefox-translations-45.5.0esr-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549235" comment="libfreebl3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544426" comment="libfreebl3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549236" comment="libfreebl3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544428" comment="libfreebl3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549237" comment="libsoftokn3-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544430" comment="libsoftokn3-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549238" comment="libsoftokn3-hmac-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544432" comment="libsoftokn3-hmac-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549239" comment="mozilla-nss-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544434" comment="mozilla-nss-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549240" comment="mozilla-nss-certs-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544436" comment="mozilla-nss-certs-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549241" comment="mozilla-nss-sysinit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544438" comment="mozilla-nss-sysinit-32bit-3.21.3-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549242" comment="mozilla-nss-tools-3.21.3-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9075" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue where WebExtensions can use the mozAddonManager API to elevate privilege due to privileged pages being allowed in the permissions list. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010408">SUSE bug 1010408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9076" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue where a "&lt;select&gt;" dropdown menu can be used to cover location bar content, resulting in potential spoofing attacks. This attack requires e10s to be enabled in order to function. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010423">SUSE bug 1010423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9077" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Canvas allows the use of the "feDisplacementMap" filter on images loaded cross-origin. The rendering by the filter is variable depending on the input pixel, allowing for timing attacks when the images are loaded from third party locations. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010409">SUSE bug 1010409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9078" ref_url="https://www.suse.com/security/cve/CVE-2016-9078" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
    <description>
    Redirection from an HTTP connection to a "data:" URL assigns the referring site's origin to the "data:" URL in some circumstances. This can result in same-origin violations against a domain if it loads resources from malicious sites. Cross-origin setting of cookies has been demonstrated without the ability to read them. Note: This issue only affects Firefox 49 and 50. This vulnerability affects Firefox &lt; 50.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9078/">CVE-2016-9078</cve>
	<bugzilla href="https://bugzilla.suse.com/1012807">SUSE bug 1012807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00012.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox &lt; 50.0.2, Firefox ESR &lt; 45.5.1, and Thunderbird &lt; 45.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<bugzilla href="https://bugzilla.suse.com/1012964">SUSE bug 1012964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549244" comment="MozillaFirefox-45.5.1esr-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549245" comment="MozillaFirefox-translations-45.5.1esr-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9082" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the write_png function in cairo 1.14.6 allows remote attackers to cause a denial of service (invalid pointer dereference) via a large svg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549363" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549364" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549365" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549366" comment="libcairo2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549367" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9083" ref_url="https://www.suse.com/security/cve/CVE-2016-9083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a "state machine confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9083/">CVE-2016-9083</cve>
	<bugzilla href="https://bugzilla.suse.com/1007197">SUSE bug 1007197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9084" ref_url="https://www.suse.com/security/cve/CVE-2016-9084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
    <description>
    drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9084/">CVE-2016-9084</cve>
	<bugzilla href="https://bugzilla.suse.com/1007197">SUSE bug 1007197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9101" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024181">SUSE bug 1024181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<bugzilla href="https://bugzilla.suse.com/1007450">SUSE bug 1007450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014256">SUSE bug 1014256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014259">SUSE bug 1014259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014297">SUSE bug 1014297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034990">SUSE bug 1034990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014279">SUSE bug 1014279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3237-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014299">SUSE bug 1014299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549183" comment="qemu-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532028" comment="qemu-arm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549184" comment="qemu-block-curl-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549185" comment="qemu-block-rbd-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549186" comment="qemu-block-ssh-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549187" comment="qemu-guest-agent-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517506" comment="qemu-ipxe-1.0.0-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549188" comment="qemu-kvm-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549189" comment="qemu-lang-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549190" comment="qemu-ppc-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549191" comment="qemu-s390-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517508" comment="qemu-seabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517509" comment="qemu-sgabios-8-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549192" comment="qemu-tools-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517511" comment="qemu-vgabios-1.9.1-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517512" comment="qemu-x86-2.6.2-31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9112" ref_url="https://www.suse.com/security/cve/CVE-2016-9112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Floating Point Exception (aka FPE or divide by zero) in opj_pi_next_cprl function in openjp2/pi.c:523 in OpenJPEG 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9112/">CVE-2016-9112</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056396">SUSE bug 1056396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9113" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9113" ref_url="https://www.suse.com/security/cve/CVE-2016-9113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference in function imagetobmp of convertbmp.c:980 of OpenJPEG 2.1.2. image-&gt;comps[0].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9113/">CVE-2016-9113</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9114" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9114" ref_url="https://www.suse.com/security/cve/CVE-2016-9114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    There is a NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) of OpenJPEG 2.1.2. image-&gt;comps[compno].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9114/">CVE-2016-9114</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007740">SUSE bug 1007740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9115" ref_url="https://www.suse.com/security/cve/CVE-2016-9115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9115/">CVE-2016-9115</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007741">SUSE bug 1007741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9116" ref_url="https://www.suse.com/security/cve/CVE-2016-9116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9116/">CVE-2016-9116</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007742">SUSE bug 1007742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9117" ref_url="https://www.suse.com/security/cve/CVE-2016-9117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9117/">CVE-2016-9117</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007743">SUSE bug 1007743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9118" ref_url="https://www.suse.com/security/cve/CVE-2016-9118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Heap Buffer Overflow (WRITE of size 4) in function pnmtoimage of convert.c:1719 in OpenJPEG 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9118/">CVE-2016-9118</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007747">SUSE bug 1007747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9120" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9120" ref_url="https://www.suse.com/security/cve/CVE-2016-9120" source="SUSE CVE"/>
    <description>
    Race condition in the ion_ioctl function in drivers/staging/android/ion/ion.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) by calling ION_IOC_FREE on two CPUs at the same time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-9120/">CVE-2016-9120</cve>
	<bugzilla href="https://bugzilla.suse.com/1014747">SUSE bug 1014747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00031.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550108" comment="bind-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550109" comment="bind-chrootenv-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532810" comment="bind-doc-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550110" comment="bind-libs-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547951" comment="bind-libs-32bit-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550111" comment="bind-utils-9.9.9P1-53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00031.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550108" comment="bind-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550109" comment="bind-chrootenv-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532810" comment="bind-doc-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550110" comment="bind-libs-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547951" comment="bind-libs-32bit-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550111" comment="bind-utils-9.9.9P1-53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html" source="SUSE-SU"/>
    <description>
    perl-XML-Twig: The option to `expand_external_ents`, documented as controlling external entity expansion in XML::Twig does not work. External entities are always expanded, regardless of the option's setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180</cve>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334495" comment="perl-XML-Twig is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531924" comment="perl-XML-Twig-3.44-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9189</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9189" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9189" ref_url="https://www.suse.com/security/cve/CVE-2016-9189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005672.html" source="SUSE-SU"/>
    <description>
    Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9189/">CVE-2016-9189</cve>
	<bugzilla href="https://bugzilla.suse.com/1008845">SUSE bug 1008845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594997" comment="python-Pillow-2.8.1-4.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9190</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9190" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9190" ref_url="https://www.suse.com/security/cve/CVE-2016-9190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005487.html" source="SUSE-SU"/>
    <description>
    Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9190/">CVE-2016-9190</cve>
	<bugzilla href="https://bugzilla.suse.com/1008846">SUSE bug 1008846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973786">SUSE bug 973786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594745" comment="python-Pillow-2.8.1-4.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9191" ref_url="https://www.suse.com/security/cve/CVE-2016-9191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The cgroup offline implementation in the Linux kernel through 4.8.11 mishandles certain drain operations, which allows local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9191/">CVE-2016-9191</cve>
	<bugzilla href="https://bugzilla.suse.com/1008842">SUSE bug 1008842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9262" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) jas_realloc function in base/jas_malloc.c and (2) mem_resize function in base/jas_stream.c in JasPer before 1.900.22 allow remote attackers to cause a denial of service via a crafted image, which triggers use after free vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<bugzilla href="https://bugzilla.suse.com/1009994">SUSE bug 1009994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<bugzilla href="https://bugzilla.suse.com/1010163">SUSE bug 1010163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017693">SUSE bug 1017693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<bugzilla href="https://bugzilla.suse.com/1010161">SUSE bug 1010161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011103">SUSE bug 1011103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9298" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9298" ref_url="https://www.suse.com/security/cve/CVE-2016-9298" source="SUSE CVE"/>
    <description>
    Heap overflow in the WaveletDenoiseImage function in MagickCore/fx.c in ImageMagick before 6.9.6-4 and 7.x before 7.0.3-6 allows remote attackers to cause a denial of service (crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9298/">CVE-2016-9298</cve>
	<bugzilla href="https://bugzilla.suse.com/1010164">SUSE bug 1010164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002589.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3280-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html" source="SUSE-SU"/>
    <description>
    ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<bugzilla href="https://bugzilla.suse.com/1011377">SUSE bug 1011377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549264" comment="ntp-4.2.8p9-55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549265" comment="ntp-doc-4.2.8p9-55.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9312" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9312" ref_url="https://www.suse.com/security/cve/CVE-2016-9312" source="SUSE CVE"/>
    <description>
    ntpd in NTP before 4.2.8p9, when running on Windows, allows remote attackers to cause a denial of service via a large UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9312/">CVE-2016-9312</cve>
	<bugzilla href="https://bugzilla.suse.com/1011401">SUSE bug 1011401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011421">SUSE bug 1011421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012330">SUSE bug 1012330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338821" comment="ntp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9313" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9313" ref_url="https://www.suse.com/security/cve/CVE-2016-9313" source="SUSE CVE"/>
    <description>
    security/keys/big_key.c in the Linux kernel before 4.8.7 mishandles unsuccessful crypto registration in conjunction with successful key-type registration, which allows local users to cause a denial of service (NULL pointer dereference and panic) or possibly have unspecified other impact via a crafted application that uses the big_key data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9313/">CVE-2016-9313</cve>
	<bugzilla href="https://bugzilla.suse.com/1012356">SUSE bug 1012356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9317" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0548-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00101.html" source="SUSE-SU"/>
    <description>
    The gdImageCreate function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (system hang) via an oversized image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<bugzilla href="https://bugzilla.suse.com/1022283">SUSE bug 1022283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549984" comment="gd-2.1.0-23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9318" ref_url="https://www.suse.com/security/cve/CVE-2016-9318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005735.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html" source="SUSE-SU"/>
    <description>
    libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9318/">CVE-2016-9318</cve>
	<bugzilla href="https://bugzilla.suse.com/1010675">SUSE bug 1010675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019074">SUSE bug 1019074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118959">SUSE bug 1118959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126613">SUSE bug 1126613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148896">SUSE bug 1148896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549888" comment="libxml2-2-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549889" comment="libxml2-2-32bit-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532625" comment="libxml2-doc-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549890" comment="libxml2-tools-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549891" comment="python-libxml2-2.9.4-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9373" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00116.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<bugzilla href="https://bugzilla.suse.com/1010754">SUSE bug 1010754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9374" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00116.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<bugzilla href="https://bugzilla.suse.com/1010752">SUSE bug 1010752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9375" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00116.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<bugzilla href="https://bugzilla.suse.com/1010740">SUSE bug 1010740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9376" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2923-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-11/msg00116.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<bugzilla href="https://bugzilla.suse.com/1010735">SUSE bug 1010735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010911">SUSE bug 1010911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9377" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<bugzilla href="https://bugzilla.suse.com/1009108">SUSE bug 1009108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9378" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
    <description>
    Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<bugzilla href="https://bugzilla.suse.com/1009108">SUSE bug 1009108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9381" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
    <description>
    Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384</cve>
	<bugzilla href="https://bugzilla.suse.com/1009105">SUSE bug 1009105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<bugzilla href="https://bugzilla.suse.com/1009104">SUSE bug 1009104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9387" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9387" ref_url="https://www.suse.com/security/cve/CVE-2016-9387" source="SUSE CVE"/>
    <description>
    Integer overflow in the jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.13 allows remote attackers to have unspecified impact via a crafted file, which triggers an assertion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9387/">CVE-2016-9387</cve>
	<bugzilla href="https://bugzilla.suse.com/1010960">SUSE bug 1010960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9388" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The ras_getcmap function in ras_dec.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<bugzilla href="https://bugzilla.suse.com/1010975">SUSE bug 1010975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9389" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<bugzilla href="https://bugzilla.suse.com/1010968">SUSE bug 1010968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9390" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<bugzilla href="https://bugzilla.suse.com/1010774">SUSE bug 1010774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9391" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<bugzilla href="https://bugzilla.suse.com/1010782">SUSE bug 1010782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9392" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The calcstepsizes function in jpc_dec.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9393" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jpc_pi_nextrpcl function in jpc_t2cod.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010766">SUSE bug 1010766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9394" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<bugzilla href="https://bugzilla.suse.com/1010756">SUSE bug 1010756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010757">SUSE bug 1010757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9395" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
    <description>
    The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<bugzilla href="https://bugzilla.suse.com/1010977">SUSE bug 1010977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549990" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547836" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9396" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00004.html" source="SUSE-SU"/>
    <description>
    The JPC_NOMINALGAIN function in jpc/jpc_t1cod.c in JasPer through 2.0.12 allows remote attackers to cause a denial of service (JPC_COX_RFT assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396</cve>
	<bugzilla href="https://bugzilla.suse.com/1010783">SUSE bug 1010783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021871">SUSE bug 1021871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082397">SUSE bug 1082397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334493" comment="jasper is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9397" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9397" ref_url="https://www.suse.com/security/cve/CVE-2016-9397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
    <description>
    The jpc_dequantize function in jpc_dec.c in JasPer 1.900.13 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9397/">CVE-2016-9397</cve>
	<bugzilla href="https://bugzilla.suse.com/1010786">SUSE bug 1010786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011829">SUSE bug 1011829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334493" comment="jasper is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9398" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549990" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547836" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9399" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    The calcstepsizes function in jpc_dec.c in JasPer 1.900.22 allows remote attackers to cause a denial of service (assertion failure) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399</cve>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334493" comment="jasper is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1402-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00082.html" source="SUSE-SU"/>
    <description>
    popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123788">SUSE bug 1123788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550226" comment="bash-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518627" comment="bash-doc-4.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550227" comment="libreadline6-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550228" comment="libreadline6-32bit-6.3-82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518631" comment="readline-doc-6.3-82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9427" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9427" ref_url="https://www.suse.com/security/cve/CVE-2016-9427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3126-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00115.html" source="SUSE-SU"/>
    <description>
    Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9427/">CVE-2016-9427</cve>
	<bugzilla href="https://bugzilla.suse.com/1011276">SUSE bug 1011276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549252" comment="libgc1-7.2d-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9434" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<bugzilla href="https://bugzilla.suse.com/1011283">SUSE bug 1011283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9435" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to &lt;dd&gt; tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<bugzilla href="https://bugzilla.suse.com/1011284">SUSE bug 1011284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9436" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a &lt;i&gt; tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<bugzilla href="https://bugzilla.suse.com/1011285">SUSE bug 1011285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9437" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<bugzilla href="https://bugzilla.suse.com/1011286">SUSE bug 1011286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9438" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<bugzilla href="https://bugzilla.suse.com/1011287">SUSE bug 1011287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9439" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<bugzilla href="https://bugzilla.suse.com/1011288">SUSE bug 1011288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<bugzilla href="https://bugzilla.suse.com/1011289">SUSE bug 1011289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9441" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<bugzilla href="https://bugzilla.suse.com/1011290">SUSE bug 1011290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9442" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause memory corruption in certain conditions via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<bugzilla href="https://bugzilla.suse.com/1011291">SUSE bug 1011291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9443" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<bugzilla href="https://bugzilla.suse.com/1011292">SUSE bug 1011292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00031.html" source="SUSE-SU"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550108" comment="bind-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550109" comment="bind-chrootenv-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532810" comment="bind-doc-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550110" comment="bind-libs-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547951" comment="bind-libs-32bit-9.9.9P1-53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550111" comment="bind-utils-9.9.9P1-53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9445" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9445" ref_url="https://www.suse.com/security/cve/CVE-2016-9445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0075-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00048.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the vmnc decoder in the gstreamer allows remote attackers to cause a denial of service (crash) via large width and height values, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9445/">CVE-2016-9445</cve>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549324" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549325" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549326" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549327" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549328" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549329" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549330" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549323" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549331" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549332" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549333" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009540821" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9446" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9446" ref_url="https://www.suse.com/security/cve/CVE-2016-9446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0075-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00048.html" source="SUSE-SU"/>
    <description>
    The vmnc decoder in the gstreamer does not initialize the render canvas, which allows remote attackers to obtain sensitive information as demonstrated by thumbnailing a simple 1 frame vmnc movie that does not draw to the allocated render canvas.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9446/">CVE-2016-9446</cve>
	<bugzilla href="https://bugzilla.suse.com/1010829">SUSE bug 1010829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549324" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549325" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549326" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549327" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549328" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549329" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549330" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549323" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549331" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549332" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549333" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009540821" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9448" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<bugzilla href="https://bugzilla.suse.com/1010161">SUSE bug 1010161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011103">SUSE bug 1011103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0074-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00047.html" source="SUSE-SU"/>
    <description>
    The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<bugzilla href="https://bugzilla.suse.com/1007280">SUSE bug 1007280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011107">SUSE bug 1011107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549334" comment="libtiff5-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547334" comment="libtiff5-32bit-4.0.7-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549335" comment="tiff-4.0.7-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9538" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9538" ref_url="https://www.suse.com/security/cve/CVE-2016-9538" source="SUSE CVE"/>
    <description>
    tools/tiffcrop.c in libtiff 4.0.6 reads an undefined buffer in readContigStripsIntoBuffer() because of a uint16 integer overflow. Reported as MSVR 35100.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9538/">CVE-2016-9538</cve>
	<bugzilla href="https://bugzilla.suse.com/1004519">SUSE bug 1004519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011841">SUSE bug 1011841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3197-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00034.html" source="SUSE-SU"/>
    <description>
    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555</cve>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549246" comment="kernel-default-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549247" comment="kernel-default-base-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549248" comment="kernel-default-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549249" comment="kernel-default-man-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517531" comment="kernel-devel-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517532" comment="kernel-macros-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517533" comment="kernel-source-4.4.21-84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549250" comment="kernel-syms-4.4.21-84.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9556" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9556" ref_url="https://www.suse.com/security/cve/CVE-2016-9556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3024-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9556/">CVE-2016-9556</cve>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549273" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549274" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9557" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
    <description>
    Integer overflow in jas_image.c in JasPer before 1.900.25 allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557</cve>
	<bugzilla href="https://bugzilla.suse.com/1010786">SUSE bug 1010786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011829">SUSE bug 1011829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334493" comment="jasper is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9559" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9559" ref_url="https://www.suse.com/security/cve/CVE-2016-9559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3024-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3027-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    coders/tiff.c in ImageMagick before 7.0.3.7 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9559/">CVE-2016-9559</cve>
	<bugzilla href="https://bugzilla.suse.com/1011136">SUSE bug 1011136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549273" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549274" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9560" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<bugzilla href="https://bugzilla.suse.com/1011830">SUSE bug 1011830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549990" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547836" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9572" ref_url="https://www.suse.com/security/cve/CVE-2016-9572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the way openjpeg 2.1.2 decoded certain input images. Due to a logic error in the code responsible for decoding the input image, an application using openjpeg to process image data could crash when processing a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9572/">CVE-2016-9572</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014543">SUSE bug 1014543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9573" ref_url="https://www.suse.com/security/cve/CVE-2016-9573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9573/">CVE-2016-9573</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014543">SUSE bug 1014543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9574" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9574" ref_url="https://www.suse.com/security/cve/CVE-2016-9574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00089.html" source="SUSE-SU"/>
    <description>
    nss before version 3.30 is vulnerable to a remote denial of service during the session handshake when using SessionTicket extension and ECDHE-ECDSA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9574/">CVE-2016-9574</cve>
	<bugzilla href="https://bugzilla.suse.com/1015499">SUSE bug 1015499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550209" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550210" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9576" ref_url="https://www.suse.com/security/cve/CVE-2016-9576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html" source="SUSE-SU"/>
    <description>
    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9576/">CVE-2016-9576</cve>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014271">SUSE bug 1014271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017710">SUSE bug 1017710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019079">SUSE bug 1019079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019668">SUSE bug 1019668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549257" comment="kernel-default-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549258" comment="kernel-default-base-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549259" comment="kernel-default-devel-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549260" comment="kernel-default-man-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517541" comment="kernel-devel-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517542" comment="kernel-macros-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517543" comment="kernel-source-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549261" comment="kernel-syms-4.4.21-90.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00015.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518386" comment="libspice-server1-0.12.7-8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0421-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00015.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518386" comment="libspice-server1-0.12.7-8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9580" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9580" ref_url="https://www.suse.com/security/cve/CVE-2016-9580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability was found in tiftoimage function in openjpeg 2.1.2, resulting in heap buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9580/">CVE-2016-9580</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014975">SUSE bug 1014975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9581" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9581" ref_url="https://www.suse.com/security/cve/CVE-2016-9581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2567-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00082.html" source="SUSE-SU"/>
    <description>
    An infinite loop vulnerability in tiftoimage that results in heap buffer overflow in convert_32s_C1P1 was found in openjpeg 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9581/">CVE-2016-9581</cve>
	<bugzilla href="https://bugzilla.suse.com/1007739">SUSE bug 1007739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007744">SUSE bug 1007744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014975">SUSE bug 1014975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015662">SUSE bug 1015662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549277" comment="libopenjp2-7-2.1.0-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9583" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<bugzilla href="https://bugzilla.suse.com/1015400">SUSE bug 1015400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550117" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547958" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9584" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2002-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00108.html" source="SUSE-SU"/>
    <description>
    libical allows remote attackers to cause a denial of service (use-after-free) and possibly read heap memory via a crafted ics file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<bugzilla href="https://bugzilla.suse.com/1015964">SUSE bug 1015964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549495" comment="libical1-1.0.1-16.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549496" comment="libical1-32bit-1.0.1-16.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1105-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00094.html" source="SUSE-SU"/>
    <description>
    curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550162" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550163" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547995" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9587</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9587" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2976-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2978-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00029.html" source="SUSE-SU"/>
    <description>
    Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587</cve>
	<bugzilla href="https://bugzilla.suse.com/1019021">SUSE bug 1019021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594299" comment="ansible-2.2.3.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594300" comment="monasca-installer-20170912_10.45-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9591" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0101-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00009.html" source="SUSE-SU"/>
    <description>
    JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<bugzilla href="https://bugzilla.suse.com/1015993">SUSE bug 1015993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549990" comment="libjasper1-1.900.14-184.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547836" comment="libjasper1-32bit-1.900.14-184.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9594" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9594" ref_url="https://www.suse.com/security/cve/CVE-2016-9594" source="SUSE CVE"/>
    <description>
    curl before version 7.52.1 is vulnerable to an uninitialized random in libcurl's internal function that returns a good 32bit random value.  Having a weak or virtually non-existent random value makes the operations that use it vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9594/">CVE-2016-9594</cve>
	<bugzilla href="https://bugzilla.suse.com/1016738">SUSE bug 1016738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017161">SUSE bug 1017161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042181">SUSE bug 1042181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9597" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9597" ref_url="https://www.suse.com/security/cve/CVE-2016-9597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0446-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html" source="SUSE-SU"/>
    <description>
    It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9597/">CVE-2016-9597</cve>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549888" comment="libxml2-2-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549889" comment="libxml2-2-32bit-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532625" comment="libxml2-doc-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549890" comment="libxml2-tools-2.9.4-33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549891" comment="python-libxml2-2.9.4-33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9598" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9598" ref_url="https://www.suse.com/security/cve/CVE-2016-9598" source="SUSE CVE"/>
    <description>
    libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document. NOTE: this vulnerability exists because of a missing fix for CVE-2016-4483.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9598/">CVE-2016-9598</cve>
	<bugzilla href="https://bugzilla.suse.com/1026099">SUSE bug 1026099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334009" comment="libxml2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9600" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<bugzilla href="https://bugzilla.suse.com/1018088">SUSE bug 1018088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550117" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547958" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9601" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9601" ref_url="https://www.suse.com/security/cve/CVE-2016-9601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9601/">CVE-2016-9601</cve>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550292" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550293" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9602" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9603" ref_url="https://www.suse.com/security/cve/CVE-2016-9603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9603/">CVE-2016-9603</cve>
	<bugzilla href="https://bugzilla.suse.com/1028655">SUSE bug 1028655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028656">SUSE bug 1028656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549592" comment="xen-doc-html-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549593" comment="xen-tools-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549594" comment="xen-tools-domU-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9621" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-9429.  Reason: This candidate is a reservation duplicate of CVE-2016-9429.  Notes: All CVE users should reference CVE-2016-9429 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<bugzilla href="https://bugzilla.suse.com/1011278">SUSE bug 1011278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012020">SUSE bug 1012020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9622" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012021">SUSE bug 1012021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9623" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012022">SUSE bug 1012022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012023">SUSE bug 1012023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9625" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012024">SUSE bug 1012024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9626" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012025">SUSE bug 1012025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9627" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (heap buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012026">SUSE bug 1012026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9628" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012027">SUSE bug 1012027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9629" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012028">SUSE bug 1012028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9630" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012029">SUSE bug 1012029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9631" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012030">SUSE bug 1012030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9632" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012031">SUSE bug 1012031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9633" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002454.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3121-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (infinite loop and resource consumption) via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<bugzilla href="https://bugzilla.suse.com/1011293">SUSE bug 1011293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012032">SUSE bug 1012032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549251" comment="w3m-0.5.3.git20161120-160.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9634" ref_url="https://www.suse.com/security/cve/CVE-2016-9634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via the start_line parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9634/">CVE-2016-9634</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549336" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9635" ref_url="https://www.suse.com/security/cve/CVE-2016-9635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9635/">CVE-2016-9635</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549336" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9636" ref_url="https://www.suse.com/security/cve/CVE-2016-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'write count' that goes beyond the initialized buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9636/">CVE-2016-9636</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549336" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9637" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517535" comment="xen-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549253" comment="xen-doc-html-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517536" comment="xen-libs-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517537" comment="xen-libs-32bit-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549254" comment="xen-tools-4.7.1_02-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549255" comment="xen-tools-domU-4.7.1_02-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9642" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9642" ref_url="https://www.suse.com/security/cve/CVE-2016-9642" source="SUSE CVE"/>
    <description>
    JavaScriptCore in WebKit allows attackers to cause a denial of service (out-of-bounds heap read) via a crafted Javascript file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9642/">CVE-2016-9642</cve>
	<bugzilla href="https://bugzilla.suse.com/1013715">SUSE bug 1013715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9643" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9643" ref_url="https://www.suse.com/security/cve/CVE-2016-9643" source="SUSE CVE"/>
    <description>
    The regex code in Webkit 2.4.11 allows remote attackers to cause a denial of service (memory consumption) as demonstrated in a large number of ($ (open parenthesis and dollar) followed by {-2,16} and a large number of +) (plus close parenthesis).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9643/">CVE-2016-9643</cve>
	<bugzilla href="https://bugzilla.suse.com/1015783">SUSE bug 1015783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9644" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9644" ref_url="https://www.suse.com/security/cve/CVE-2016-9644" source="SUSE CVE"/>
    <description>
    The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel 4.4.22 through 4.4.28 contains extended asm statements that are incompatible with the exception table, which allows local users to obtain root access on non-SMEP platforms via a crafted application.  NOTE: this vulnerability exists because of incorrect backporting of the CVE-2016-9178 patch to older kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9644/">CVE-2016-9644</cve>
	<bugzilla href="https://bugzilla.suse.com/1008650">SUSE bug 1008650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012353">SUSE bug 1012353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9685" ref_url="https://www.suse.com/security/cve/CVE-2016-9685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9685/">CVE-2016-9685</cve>
	<bugzilla href="https://bugzilla.suse.com/1012832">SUSE bug 1012832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9755" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9755" ref_url="https://www.suse.com/security/cve/CVE-2016-9755" source="SUSE CVE"/>
    <description>
    The netfilter subsystem in the Linux kernel before 4.9 mishandles IPv6 reassembly, which allows local users to cause a denial of service (integer overflow, out-of-bounds write, and GPF) or possibly have unspecified other impact via a crafted application that makes socket, connect, and writev system calls, related to net/ipv6/netfilter/nf_conntrack_reasm.c and net/ipv6/netfilter/nf_defrag_ipv6_hooks.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9755/">CVE-2016-9755</cve>
	<bugzilla href="https://bugzilla.suse.com/1013060">SUSE bug 1013060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9756" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00000.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756</cve>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9773" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9773" ref_url="https://www.suse.com/security/cve/CVE-2016-9773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9773/">CVE-2016-9773</cve>
	<bugzilla href="https://bugzilla.suse.com/1011130">SUSE bug 1011130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013376">SUSE bug 1013376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017421">SUSE bug 1017421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549273" comment="libMagickCore-6_Q16-1-6.8.8.1-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549274" comment="libMagickWand-6_Q16-1-6.8.8.1-54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024182">SUSE bug 1024182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9777" ref_url="https://www.suse.com/security/cve/CVE-2016-9777" source="SUSE CVE"/>
    <description>
    KVM in the Linux kernel before 4.8.12, when I/O APIC is enabled, does not properly restrict the VCPU index, which allows guest OS users to gain host OS privileges or cause a denial of service (out-of-bounds array access and host OS crash) via a crafted interrupt request, related to arch/x86/kvm/ioapic.c and arch/x86/kvm/ioapic.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9777/">CVE-2016-9777</cve>
	<bugzilla href="https://bugzilla.suse.com/1013283">SUSE bug 1013283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9778" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9778" ref_url="https://www.suse.com/security/cve/CVE-2016-9778" source="SUSE CVE"/>
    <description>
    An error in handling certain queries can cause an assertion failure when a server is using the nxdomain-redirect feature to cover a zone for which it is also providing authoritative service. A vulnerable server could be intentionally stopped by an attacker if it was using a configuration that met the criteria for the vulnerability and if the attacker could cause it to accept a query that possessed the required attributes. Please note: This vulnerability affects the "nxdomain-redirect" feature, which is one of two methods of handling NXDOMAIN redirection, and is only available in certain versions of BIND. Redirection using zones of type "redirect" is not affected by this vulnerability. Affects BIND 9.9.8-S1 -&gt; 9.9.8-S3, 9.9.9-S1 -&gt; 9.9.9-S6, 9.11.0-9.11.0-P1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9778/">CVE-2016-9778</cve>
	<bugzilla href="https://bugzilla.suse.com/1018699">SUSE bug 1018699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018703">SUSE bug 1018703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9793" ref_url="https://www.suse.com/security/cve/CVE-2016-9793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9793/">CVE-2016-9793</cve>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00057.html" source="SUSE-SU"/>
    <description>
    Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794</cve>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013543">SUSE bug 1013543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549257" comment="kernel-default-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549258" comment="kernel-default-base-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549259" comment="kernel-default-devel-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549260" comment="kernel-default-man-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517541" comment="kernel-devel-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517542" comment="kernel-macros-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517543" comment="kernel-source-4.4.21-90.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549261" comment="kernel-syms-4.4.21-90.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9799" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9799" ref_url="https://www.suse.com/security/cve/CVE-2016-9799" source="SUSE CVE"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "pklg_read_hci" function in "btsnoop.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9799/">CVE-2016-9799</cve>
	<bugzilla href="https://bugzilla.suse.com/1013716">SUSE bug 1013716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9801" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00064.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "set_ext_ctrl" function in "tools/parser/l2cap.c" source file when processing corrupted dump file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801</cve>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334188" comment="bluez is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9806" ref_url="https://www.suse.com/security/cve/CVE-2016-9806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9806/">CVE-2016-9806</cve>
	<bugzilla href="https://bugzilla.suse.com/1013540">SUSE bug 1013540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017589">SUSE bug 1017589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9807" ref_url="https://www.suse.com/security/cve/CVE-2016-9807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    The flx_decode_chunks function in gst/flx/gstflxdec.c in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted FLIC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9807/">CVE-2016-9807</cve>
	<bugzilla href="https://bugzilla.suse.com/1013655">SUSE bug 1013655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549336" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9808" ref_url="https://www.suse.com/security/cve/CVE-2016-9808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    The FLIC decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via a crafted series of skip and count pairs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9808/">CVE-2016-9808</cve>
	<bugzilla href="https://bugzilla.suse.com/1012102">SUSE bug 1012102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012103">SUSE bug 1012103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012104">SUSE bug 1012104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013653">SUSE bug 1013653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549336" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9809" ref_url="https://www.suse.com/security/cve/CVE-2016-9809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0152-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0157-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00147.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9809/">CVE-2016-9809</cve>
	<bugzilla href="https://bugzilla.suse.com/1013659">SUSE bug 1013659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549324" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549325" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549326" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549327" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549328" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549329" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549330" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549323" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549331" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549332" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549333" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009540821" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9810" ref_url="https://www.suse.com/security/cve/CVE-2016-9810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0847-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00105.html" source="SUSE-SU"/>
    <description>
    The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9810/">CVE-2016-9810</cve>
	<bugzilla href="https://bugzilla.suse.com/1013663">SUSE bug 1013663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549336" comment="gstreamer-plugins-good-1.8.3-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517607" comment="gstreamer-plugins-good-lang-1.8.3-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9811" ref_url="https://www.suse.com/security/cve/CVE-2016-9811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002598.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0145-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0148-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0161-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0311-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0325-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00169.html" source="SUSE-SU"/>
    <description>
    The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9811/">CVE-2016-9811</cve>
	<bugzilla href="https://bugzilla.suse.com/1013669">SUSE bug 1013669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549501" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549340" comment="gstreamer-plugins-base-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517611" comment="gstreamer-plugins-base-lang-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549341" comment="libgstallocators-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549502" comment="libgstapp-0_10-0-32bit-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549342" comment="libgstapp-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549343" comment="libgstapp-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549344" comment="libgstaudio-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549345" comment="libgstaudio-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549346" comment="libgstfft-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549503" comment="libgstinterfaces-0_10-0-32bit-0.10.36-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549347" comment="libgstpbutils-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549348" comment="libgstpbutils-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549349" comment="libgstriff-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549350" comment="libgstrtp-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549351" comment="libgstrtsp-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549352" comment="libgstsdp-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549353" comment="libgsttag-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549354" comment="libgsttag-1_0-0-32bit-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549355" comment="libgstvideo-1_0-0-1.8.3-9.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549356" comment="libgstvideo-1_0-0-32bit-1.8.3-9.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9812" ref_url="https://www.suse.com/security/cve/CVE-2016-9812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0152-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00084.html" source="SUSE-SU"/>
    <description>
    The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9812/">CVE-2016-9812</cve>
	<bugzilla href="https://bugzilla.suse.com/1013678">SUSE bug 1013678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549324" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549325" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549326" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549327" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549328" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549329" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549330" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549323" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549331" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549332" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549333" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009540821" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9813" ref_url="https://www.suse.com/security/cve/CVE-2016-9813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0072-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0152-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00084.html" source="SUSE-SU"/>
    <description>
    The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9813/">CVE-2016-9813</cve>
	<bugzilla href="https://bugzilla.suse.com/1013680">SUSE bug 1013680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549324" comment="gstreamer-plugins-bad-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517595" comment="gstreamer-plugins-bad-lang-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549325" comment="libgstadaptivedemux-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549326" comment="libgstbadaudio-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549327" comment="libgstbadbase-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549328" comment="libgstbadvideo-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549329" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549330" comment="libgstcodecparsers-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549323" comment="libgstegl-1_0-0-1.2.4-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549331" comment="libgstgl-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549332" comment="libgstmpegts-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549333" comment="libgstphotography-1_0-0-1.8.3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009540821" comment="libgsturidownloader-1_0-0-1.8.3-14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9815" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9815" ref_url="https://www.suse.com/security/cve/CVE-2016-9815" source="SUSE CVE"/>
    <description>
    Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host panic) by sending an asynchronous abort.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9815/">CVE-2016-9815</cve>
	<bugzilla href="https://bugzilla.suse.com/1012652">SUSE bug 1012652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9816" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9816" ref_url="https://www.suse.com/security/cve/CVE-2016-9816" source="SUSE CVE"/>
    <description>
    Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at EL2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9816/">CVE-2016-9816</cve>
	<bugzilla href="https://bugzilla.suse.com/1012652">SUSE bug 1012652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9817" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9817" ref_url="https://www.suse.com/security/cve/CVE-2016-9817" source="SUSE CVE"/>
    <description>
    Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving a (1) data or (2) prefetch abort with the ESR_EL2.EA bit set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9817/">CVE-2016-9817</cve>
	<bugzilla href="https://bugzilla.suse.com/1012652">SUSE bug 1012652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9818" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9818" ref_url="https://www.suse.com/security/cve/CVE-2016-9818" source="SUSE CVE"/>
    <description>
    Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at HYP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9818/">CVE-2016-9818</cve>
	<bugzilla href="https://bugzilla.suse.com/1012652">SUSE bug 1012652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0077-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0080-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022633">SUSE bug 1022633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023215">SUSE bug 1023215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549906" comment="libz1-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549907" comment="libz1-32bit-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541078" comment="zlib-devel-1.2.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0077-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0080-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<bugzilla href="https://bugzilla.suse.com/1003579">SUSE bug 1003579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022633">SUSE bug 1022633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064070">SUSE bug 1064070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549906" comment="libz1-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549907" comment="libz1-32bit-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541078" comment="zlib-devel-1.2.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0077-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0080-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022633">SUSE bug 1022633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023215">SUSE bug 1023215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549906" comment="libz1-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549907" comment="libz1-32bit-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541078" comment="zlib-devel-1.2.8-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0077-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0080-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549906" comment="libz1-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549907" comment="libz1-32bit-1.2.8-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541078" comment="zlib-devel-1.2.8-11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844</cve>
	<bugzilla href="https://bugzilla.suse.com/1013992">SUSE bug 1013992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334480" comment="unzip is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9845" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<bugzilla href="https://bugzilla.suse.com/1013767">SUSE bug 1013767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9846" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<bugzilla href="https://bugzilla.suse.com/1013764">SUSE bug 1013764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9888" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9888" ref_url="https://www.suse.com/security/cve/CVE-2016-9888" source="SUSE CVE"/>
    <description>
    An error within the "tar_directory_for_file()" function (gsf-infile-tar.c) in GNOME Structured File Library before 1.14.41 can be exploited to trigger a Null pointer dereference and subsequently cause a crash via a crafted TAR file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9888/">CVE-2016-9888</cve>
	<bugzilla href="https://bugzilla.suse.com/1014609">SUSE bug 1014609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338940" comment="libgsf is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the Editor. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of "data:" URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
    <description>
    HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
    <description>
    The Pocket toolbar button, once activated, listens for events fired from it's own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3307-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00159.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3308-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0026-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html" source="SUSE-SU"/>
    <description>
    A potentially exploitable crash in "EnumerateSubDocuments" while adding or removing sub-documents. This vulnerability affects Firefox ESR &lt; 45.6 and Thunderbird &lt; 45.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<bugzilla href="https://bugzilla.suse.com/1015422">SUSE bug 1015422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015527">SUSE bug 1015527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015528">SUSE bug 1015528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015529">SUSE bug 1015529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015530">SUSE bug 1015530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015531">SUSE bug 1015531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015533">SUSE bug 1015533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015534">SUSE bug 1015534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015535">SUSE bug 1015535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015536">SUSE bug 1015536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015537">SUSE bug 1015537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015538">SUSE bug 1015538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015540">SUSE bug 1015540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015541">SUSE bug 1015541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015542">SUSE bug 1015542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549270" comment="MozillaFirefox-45.6.0esr-96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549271" comment="MozillaFirefox-translations-45.6.0esr-96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9907" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014490">SUSE bug 1014490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9908" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<bugzilla href="https://bugzilla.suse.com/1014514">SUSE bug 1014514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9911" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<bugzilla href="https://bugzilla.suse.com/1014112">SUSE bug 1014112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014311">SUSE bug 1014311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550190" comment="qemu-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532879" comment="qemu-arm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550191" comment="qemu-block-curl-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550192" comment="qemu-block-rbd-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550193" comment="qemu-block-ssh-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550194" comment="qemu-guest-agent-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518612" comment="qemu-ipxe-1.0.0-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550195" comment="qemu-kvm-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550196" comment="qemu-lang-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550197" comment="qemu-ppc-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550198" comment="qemu-s390-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518614" comment="qemu-seabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518615" comment="qemu-sgabios-8-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550199" comment="qemu-tools-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518617" comment="qemu-vgabios-1.9.1-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518618" comment="qemu-x86-2.6.2-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9914" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9914" ref_url="https://www.suse.com/security/cve/CVE-2016-9914" source="SUSE CVE"/>
    <description>
    Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in FileOperations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9914/">CVE-2016-9914</cve>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014311">SUSE bug 1014311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9915" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9915" ref_url="https://www.suse.com/security/cve/CVE-2016-9915" source="SUSE CVE"/>
    <description>
    Memory leak in hw/9pfs/9p-handle.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the handle backend.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9915/">CVE-2016-9915</cve>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014311">SUSE bug 1014311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9916" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9916" ref_url="https://www.suse.com/security/cve/CVE-2016-9916" source="SUSE CVE"/>
    <description>
    Memory leak in hw/9pfs/9p-proxy.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in the proxy backend.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9916/">CVE-2016-9916</cve>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014311">SUSE bug 1014311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9917" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00069.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "read_n" function in "tools/hcidump.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917</cve>
	<bugzilla href="https://bugzilla.suse.com/1015171">SUSE bug 1015171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334188" comment="bluez is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9918" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1198-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00054.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, an out-of-bounds read was identified in "packet_hexdump" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918</cve>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334188" comment="bluez is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9919" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9919" ref_url="https://www.suse.com/security/cve/CVE-2016-9919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
    <description>
    The icmp6_send function in net/ipv6/icmp.c in the Linux kernel through 4.8.12 omits a certain check of the dst data structure, which allows remote attackers to cause a denial of service (panic) via a fragmented IPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9919/">CVE-2016-9919</cve>
	<bugzilla href="https://bugzilla.suse.com/1014701">SUSE bug 1014701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014743">SUSE bug 1014743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550296" comment="kernel-default-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550297" comment="kernel-default-base-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550298" comment="kernel-default-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550299" comment="kernel-default-man-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518686" comment="kernel-devel-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518687" comment="kernel-macros-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518688" comment="kernel-source-4.4.38-93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550300" comment="kernel-syms-4.4.38-93.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9921" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550005" comment="xen-doc-html-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550006" comment="xen-tools-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550007" comment="xen-tools-domU-4.7.1_06-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550005" comment="xen-doc-html-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550006" comment="xen-tools-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550007" comment="xen-tools-domU-4.7.1_06-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00003.html" source="SUSE-SU"/>
    <description>
    CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009517545" comment="xen-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549266" comment="xen-doc-html-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517546" comment="xen-libs-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517547" comment="xen-libs-32bit-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549267" comment="xen-tools-4.7.1_04-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549268" comment="xen-tools-domU-4.7.1_04-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9933" ref_url="https://www.suse.com/security/cve/CVE-2016-9933" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3228-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3239-1" ref_url="https://lists.opensuse.org/opensuse-updates/2016-12/msg00142.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0006-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0061-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0081-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0598-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9933/">CVE-2016-9933</cve>
	<bugzilla href="https://bugzilla.suse.com/1015187">SUSE bug 1015187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549269" comment="gd-2.1.0-20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9941" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9941" ref_url="https://www.suse.com/security/cve/CVE-2016-9941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00073.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in rfbproto.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message containing a subrectangle outside of the client drawing area.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9941/">CVE-2016-9941</cve>
	<bugzilla href="https://bugzilla.suse.com/1017711">SUSE bug 1017711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550018" comment="libXvnc1-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550844" comment="libvncclient0-0.9.9-17.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550845" comment="libvncserver0-0.9.9-17.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550019" comment="tigervnc-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550020" comment="xorg-x11-Xvnc-1.6.0-16.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9942" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9942" ref_url="https://www.suse.com/security/cve/CVE-2016-9942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00073.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in ultra.c in LibVNCClient in LibVNCServer before 0.9.11 allows remote servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted FramebufferUpdate message with the Ultra type tile, such that the LZO payload decompressed length exceeds what is specified by the tile dimensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9942/">CVE-2016-9942</cve>
	<bugzilla href="https://bugzilla.suse.com/1017712">SUSE bug 1017712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019274">SUSE bug 1019274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550018" comment="libXvnc1-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550844" comment="libvncclient0-0.9.9-17.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550845" comment="libvncserver0-0.9.9-17.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550019" comment="tigervnc-1.6.0-16.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550020" comment="xorg-x11-Xvnc-1.6.0-16.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9952" ref_url="https://www.suse.com/security/cve/CVE-2016-9952" source="SUSE CVE"/>
    <description>
    The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9952/">CVE-2016-9952</cve>
	<bugzilla href="https://bugzilla.suse.com/1092958">SUSE bug 1092958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9953" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9953" ref_url="https://www.suse.com/security/cve/CVE-2016-9953" source="SUSE CVE"/>
    <description>
    The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9953/">CVE-2016-9953</cve>
	<bugzilla href="https://bugzilla.suse.com/1092956">SUSE bug 1092956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9957" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in game-music-emu before 0.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549272" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9958" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    game-music-emu before 0.6.1 allows remote attackers to write to arbitrary memory locations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549272" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9959" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    game-music-emu before 0.6.1 allows remote attackers to generate out of bounds 8-bit values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549272" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9960" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    game-music-emu before 0.6.1 allows local users to cause a denial of service (divide by zero and process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549272" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9961" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00005.html" source="SUSE-SU"/>
    <description>
    game-music-emu before 0.6.1 mishandles unspecified integer values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961</cve>
	<bugzilla href="https://bugzilla.suse.com/1015941">SUSE bug 1015941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549272" comment="libgme0-0.6.0-5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9969</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9969" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9969" ref_url="https://www.suse.com/security/cve/CVE-2016-9969" source="SUSE CVE"/>
    <description>
    In libwebp 0.5.1, there is a double free bug in libwebpmux.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9969/">CVE-2016-9969</cve>
	<bugzilla href="https://bugzilla.suse.com/1136199">SUSE bug 1136199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338941" comment="libwebp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0379</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0379" ref_url="https://www.suse.com/security/cve/CVE-2017-0379" source="SUSE CVE"/>
    <description>
    Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-0379/">CVE-2017-0379</cve>
	<bugzilla href="https://bugzilla.suse.com/1055837">SUSE bug 1055837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00031.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability in silk/NLSF_stabilize.c in libopus in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31607432.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<bugzilla href="https://bugzilla.suse.com/1020102">SUSE bug 1020102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549975" comment="libopus0-1.1-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0386" ref_url="https://www.suse.com/security/cve/CVE-2017-0386" source="SUSE CVE"/>
    <description>
    An elevation of privilege vulnerability in the libnl library could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32255299.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0386/">CVE-2017-0386</cve>
	<bugzilla href="https://bugzilla.suse.com/1020123">SUSE bug 1020123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334653" comment="libnl-1_1 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334647" comment="libnl3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0564" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0564" ref_url="https://www.suse.com/security/cve/CVE-2017-0564" source="SUSE CVE"/>
    <description>
    An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34276203.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-0564/">CVE-2017-0564</cve>
	<bugzilla href="https://bugzilla.suse.com/1033200">SUSE bug 1033200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0605" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0605" ref_url="https://www.suse.com/security/cve/CVE-2017-0605" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0605/">CVE-2017-0605</cve>
	<bugzilla href="https://bugzilla.suse.com/1037331">SUSE bug 1037331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0627" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0627" ref_url="https://www.suse.com/security/cve/CVE-2017-0627" source="SUSE CVE"/>
    <description>
    An information disclosure vulnerability in the kernel UVC driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-33300353.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0627/">CVE-2017-0627</cve>
	<bugzilla href="https://bugzilla.suse.com/1037340">SUSE bug 1037340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0630" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0630" ref_url="https://www.suse.com/security/cve/CVE-2017-0630" source="SUSE CVE"/>
    <description>
    An information disclosure vulnerability in the kernel trace subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34277115.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0630/">CVE-2017-0630</cve>
	<bugzilla href="https://bugzilla.suse.com/1037338">SUSE bug 1037338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0641" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0641" ref_url="https://www.suse.com/security/cve/CVE-2017-0641" source="SUSE CVE"/>
    <description>
    A remote denial of service vulnerability in libvpx in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34360591.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0641/">CVE-2017-0641</cve>
	<bugzilla href="https://bugzilla.suse.com/1056539">SUSE bug 1056539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334008" comment="libvpx is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1746-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00000.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549371" comment="libxml2-2-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549372" comment="libxml2-2-32bit-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532185" comment="libxml2-doc-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549373" comment="libxml2-tools-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549374" comment="python-libxml2-2.9.4-42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0750" ref_url="https://www.suse.com/security/cve/CVE-2017-0750" source="SUSE CVE"/>
    <description>
    A elevation of privilege vulnerability in the Upstream Linux file system. Product: Android. Versions: Android kernel. Android ID: A-36817013.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-0750/">CVE-2017-0750</cve>
	<bugzilla href="https://bugzilla.suse.com/1053160">SUSE bug 1053160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0861" ref_url="https://www.suse.com/security/cve/CVE-2017-0861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1253-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0861/">CVE-2017-0861</cve>
	<bugzilla href="https://bugzilla.suse.com/1088260">SUSE bug 1088260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088268">SUSE bug 1088268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009536761" comment="kgraft-patch-4_4_103-92_53-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536760" comment="kgraft-patch-4_4_103-92_56-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536768" comment="kgraft-patch-4_4_59-92_17-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536769" comment="kgraft-patch-4_4_59-92_20-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536770" comment="kgraft-patch-4_4_59-92_24-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536763" comment="kgraft-patch-4_4_74-92_29-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536762" comment="kgraft-patch-4_4_74-92_32-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536765" comment="kgraft-patch-4_4_74-92_35-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536764" comment="kgraft-patch-4_4_74-92_38-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536759" comment="kgraft-patch-4_4_90-92_45-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536758" comment="kgraft-patch-4_4_90-92_50-default-6-2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0898" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0898" ref_url="https://www.suse.com/security/cve/CVE-2017-0898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0898/">CVE-2017-0898</cve>
	<bugzilla href="https://bugzilla.suse.com/1058755">SUSE bug 1058755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0899" ref_url="https://www.suse.com/security/cve/CVE-2017-0899" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-0899/">CVE-2017-0899</cve>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0900" ref_url="https://www.suse.com/security/cve/CVE-2017-0900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-0900/">CVE-2017-0900</cve>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0901" ref_url="https://www.suse.com/security/cve/CVE-2017-0901" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-0901/">CVE-2017-0901</cve>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0902" ref_url="https://www.suse.com/security/cve/CVE-2017-0902" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0902/">CVE-2017-0902</cve>
	<bugzilla href="https://bugzilla.suse.com/1056286">SUSE bug 1056286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0903" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0903" ref_url="https://www.suse.com/security/cve/CVE-2017-0903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-0903/">CVE-2017-0903</cve>
	<bugzilla href="https://bugzilla.suse.com/1062452">SUSE bug 1062452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000050" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00092.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.12 is vulnerable to a NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component resulting in a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<bugzilla href="https://bugzilla.suse.com/1047958">SUSE bug 1047958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549487" comment="libjasper1-1.900.14-195.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549488" comment="libjasper1-32bit-1.900.14-195.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000082" ref_url="https://www.suse.com/security/cve/CVE-2017-1000082" source="SUSE CVE"/>
    <description>
    systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000082/">CVE-2017-1000082</cve>
	<bugzilla href="https://bugzilla.suse.com/1047023">SUSE bug 1047023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172483">SUSE bug 1172483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000083" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1894-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2390-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00090.html" source="SUSE-SU"/>
    <description>
    backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<bugzilla href="https://bugzilla.suse.com/1046856">SUSE bug 1046856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549951" comment="evince-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549952" comment="evince-browser-plugin-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518422" comment="evince-lang-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549953" comment="evince-plugin-djvudocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549954" comment="evince-plugin-dvidocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549955" comment="evince-plugin-pdfdocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549956" comment="evince-plugin-psdocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549957" comment="evince-plugin-tiffdocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549958" comment="evince-plugin-xpsdocument-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549959" comment="libevdocument3-4-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549960" comment="libevview3-3-3.20.2-6.19.15 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549961" comment="nautilus-evince-3.20.2-6.19.15 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000099" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000099" ref_url="https://www.suse.com/security/cve/CVE-2017-1000099" source="SUSE CVE"/>
    <description>
    When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application's provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000099/">CVE-2017-1000099</cve>
	<bugzilla href="https://bugzilla.suse.com/1051645">SUSE bug 1051645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00080.html" source="SUSE-SU"/>
    <description>
    When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549552" comment="curl-7.37.0-37.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549553" comment="libcurl4-7.37.0-37.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549554" comment="libcurl4-32bit-7.37.0-37.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00080.html" source="SUSE-SU"/>
    <description>
    curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101</cve>
	<bugzilla href="https://bugzilla.suse.com/1051643">SUSE bug 1051643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549552" comment="curl-7.37.0-37.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549553" comment="libcurl4-7.37.0-37.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549554" comment="libcurl4-32bit-7.37.0-37.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000111" ref_url="https://www.suse.com/security/cve/CVE-2017-1000111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000111/">CVE-2017-1000111</cve>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052367">SUSE bug 1052367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549538" comment="kernel-default-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549539" comment="kernel-default-base-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549540" comment="kernel-default-devel-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549541" comment="kernel-default-man-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518008" comment="kernel-devel-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518009" comment="kernel-macros-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518010" comment="kernel-source-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549542" comment="kernel-syms-4.4.74-92.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000112" ref_url="https://www.suse.com/security/cve/CVE-2017-1000112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2423-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2438-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2441-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2443-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2454-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2465-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2469-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2498-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2499-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2511-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00047.html" source="SUSE-SU"/>
    <description>
    Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb-&gt;len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev-&gt;len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000112/">CVE-2017-1000112</cve>
	<bugzilla href="https://bugzilla.suse.com/1052311">SUSE bug 1052311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052368">SUSE bug 1052368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072162">SUSE bug 1072162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549538" comment="kernel-default-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549539" comment="kernel-default-base-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549540" comment="kernel-default-devel-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549541" comment="kernel-default-man-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518008" comment="kernel-devel-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518009" comment="kernel-macros-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518010" comment="kernel-source-4.4.74-92.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549542" comment="kernel-syms-4.4.74-92.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00004.html" source="SUSE-SU"/>
    <description>
    A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117</cve>
	<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052696">SUSE bug 1052696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052932">SUSE bug 1052932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053600">SUSE bug 1053600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054653">SUSE bug 1054653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058214">SUSE bug 1058214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066430">SUSE bug 1066430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071709">SUSE bug 1071709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009540949" comment="git-core-2.12.3-27.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532374" comment="git-doc-2.12.3-27.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000121" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000121" ref_url="https://www.suse.com/security/cve/CVE-2017-1000121" source="SUSE CVE"/>
    <description>
    The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate message size metadata, allowing a compromised secondary process to trigger an integer overflow and subsequent buffer overflow in the UI process. This vulnerability does not affect Apple products.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-1000121/">CVE-2017-1000121</cve>
	<bugzilla href="https://bugzilla.suse.com/1078996">SUSE bug 1078996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000122" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000122" ref_url="https://www.suse.com/security/cve/CVE-2017-1000122" source="SUSE CVE"/>
    <description>
    The UNIX IPC layer in WebKit, including WebKitGTK+ prior to 2.16.3, does not properly validate certain message metadata, allowing a compromised secondary process to cause a denial of service (release assertion) of the UI process. This vulnerability does not affect Apple products.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000122/">CVE-2017-1000122</cve>
	<bugzilla href="https://bugzilla.suse.com/1078994">SUSE bug 1078994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334025" comment="webkitgtk3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000126" ref_url="https://www.suse.com/security/cve/CVE-2017-1000126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    exiv2 0.26 contains a Stack out of bounds read in webp parser
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000126/">CVE-2017-1000126</cve>
	<bugzilla href="https://bugzilla.suse.com/1068873">SUSE bug 1068873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000127" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000127" ref_url="https://www.suse.com/security/cve/CVE-2017-1000127" source="SUSE CVE"/>
    <description>
    Exiv2 0.26 contains a heap buffer overflow in tiff parser
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000127/">CVE-2017-1000127</cve>
	<bugzilla href="https://bugzilla.suse.com/1068872">SUSE bug 1068872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000128" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000128" ref_url="https://www.suse.com/security/cve/CVE-2017-1000128" source="SUSE CVE"/>
    <description>
    Exiv2 0.26 contains a stack out of bounds read in JPEG2000 parser
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000128/">CVE-2017-1000128</cve>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0768-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180768-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00098.html" source="SUSE-SU"/>
    <description>
    CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<bugzilla href="https://bugzilla.suse.com/1068664">SUSE bug 1068664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334164" comment="python is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531736" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549064" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549065" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549066" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549067" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549068" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596194" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596195" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596196" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596197" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596198" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000159" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000159" ref_url="https://www.suse.com/security/cve/CVE-2017-1000159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003891.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0960-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00035.html" source="SUSE-SU"/>
    <description>
    Command injection in evince via filename when printing to PDF. This affects versions earlier than 3.25.91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000159/">CVE-2017-1000159</cve>
	<bugzilla href="https://bugzilla.suse.com/1070046">SUSE bug 1070046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334667" comment="evince is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000198" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000198" ref_url="https://www.suse.com/security/cve/CVE-2017-1000198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003265.html" source="SUSE-SU"/>
    <description>
    tcmu-runner daemon version 0.9.0 to 1.2.0 is vulnerable to invalid memory references in the handler_glfs.so handler resulting in denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000198/">CVE-2017-1000198</cve>
	<bugzilla href="https://bugzilla.suse.com/1049485">SUSE bug 1049485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549668" comment="tcmu-runner-1.0.4-3.3.10 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000199" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000199" ref_url="https://www.suse.com/security/cve/CVE-2017-1000199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003265.html" source="SUSE-SU"/>
    <description>
    tcmu-runner version 0.91 up to 1.20 is vulnerable to information disclosure in handler_qcow.so resulting in non-privileged users being able to check for existence of any file with root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000199/">CVE-2017-1000199</cve>
	<bugzilla href="https://bugzilla.suse.com/1049491">SUSE bug 1049491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549668" comment="tcmu-runner-1.0.4-3.3.10 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000200" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000200" ref_url="https://www.suse.com/security/cve/CVE-2017-1000200" source="SUSE CVE"/>
    <description>
    tcmu-runner version 1.0.5 to 1.2.0 is vulnerable to a dbus triggered NULL pointer dereference in the tcmu-runner daemon's on_unregister_handler() function resulting in denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000200/">CVE-2017-1000200</cve>
	<bugzilla href="https://bugzilla.suse.com/1049489">SUSE bug 1049489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338947" comment="tcmu-runner is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000201" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000201" ref_url="https://www.suse.com/security/cve/CVE-2017-1000201" source="SUSE CVE"/>
    <description>
    The tcmu-runner daemon in tcmu-runner version 1.0.5 to 1.2.0 is vulnerable to a local denial of service attack
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000201/">CVE-2017-1000201</cve>
	<bugzilla href="https://bugzilla.suse.com/1049488">SUSE bug 1049488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338947" comment="tcmu-runner is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000246</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000246" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000246" ref_url="https://www.suse.com/security/cve/CVE-2017-1000246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
    <description>
    Python package pysaml2 version 4.4.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000246/">CVE-2017-1000246</cve>
	<bugzilla href="https://bugzilla.suse.com/1068612">SUSE bug 1068612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000249" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000249" ref_url="https://www.suse.com/security/cve/CVE-2017-1000249" source="SUSE CVE"/>
    <description>
    An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-1000249/">CVE-2017-1000249</cve>
	<bugzilla href="https://bugzilla.suse.com/1056838">SUSE bug 1056838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334026" comment="file is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2810-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00069.html" source="SUSE-SU"/>
    <description>
    All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250</cve>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334188" comment="bluez is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2521-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2548-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2787-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2794-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="TID000019028" ref_url="https://www.suse.com/support/kb/doc/?id=000019028" source="SUSE-SU"/>
		<reference ref_id="TID7021383" ref_url="https://www.suse.com/support/kb/doc/?id=7021383" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057950">SUSE bug 1057950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072162">SUSE bug 1072162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549637" comment="kernel-default-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549638" comment="kernel-default-base-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549639" comment="kernel-default-devel-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549640" comment="kernel-default-man-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518101" comment="kernel-devel-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518102" comment="kernel-macros-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518103" comment="kernel-source-4.4.74-92.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549641" comment="kernel-syms-4.4.74-92.38.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000252" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00019.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252</cve>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000253" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000253" ref_url="https://www.suse.com/security/cve/CVE-2017-1000253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2723-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2725-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
    <description>
    Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm-&gt;mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm-&gt;mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm-&gt;mmap_base into the are that is supposed to be the "gap" between the stack and the binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000253/">CVE-2017-1000253</cve>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061680">SUSE bug 1061680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075506">SUSE bug 1075506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149729">SUSE bug 1149729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2880-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00098.html" source="SUSE-SU"/>
    <description>
    libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549753" comment="curl-7.37.0-37.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549754" comment="libcurl4-7.37.0-37.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549755" comment="libcurl4-32bit-7.37.0-37.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000255" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000255" ref_url="https://www.suse.com/security/cve/CVE-2017-1000255" source="SUSE CVE"/>
    <description>
    On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000255/">CVE-2017-1000255</cve>
	<bugzilla href="https://bugzilla.suse.com/1061633">SUSE bug 1061633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000256" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2878-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00096.html" source="SUSE-SU"/>
    <description>
    libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256</cve>
	<bugzilla href="https://bugzilla.suse.com/1062563">SUSE bug 1062563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2880-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00098.html" source="SUSE-SU"/>
    <description>
    An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257</cve>
	<bugzilla href="https://bugzilla.suse.com/1063824">SUSE bug 1063824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549753" comment="curl-7.37.0-37.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549754" comment="libcurl4-7.37.0-37.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549755" comment="libcurl4-32bit-7.37.0-37.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000364" ref_url="https://www.suse.com/security/cve/CVE-2017-1000364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1922-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1925-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1937-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1943-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1945-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="TID7020973" ref_url="https://www.suse.com/support/kb/doc/?id=7020973" source="SUSE-SU"/>
		<reference ref_id="TID7021086" ref_url="https://www.suse.com/support/kb/doc/?id=7021086" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1685-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00032.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be "jumped" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000364/">CVE-2017-1000364</cve>
	<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042200">SUSE bug 1042200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044985">SUSE bug 1044985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075506">SUSE bug 1075506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549392" comment="kernel-default-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549393" comment="kernel-default-base-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549394" comment="kernel-default-devel-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549395" comment="kernel-default-man-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517660" comment="kernel-devel-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517661" comment="kernel-macros-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517662" comment="kernel-source-4.4.59-92.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549396" comment="kernel-syms-4.4.59-92.24.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000365" ref_url="https://www.suse.com/security/cve/CVE-2017-1000365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00010.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000365/">CVE-2017-1000365</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039349">SUSE bug 1039349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054557">SUSE bug 1054557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="TID7020973" ref_url="https://www.suse.com/support/kb/doc/?id=7020973" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1629-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00024.html" source="SUSE-SU"/>
    <description>
    glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550364" comment="glibc-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550365" comment="glibc-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550366" comment="glibc-devel-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550367" comment="glibc-devel-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533036" comment="glibc-html-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518742" comment="glibc-i18ndata-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533037" comment="glibc-info-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550368" comment="glibc-locale-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550369" comment="glibc-locale-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550370" comment="glibc-profile-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550371" comment="glibc-profile-32bit-2.22-61.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550372" comment="nscd-2.22-61.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550311" comment="sudo-1.8.10p3-10.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1626-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="TID7021027" ref_url="https://www.suse.com/support/kb/doc/?id=7021027" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00034.html" source="SUSE-SU"/>
    <description>
    Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045986">SUSE bug 1045986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549435" comment="sudo-1.8.10p3-10.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000376" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000376" ref_url="https://www.suse.com/security/cve/CVE-2017-1000376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007862.html" source="SUSE-SU"/>
    <description>
    libffi requests an executable stack allowing attackers to more easily trigger arbitrary code execution by overwriting the stack. Please note that libffi is used by a number of other libraries. It was previously stated that this affects libffi version 3.2.1 but this appears to be incorrect. libffi prior to version 3.1 on 32 bit x86 systems was vulnerable, and upstream is believed to have fixed this issue in version 3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000376/">CVE-2017-1000376</cve>
	<bugzilla href="https://bugzilla.suse.com/1045091">SUSE bug 1045091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334342" comment="libffi-gcc5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000379" ref_url="https://www.suse.com/security/cve/CVE-2017-1000379" source="SUSE CVE"/>
    <description>
    The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000379/">CVE-2017-1000379</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044934">SUSE bug 1044934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059525">SUSE bug 1059525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00026.html" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380</cve>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1857-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2179-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00061.html" source="SUSE-SU"/>
    <description>
    The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<bugzilla href="https://bugzilla.suse.com/1044946">SUSE bug 1044946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549441" comment="libcares2-1.9.1-8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009526518" comment="nodejs-common-1.0-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594271" comment="nodejs6-6.11.1-11.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339394" comment="kibana is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000382" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000382" ref_url="https://www.suse.com/security/cve/CVE-2017-1000382" source="SUSE CVE"/>
    <description>
    VIM version 8.0.1187 (and other versions most likely) ignores umask when creating a swap file ("[ORIGINAL_FILENAME].swp") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the vi binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000382/">CVE-2017-1000382</cve>
	<bugzilla href="https://bugzilla.suse.com/1065958">SUSE bug 1065958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070955">SUSE bug 1070955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334500" comment="vim is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000383" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000383" ref_url="https://www.suse.com/security/cve/CVE-2017-1000383" source="SUSE CVE"/>
    <description>
    GNU Emacs version 25.3.1 (and other versions most likely) ignores umask when creating a backup save file ("[ORIGINAL_FILENAME]~") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the emacs binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000383/">CVE-2017-1000383</cve>
	<bugzilla href="https://bugzilla.suse.com/1065957">SUSE bug 1065957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334237" comment="emacs is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000385</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000385" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000385" ref_url="https://www.suse.com/security/cve/CVE-2017-1000385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003896.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3255-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3257-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00038.html" source="SUSE-SU"/>
    <description>
    The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000385/">CVE-2017-1000385</cve>
	<bugzilla href="https://bugzilla.suse.com/1070960">SUSE bug 1070960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594738" comment="erlang-17.5.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594739" comment="erlang-epmd-17.5.6-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000405" ref_url="https://www.suse.com/security/cve/CVE-2017-1000405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3317-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel versions 2.6.38 through 4.14 have a problematic use of pmd_mkdirty() in the touch_pmd() function inside the THP implementation. touch_pmd() can be reached by get_user_pages(). In such case, the pmd will become dirty. This scenario breaks the new can_follow_write_pmd()'s logic - pmd can become dirty without going through a COW cycle. This bug is not as severe as the original "Dirty cow" because an ext4 file (or any other regular file) cannot be mapped using THP. Nevertheless, it does allow us to overwrite read-only huge pages. For example, the zero huge page and sealed shmem files can be overwritten (since their mapping can be populated using THP). Note that after the first write page-fault to the zero page, it will be replaced with a new fresh (and zeroed) thp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000405/">CVE-2017-1000405</cve>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070307">SUSE bug 1070307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549913" comment="kernel-default-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549914" comment="kernel-default-base-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549915" comment="kernel-default-devel-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549916" comment="kernel-default-man-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518392" comment="kernel-devel-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518393" comment="kernel-macros-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518394" comment="kernel-source-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549917" comment="kernel-syms-4.4.90-92.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550834" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550835" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550836" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550837" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533280" comment="glibc-html-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533281" comment="glibc-info-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550838" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550839" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550840" comment="glibc-profile-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550841" comment="glibc-profile-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550842" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550834" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550835" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550836" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550837" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533280" comment="glibc-html-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533281" comment="glibc-info-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550838" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550839" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550840" comment="glibc-profile-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550841" comment="glibc-profile-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550842" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned to an attacker in their uninitialized state. By manipulating the code flows that precede the handling of these configuration messages, an attacker can also gain some control over which data will be held in the uninitialized stack variables. This can allow him to bypass KASLR, and stack canaries protection - as both pointers and stack canaries may be leaked in this manner. Combining this vulnerability (for example) with the previously disclosed RCE vulnerability in L2CAP configuration parsing (CVE-2017-1000251) may allow an attacker to exploit the RCE against kernels which were built with the above mitigations. These are the specifics of this vulnerability: In the function l2cap_parse_conf_rsp and in the function l2cap_parse_conf_req the following variable is declared without initialization: struct l2cap_conf_efs efs; In addition, when parsing input configuration parameters in both of these functions, the switch case for handling EFS elements may skip the memcpy call that will write to the efs variable: ... case L2CAP_CONF_EFS: if (olen == sizeof(efs)) memcpy(&amp;efs, (void *)val, olen); ... The olen in the above if is attacker controlled, and regardless of that if, in both of these functions the efs variable would eventually be added to the outgoing configuration request that is being built: l2cap_add_conf_opt(&amp;ptr, L2CAP_CONF_EFS, sizeof(efs), (unsigned long) &amp;efs); So by sending a configuration request, or response, that contains an L2CAP_CONF_EFS element, but with an element length that is not sizeof(efs) - the memcpy to the uninitialized efs variable can be avoided, and the uninitialized variable would be returned to the attacker (16 bytes).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410</cve>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000433</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000433" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000433" ref_url="https://www.suse.com/security/cve/CVE-2017-1000433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005539.html" source="SUSE-SU"/>
    <description>
    pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000433/">CVE-2017-1000433</cve>
	<bugzilla href="https://bugzilla.suse.com/1074662">SUSE bug 1074662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594926" comment="caasp-openstack-heat-templates-1.0+git.1553079189.3bf8922-1.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594927" comment="crowbar-4.0+git.1551088848.823bcaa3-7.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594928" comment="crowbar-core-4.0+git.1556285635.ab602dd4d-9.46.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594929" comment="crowbar-core-branding-upstream-4.0+git.1556285635.ab602dd4d-9.46.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594930" comment="crowbar-devel-4.0+git.1551088848.823bcaa3-7.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594931" comment="crowbar-ha-4.0+git.1556181005.47c643d-4.46.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594932" comment="crowbar-openstack-4.0+git.1554887450.ff7c30c1c-9.51.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594933" comment="galera-python-clustercheck-0.0+git.1506329536.8f5878c-1.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594934" comment="openstack-ceilometer-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594935" comment="openstack-ceilometer-agent-central-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594936" comment="openstack-ceilometer-agent-compute-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594937" comment="openstack-ceilometer-agent-ipmi-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594938" comment="openstack-ceilometer-agent-notification-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594939" comment="openstack-ceilometer-api-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594940" comment="openstack-ceilometer-collector-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594941" comment="openstack-ceilometer-doc-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594942" comment="openstack-ceilometer-polling-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594943" comment="openstack-heat-gbp-5.1.1~dev1-2.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594944" comment="python-PyKMIP-0.5.0-3.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594945" comment="python-ceilometer-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594946" comment="python-heat-gbp-5.1.1~dev1-2.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594947" comment="python-pysaml2-4.0.2-3.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594948" comment="ruby2.1-rubygem-crowbar-client-3.9.0-7.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000445" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000445" ref_url="https://www.suse.com/security/cve/CVE-2017-1000445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-1 and older version are vulnerable to null pointer dereference in the MagickCore component and might lead to denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000445/">CVE-2017-1000445</cve>
	<bugzilla href="https://bugzilla.suse.com/1074425">SUSE bug 1074425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000476" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000476" ref_url="https://www.suse.com/security/cve/CVE-2017-1000476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-12 Q16, a CPU exhaustion vulnerability was found in the function ReadDDSInfo in coders/dds.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000476/">CVE-2017-1000476</cve>
	<bugzilla href="https://bugzilla.suse.com/1074610">SUSE bug 1074610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171002201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1002201</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1002201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1002201" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1002201" ref_url="https://www.suse.com/security/cve/CVE-2017-1002201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
    <description>
    In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like &lt; &gt; " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1002201/">CVE-2017-1002201</cve>
	<bugzilla href="https://bugzilla.suse.com/1155089">SUSE bug 1155089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595300" comment="caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595301" comment="crowbar-core-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595302" comment="crowbar-core-branding-upstream-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595303" comment="crowbar-openstack-4.0+git.1573038068.1e32b3205-9.62.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595304" comment="crowbar-ui-1.1.0+git.1547500033.d0fb2bf2-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595305" comment="galera-3-wsrep-provider-25.3.25-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595306" comment="libmariadb3-3.1.2-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595307" comment="mariadb-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595308" comment="mariadb-client-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595309" comment="mariadb-errormessages-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595310" comment="mariadb-galera-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595311" comment="mariadb-tools-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595312" comment="openstack-dashboard-theme-SUSE-2016.2-5.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595313" comment="openstack-heat-templates-0.0.0+git.1515995585.81ed236-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595314" comment="openstack-neutron-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595315" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595316" comment="openstack-neutron-doc-9.4.2~dev21-7.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595317" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595318" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595319" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595320" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595321" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595322" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595323" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595324" comment="openstack-neutron-server-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595325" comment="openstack-nova-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595326" comment="openstack-nova-api-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595327" comment="openstack-nova-cells-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595328" comment="openstack-nova-cert-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595329" comment="openstack-nova-compute-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595330" comment="openstack-nova-conductor-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595331" comment="openstack-nova-console-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595332" comment="openstack-nova-consoleauth-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595333" comment="openstack-nova-doc-14.0.11~dev13-4.37.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595334" comment="openstack-nova-novncproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595335" comment="openstack-nova-placement-api-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595336" comment="openstack-nova-scheduler-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595337" comment="openstack-nova-serialproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595338" comment="openstack-nova-vncproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595339" comment="patterns-cloud-admin-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595340" comment="patterns-cloud-compute-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595341" comment="patterns-cloud-controller-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595342" comment="patterns-cloud-network-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595343" comment="patterns-cloud-user-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595344" comment="python-neutron-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595345" comment="python-nova-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595346" comment="python-oslo.messaging-5.10.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595347" comment="python-oslo.utils-3.16.1-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595348" comment="python-pysaml2-4.0.2-3.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595267" comment="ruby2.1-rubygem-haml-4.0.6-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<bugzilla href="https://bugzilla.suse.com/1049305">SUSE bug 1049305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<bugzilla href="https://bugzilla.suse.com/1049306">SUSE bug 1049306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<bugzilla href="https://bugzilla.suse.com/1049307">SUSE bug 1049307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078</cve>
	<bugzilla href="https://bugzilla.suse.com/1049308">SUSE bug 1049308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<bugzilla href="https://bugzilla.suse.com/1049309">SUSE bug 1049309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<bugzilla href="https://bugzilla.suse.com/1049310">SUSE bug 1049310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<bugzilla href="https://bugzilla.suse.com/1049311">SUSE bug 1049311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<bugzilla href="https://bugzilla.suse.com/1049312">SUSE bug 1049312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<bugzilla href="https://bugzilla.suse.com/1049313">SUSE bug 1049313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<bugzilla href="https://bugzilla.suse.com/1049314">SUSE bug 1049314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<bugzilla href="https://bugzilla.suse.com/1049315">SUSE bug 1049315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<bugzilla href="https://bugzilla.suse.com/1049316">SUSE bug 1049316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10105" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<bugzilla href="https://bugzilla.suse.com/1049317">SUSE bug 1049317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<bugzilla href="https://bugzilla.suse.com/1049318">SUSE bug 1049318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<bugzilla href="https://bugzilla.suse.com/1049319">SUSE bug 1049319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<bugzilla href="https://bugzilla.suse.com/1049320">SUSE bug 1049320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<bugzilla href="https://bugzilla.suse.com/1049321">SUSE bug 1049321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<bugzilla href="https://bugzilla.suse.com/1049322">SUSE bug 1049322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<bugzilla href="https://bugzilla.suse.com/1049323">SUSE bug 1049323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<bugzilla href="https://bugzilla.suse.com/1049324">SUSE bug 1049324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<bugzilla href="https://bugzilla.suse.com/1049325">SUSE bug 1049325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<bugzilla href="https://bugzilla.suse.com/1049326">SUSE bug 1049326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10125" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows physical access to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to deployment of Java where the Java Auto Update is enabled. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<bugzilla href="https://bugzilla.suse.com/1049327">SUSE bug 1049327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<bugzilla href="https://bugzilla.suse.com/1049328">SUSE bug 1049328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<bugzilla href="https://bugzilla.suse.com/1049329">SUSE bug 1049329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<bugzilla href="https://bugzilla.suse.com/1049330">SUSE bug 1049330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<bugzilla href="https://bugzilla.suse.com/1049331">SUSE bug 1049331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<bugzilla href="https://bugzilla.suse.com/1049332">SUSE bug 1049332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049333">SUSE bug 1049333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544971" comment="java-1_7_1-ibm-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534249" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534252" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.10-38.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547589" comment="java-1_8_0-ibm-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534735" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534737" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.10-30.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549555" comment="java-1_8_0-openjdk-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549556" comment="java-1_8_0-openjdk-demo-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549557" comment="java-1_8_0-openjdk-devel-1.8.0.144-27.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549558" comment="java-1_8_0-openjdk-headless-1.8.0.144-27.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00029.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<bugzilla href="https://bugzilla.suse.com/1064101">SUSE bug 1064101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550627" comment="libmysqlclient18-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550628" comment="libmysqlclient18-32bit-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550629" comment="mariadb-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550630" comment="mariadb-client-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550631" comment="mariadb-errormessages-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550632" comment="mariadb-tools-10.0.33-29.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<bugzilla href="https://bugzilla.suse.com/1064071">SUSE bug 1064071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<bugzilla href="https://bugzilla.suse.com/1064072">SUSE bug 1064072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<bugzilla href="https://bugzilla.suse.com/1064073">SUSE bug 1064073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10286</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10286" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10286" ref_url="https://www.suse.com/security/cve/CVE-2017-10286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00076.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10286/">CVE-2017-10286</cve>
	<bugzilla href="https://bugzilla.suse.com/1064107">SUSE bug 1064107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10293" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Javadoc). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<bugzilla href="https://bugzilla.suse.com/1064074">SUSE bug 1064074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<bugzilla href="https://bugzilla.suse.com/1064075">SUSE bug 1064075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10309" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10309" ref_url="https://www.suse.com/security/cve/CVE-2017-10309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u144 and 9. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10309/">CVE-2017-10309</cve>
	<bugzilla href="https://bugzilla.suse.com/1064076">SUSE bug 1064076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10320" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320</cve>
	<bugzilla href="https://bugzilla.suse.com/1064113">SUSE bug 1064113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<bugzilla href="https://bugzilla.suse.com/1064077">SUSE bug 1064077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<bugzilla href="https://bugzilla.suse.com/1064078">SUSE bug 1064078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<bugzilla href="https://bugzilla.suse.com/1064079">SUSE bug 1064079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<bugzilla href="https://bugzilla.suse.com/1064080">SUSE bug 1064080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<bugzilla href="https://bugzilla.suse.com/1064081">SUSE bug 1064081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<bugzilla href="https://bugzilla.suse.com/1064082">SUSE bug 1064082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<bugzilla href="https://bugzilla.suse.com/1064083">SUSE bug 1064083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<bugzilla href="https://bugzilla.suse.com/1064084">SUSE bug 1064084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<bugzilla href="https://bugzilla.suse.com/1064085">SUSE bug 1064085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10365" ref_url="https://www.suse.com/security/cve/CVE-2017-10365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 3.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10365/">CVE-2017-10365</cve>
	<bugzilla href="https://bugzilla.suse.com/1064114">SUSE bug 1064114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0400-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00029.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<bugzilla href="https://bugzilla.suse.com/1064115">SUSE bug 1064115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076505">SUSE bug 1076505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550627" comment="libmysqlclient18-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550628" comment="libmysqlclient18-32bit-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550629" comment="mariadb-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550630" comment="mariadb-client-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550631" comment="mariadb-errormessages-10.0.33-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550632" comment="mariadb-tools-10.0.33-29.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10379</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00076.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379</cve>
	<bugzilla href="https://bugzilla.suse.com/1064116">SUSE bug 1064116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10384</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00076.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384</cve>
	<bugzilla href="https://bugzilla.suse.com/1064117">SUSE bug 1064117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00025.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<bugzilla href="https://bugzilla.suse.com/1064086">SUSE bug 1064086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070162">SUSE bug 1070162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550939" comment="java-1_7_0-openjdk-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550940" comment="java-1_7_0-openjdk-demo-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550941" comment="java-1_7_0-openjdk-devel-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550942" comment="java-1_7_0-openjdk-headless-1.7.0.161-43.7.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545271" comment="java-1_7_1-ibm-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535151" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545272" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535154" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.15-38.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547803" comment="java-1_8_0-ibm-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535147" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535149" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.5-30.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549821" comment="java-1_8_0-openjdk-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549822" comment="java-1_8_0-openjdk-demo-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549823" comment="java-1_8_0-openjdk-devel-1.8.0.151-27.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549824" comment="java-1_8_0-openjdk-headless-1.8.0.151-27.8.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00073.html" source="SUSE-SU"/>
    <description>
    Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661</cve>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053153">SUSE bug 1053153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10662" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10662" ref_url="https://www.suse.com/security/cve/CVE-2017-10662" source="SUSE CVE"/>
    <description>
    The sanity_check_raw_super function in fs/f2fs/super.c in the Linux kernel before 4.11.1 does not validate the segment count, which allows local users to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10662/">CVE-2017-10662</cve>
	<bugzilla href="https://bugzilla.suse.com/1053154">SUSE bug 1053154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10663" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10663" ref_url="https://www.suse.com/security/cve/CVE-2017-10663" source="SUSE CVE"/>
    <description>
    The sanity_check_ckpt function in fs/f2fs/super.c in the Linux kernel before 4.12.4 does not validate the blkoff and segno arrays, which allows local users to gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10663/">CVE-2017-10663</cve>
	<bugzilla href="https://bugzilla.suse.com/1053155">SUSE bug 1053155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549592" comment="xen-doc-html-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549593" comment="xen-tools-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549594" comment="xen-tools-domU-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10672" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10672" ref_url="https://www.suse.com/security/cve/CVE-2017-10672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0153-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00056.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-10672/">CVE-2017-10672</cve>
	<bugzilla href="https://bugzilla.suse.com/1046848">SUSE bug 1046848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069732">SUSE bug 1069732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550988" comment="perl-XML-LibXML-2.0019-6.3.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10684" ref_url="https://www.suse.com/security/cve/CVE-2017-10684" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2158-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00048.html" source="SUSE-SU"/>
    <description>
    In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10684/">CVE-2017-10684</cve>
	<bugzilla href="https://bugzilla.suse.com/1046858">SUSE bug 1046858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549522" comment="libncurses5-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549523" comment="libncurses5-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549524" comment="libncurses6-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549525" comment="libncurses6-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009540903" comment="ncurses-devel-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549526" comment="ncurses-devel-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549527" comment="ncurses-utils-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549528" comment="tack-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549529" comment="terminfo-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549530" comment="terminfo-base-5.9-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10685" ref_url="https://www.suse.com/security/cve/CVE-2017-10685" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2158-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00048.html" source="SUSE-SU"/>
    <description>
    In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10685/">CVE-2017-10685</cve>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549522" comment="libncurses5-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549523" comment="libncurses5-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549524" comment="libncurses6-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549525" comment="libncurses6-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009540903" comment="ncurses-devel-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549526" comment="ncurses-devel-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549527" comment="ncurses-utils-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549528" comment="tack-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549529" comment="terminfo-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549530" comment="terminfo-base-5.9-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10784" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10784" ref_url="https://www.suse.com/security/cve/CVE-2017-10784" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10784/">CVE-2017-10784</cve>
	<bugzilla href="https://bugzilla.suse.com/1058754">SUSE bug 1058754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10790" ref_url="https://www.suse.com/security/cve/CVE-2017-10790" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00000.html" source="SUSE-SU"/>
    <description>
    The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10790/">CVE-2017-10790</cve>
	<bugzilla href="https://bugzilla.suse.com/1047002">SUSE bug 1047002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047453">SUSE bug 1047453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530255" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530256" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530257" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530258" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545806" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545807" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545808" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594570" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594571" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594572" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10799" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10799" ref_url="https://www.suse.com/security/cve/CVE-2017-10799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
    <description>
    When GraphicsMagick 1.3.25 processes a DPX image (with metadata indicating a large width) in coders/dpx.c, a denial of service (OOM) can occur in ReadDPXImage().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10799/">CVE-2017-10799</cve>
	<bugzilla href="https://bugzilla.suse.com/1047054">SUSE bug 1047054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10800" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10800" ref_url="https://www.suse.com/security/cve/CVE-2017-10800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    When GraphicsMagick 1.3.25 processes a MATLAB image in coders/mat.c, it can lead to a denial of service (OOM) in ReadMATImage() if the size specified for a MAT Object is larger than the actual amount of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10800/">CVE-2017-10800</cve>
	<bugzilla href="https://bugzilla.suse.com/1047044">SUSE bug 1047044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10806" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10810" ref_url="https://www.suse.com/security/cve/CVE-2017-10810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003747.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10810/">CVE-2017-10810</cve>
	<bugzilla href="https://bugzilla.suse.com/1047277">SUSE bug 1047277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10911" ref_url="https://www.suse.com/security/cve/CVE-2017-10911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10911/">CVE-2017-10911</cve>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043330">SUSE bug 1043330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057378">SUSE bug 1057378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10919" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10919" ref_url="https://www.suse.com/security/cve/CVE-2017-10919" source="SUSE CVE"/>
    <description>
    Xen through 4.8.x mishandles virtual interrupt injection, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-223.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10919/">CVE-2017-10919</cve>
	<bugzilla href="https://bugzilla.suse.com/1047275">SUSE bug 1047275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10923" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10923" ref_url="https://www.suse.com/security/cve/CVE-2017-10923" source="SUSE CVE"/>
    <description>
    Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10923/">CVE-2017-10923</cve>
	<bugzilla href="https://bugzilla.suse.com/1047273">SUSE bug 1047273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10928" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10928" ref_url="https://www.suse.com/security/cve/CVE-2017-10928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-0, a heap-based buffer over-read in the GetNextToken function in token.c allows remote attackers to obtain sensitive information from process memory or possibly have unspecified other impact via a crafted SVG document that is mishandled in the GetUserSpaceCoordinateValue function in coders/svg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10928/">CVE-2017-10928</cve>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047359">SUSE bug 1047359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060176">SUSE bug 1060176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096261">SUSE bug 1096261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10971" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1885-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00025.html" source="SUSE-SU"/>
    <description>
    In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047730">SUSE bug 1047730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549462" comment="xorg-x11-server-7.6_1.18.3-74.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549463" comment="xorg-x11-server-extra-7.6_1.18.3-74.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10972" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1885-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00025.html" source="SUSE-SU"/>
    <description>
    Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047730">SUSE bug 1047730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549462" comment="xorg-x11-server-7.6_1.18.3-74.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549463" comment="xorg-x11-server-extra-7.6_1.18.3-74.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10978" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2845-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00087.html" source="SUSE-SU"/>
    <description>
    An FR-GV-201 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "Read / write overflow in make_secret()" and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549564" comment="freeradius-server-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549565" comment="freeradius-server-doc-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549566" comment="freeradius-server-krb5-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549567" comment="freeradius-server-ldap-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549568" comment="freeradius-server-libs-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549569" comment="freeradius-server-mysql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549570" comment="freeradius-server-perl-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549571" comment="freeradius-server-postgresql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549572" comment="freeradius-server-python-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549573" comment="freeradius-server-sqlite-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549574" comment="freeradius-server-utils-3.0.3-17.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10983" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2845-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00087.html" source="SUSE-SU"/>
    <description>
    An FR-GV-206 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "DHCP - Read overflow when decoding option 63" and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549564" comment="freeradius-server-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549565" comment="freeradius-server-doc-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549566" comment="freeradius-server-krb5-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549567" comment="freeradius-server-ldap-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549568" comment="freeradius-server-libs-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549569" comment="freeradius-server-mysql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549570" comment="freeradius-server-perl-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549571" comment="freeradius-server-postgresql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549572" comment="freeradius-server-python-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549573" comment="freeradius-server-sqlite-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549574" comment="freeradius-server-utils-3.0.3-17.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10984" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10984" ref_url="https://www.suse.com/security/cve/CVE-2017-10984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2845-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00087.html" source="SUSE-SU"/>
    <description>
    An FR-GV-301 issue in FreeRADIUS 3.x before 3.0.15 allows "Write overflow in data2vp_wimax()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10984/">CVE-2017-10984</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549564" comment="freeradius-server-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549565" comment="freeradius-server-doc-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549566" comment="freeradius-server-krb5-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549567" comment="freeradius-server-ldap-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549568" comment="freeradius-server-libs-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549569" comment="freeradius-server-mysql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549570" comment="freeradius-server-perl-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549571" comment="freeradius-server-postgresql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549572" comment="freeradius-server-python-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549573" comment="freeradius-server-sqlite-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549574" comment="freeradius-server-utils-3.0.3-17.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10985" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10985" ref_url="https://www.suse.com/security/cve/CVE-2017-10985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2845-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00087.html" source="SUSE-SU"/>
    <description>
    An FR-GV-302 issue in FreeRADIUS 3.x before 3.0.15 allows "Infinite loop and memory exhaustion with 'concat' attributes" and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10985/">CVE-2017-10985</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549564" comment="freeradius-server-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549565" comment="freeradius-server-doc-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549566" comment="freeradius-server-krb5-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549567" comment="freeradius-server-ldap-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549568" comment="freeradius-server-libs-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549569" comment="freeradius-server-mysql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549570" comment="freeradius-server-perl-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549571" comment="freeradius-server-postgresql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549572" comment="freeradius-server-python-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549573" comment="freeradius-server-sqlite-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549574" comment="freeradius-server-utils-3.0.3-17.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10987" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10987" ref_url="https://www.suse.com/security/cve/CVE-2017-10987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2845-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00087.html" source="SUSE-SU"/>
    <description>
    An FR-GV-304 issue in FreeRADIUS 3.x before 3.0.15 allows "DHCP - Buffer over-read in fr_dhcp_decode_suboptions()" and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10987/">CVE-2017-10987</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549564" comment="freeradius-server-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549565" comment="freeradius-server-doc-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549566" comment="freeradius-server-krb5-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549567" comment="freeradius-server-ldap-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549568" comment="freeradius-server-libs-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549569" comment="freeradius-server-mysql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549570" comment="freeradius-server-perl-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549571" comment="freeradius-server-postgresql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549572" comment="freeradius-server-python-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549573" comment="freeradius-server-sqlite-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549574" comment="freeradius-server-utils-3.0.3-17.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10988" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10988" ref_url="https://www.suse.com/security/cve/CVE-2017-10988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00067.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10988/">CVE-2017-10988</cve>
	<bugzilla href="https://bugzilla.suse.com/1049086">SUSE bug 1049086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549564" comment="freeradius-server-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549565" comment="freeradius-server-doc-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549566" comment="freeradius-server-krb5-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549567" comment="freeradius-server-ldap-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549568" comment="freeradius-server-libs-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549569" comment="freeradius-server-mysql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549570" comment="freeradius-server-perl-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549571" comment="freeradius-server-postgresql-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549572" comment="freeradius-server-python-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549573" comment="freeradius-server-sqlite-3.0.3-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549574" comment="freeradius-server-utils-3.0.3-17.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10989" ref_url="https://www.suse.com/security/cve/CVE-2017-10989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="TID7022306" ref_url="https://www.suse.com/support/kb/doc/?id=7022306" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html" source="SUSE-SU"/>
    <description>
    The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10989/">CVE-2017-10989</cve>
	<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132045">SUSE bug 1132045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333982" comment="sqlite3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10995" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10995" ref_url="https://www.suse.com/security/cve/CVE-2017-10995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The mng_get_long function in coders/png.c in ImageMagick 7.0.6-0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted MNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10995/">CVE-2017-10995</cve>
	<bugzilla href="https://bugzilla.suse.com/1047908">SUSE bug 1047908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11102" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11102" ref_url="https://www.suse.com/security/cve/CVE-2017-11102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
    <description>
    The ReadOneJNGImage function in coders/png.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (application crash) during JNG reading via a zero-length color_image data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11102/">CVE-2017-11102</cve>
	<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107619">SUSE bug 1107619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="TID7021155" ref_url="https://www.suse.com/support/kb/doc/?id=7021155" source="SUSE-SU"/>
		<reference ref_id="TID7022454" ref_url="https://www.suse.com/support/kb/doc/?id=7022454" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2180-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00077.html" source="SUSE-SU"/>
    <description>
    Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103</cve>
	<bugzilla href="https://bugzilla.suse.com/1048278">SUSE bug 1048278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<bugzilla href="https://bugzilla.suse.com/1047873">SUSE bug 1047873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11112" ref_url="https://www.suse.com/security/cve/CVE-2017-11112" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2158-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00048.html" source="SUSE-SU"/>
    <description>
    In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11112/">CVE-2017-11112</cve>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047964">SUSE bug 1047964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549522" comment="libncurses5-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549523" comment="libncurses5-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549524" comment="libncurses6-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549525" comment="libncurses6-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009540903" comment="ncurses-devel-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549526" comment="ncurses-devel-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549527" comment="ncurses-utils-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549528" comment="tack-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549529" comment="terminfo-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549530" comment="terminfo-base-5.9-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11113" ref_url="https://www.suse.com/security/cve/CVE-2017-11113" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2158-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00048.html" source="SUSE-SU"/>
    <description>
    In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11113/">CVE-2017-11113</cve>
	<bugzilla href="https://bugzilla.suse.com/1046853">SUSE bug 1046853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047965">SUSE bug 1047965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549522" comment="libncurses5-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549523" comment="libncurses5-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549524" comment="libncurses6-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549525" comment="libncurses6-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009540903" comment="ncurses-devel-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549526" comment="ncurses-devel-32bit-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549527" comment="ncurses-utils-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549528" comment="tack-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549529" comment="terminfo-5.9-50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549530" comment="terminfo-base-5.9-50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11140" ref_url="https://www.suse.com/security/cve/CVE-2017-11140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
    <description>
    The ReadJPEGImage function in coders/jpeg.c in GraphicsMagick 1.3.26 creates a pixel cache before a successful read of a scanline, which allows remote attackers to cause a denial of service (resource consumption) via crafted JPEG files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11140/">CVE-2017-11140</cve>
	<bugzilla href="https://bugzilla.suse.com/1047900">SUSE bug 1047900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11141" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11141" ref_url="https://www.suse.com/security/cve/CVE-2017-11141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    The ReadMATImage function in coders\mat.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted MAT file, related to incorrect ordering of a SetImageExtent call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11141/">CVE-2017-11141</cve>
	<bugzilla href="https://bugzilla.suse.com/1047898">SUSE bug 1047898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11166" ref_url="https://www.suse.com/security/cve/CVE-2017-11166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11166/">CVE-2017-11166</cve>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11170" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11170" ref_url="https://www.suse.com/security/cve/CVE-2017-11170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadTGAImage function in coders\tga.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via invalid colors data in the header of a TGA or VST file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11170/">CVE-2017-11170</cve>
	<bugzilla href="https://bugzilla.suse.com/1048110">SUSE bug 1048110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048272">SUSE bug 1048272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11171" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11171" ref_url="https://www.suse.com/security/cve/CVE-2017-11171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003137.html" source="SUSE-SU"/>
    <description>
    Bad reference counting in the context of accept_ice_connection() in gsm-xsmp-server.c in old versions of gnome-session up until version 2.29.92 allows a local attacker to establish ICE connections to gnome-session with invalid authentication data (an invalid magic cookie). Each failed authentication attempt will leak a file descriptor in gnome-session. When the maximum number of file descriptors is exhausted in the gnome-session process, it will enter an infinite loop trying to communicate without success, consuming 100% of the CPU. The graphical session associated with the gnome-session process will stop working correctly, because communication with gnome-session is no longer possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11171/">CVE-2017-11171</cve>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334354" comment="gnome-session is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334055" comment="xorg-x11 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176</cve>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11185" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003167.html" source="SUSE-SU"/>
    <description>
    The gmp plugin in strongSwan before 5.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<bugzilla href="https://bugzilla.suse.com/1051222">SUSE bug 1051222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549543" comment="strongswan-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518013" comment="strongswan-doc-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549544" comment="strongswan-hmac-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549545" comment="strongswan-ipsec-5.1.3-26.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549546" comment="strongswan-libs0-5.1.3-26.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11188" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11188" ref_url="https://www.suse.com/security/cve/CVE-2017-11188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadDPXImage function in coders\dpx.c in ImageMagick 7.0.6-0 has a large loop vulnerability that can cause CPU exhaustion via a crafted DPX file, related to lack of an EOF check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11188/">CVE-2017-11188</cve>
	<bugzilla href="https://bugzilla.suse.com/1048457">SUSE bug 1048457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11331" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11331" ref_url="https://www.suse.com/security/cve/CVE-2017-11331" source="SUSE CVE"/>
    <description>
    The wav_open function in oggenc/audio.c in Xiph.Org vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (memory allocation error) via a crafted wav file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11331/">CVE-2017-11331</cve>
	<bugzilla href="https://bugzilla.suse.com/1081744">SUSE bug 1081744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338951" comment="vorbis-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11334" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11336" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11336" ref_url="https://www.suse.com/security/cve/CVE-2017-11336" source="SUSE CVE"/>
    <description>
    There is a heap-based buffer over-read in the Image::printIFDStructure function in image.cpp in Exiv2 0.26. A Crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11336/">CVE-2017-11336</cve>
	<bugzilla href="https://bugzilla.suse.com/1048883">SUSE bug 1048883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11337" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11337" ref_url="https://www.suse.com/security/cve/CVE-2017-11337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is an invalid free in the Action::TaskFactory::cleanup function of actions.cpp in Exiv2 0.26. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11337/">CVE-2017-11337</cve>
	<bugzilla href="https://bugzilla.suse.com/1048883">SUSE bug 1048883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11338" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11338" ref_url="https://www.suse.com/security/cve/CVE-2017-11338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is an infinite loop in the Exiv2::Image::printIFDStructure function of image.cpp in Exiv2 0.26. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11338/">CVE-2017-11338</cve>
	<bugzilla href="https://bugzilla.suse.com/1048883">SUSE bug 1048883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11339" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11339" ref_url="https://www.suse.com/security/cve/CVE-2017-11339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer overflow in the Image::printIFDStructure function of image.cpp in Exiv2 0.26. A Crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11339/">CVE-2017-11339</cve>
	<bugzilla href="https://bugzilla.suse.com/1048883">SUSE bug 1048883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11340" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11340" ref_url="https://www.suse.com/security/cve/CVE-2017-11340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a Segmentation fault in the XmpParser::terminate() function in Exiv2 0.26, related to an exit call. A Crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11340/">CVE-2017-11340</cve>
	<bugzilla href="https://bugzilla.suse.com/1048883">SUSE bug 1048883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11352" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11352" ref_url="https://www.suse.com/security/cve/CVE-2017-11352" source="SUSE CVE"/>
    <description>
    In ImageMagick before 7.0.5-10, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-9144.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11352/">CVE-2017-11352</cve>
	<bugzilla href="https://bugzilla.suse.com/1048936">SUSE bug 1048936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11360" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11360" ref_url="https://www.suse.com/security/cve/CVE-2017-11360" source="SUSE CVE"/>
    <description>
    The ReadRLEImage function in coders\rle.c in ImageMagick 7.0.6-1 has a large loop vulnerability via a crafted rle file that triggers a huge number_pixels value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11360/">CVE-2017-11360</cve>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368" source="SUSE CVE"/>
    <description>
    In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368</cve>
	<bugzilla href="https://bugzilla.suse.com/1049819">SUSE bug 1049819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11403" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11403" ref_url="https://www.suse.com/security/cve/CVE-2017-11403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1985-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00068.html" source="SUSE-SU"/>
    <description>
    The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3.26 has an out-of-order CloseBlob call, resulting in a use-after-free via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11403/">CVE-2017-11403</cve>
	<bugzilla href="https://bugzilla.suse.com/1049072">SUSE bug 1049072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053809">SUSE bug 1053809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084062">SUSE bug 1084062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549560" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549561" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11406" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by rejecting invalid Frame Control parameter values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549509" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549510" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549511" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549512" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549513" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549514" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the MQ dissector could crash. This was addressed in epan/dissectors/packet-mq.c by validating the fragment length before a reassembly attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549509" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549510" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549511" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549512" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549513" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549514" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the AMQP dissector could crash. This was addressed in epan/dissectors/packet-amqp.c by checking for successful list dissection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549509" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549510" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549511" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549512" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549513" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549514" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11410" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding validation of the relationships between indexes and lengths. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-7702.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549509" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549510" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549511" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549512" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549513" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549514" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11411" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by adding length validation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-9350.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549509" comment="libwireshark8-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549510" comment="libwiretap6-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549511" comment="libwscodecs1-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549512" comment="libwsutil7-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549513" comment="wireshark-2.2.8-48.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549514" comment="wireshark-gtk-2.2.8-48.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11423" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
    <description>
    The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550823" comment="clamav-0.99.4-33.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549592" comment="xen-doc-html-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549593" comment="xen-tools-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549594" comment="xen-tools-domU-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11446" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11446" ref_url="https://www.suse.com/security/cve/CVE-2017-11446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The ReadPESImage function in coders\pes.c in ImageMagick 7.0.6-1 has an infinite loop vulnerability that can cause CPU exhaustion via a crafted PES file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11446/">CVE-2017-11446</cve>
	<bugzilla href="https://bugzilla.suse.com/1049379">SUSE bug 1049379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11447" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11447" ref_url="https://www.suse.com/security/cve/CVE-2017-11447" source="SUSE CVE"/>
    <description>
    The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11447/">CVE-2017-11447</cve>
	<bugzilla href="https://bugzilla.suse.com/1049377">SUSE bug 1049377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11448" ref_url="https://www.suse.com/security/cve/CVE-2017-11448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11448/">CVE-2017-11448</cve>
	<bugzilla href="https://bugzilla.suse.com/1049375">SUSE bug 1049375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11449" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11449" ref_url="https://www.suse.com/security/cve/CVE-2017-11449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11449/">CVE-2017-11449</cve>
	<bugzilla href="https://bugzilla.suse.com/1049373">SUSE bug 1049373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11450" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11450" ref_url="https://www.suse.com/security/cve/CVE-2017-11450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via JPEG data that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11450/">CVE-2017-11450</cve>
	<bugzilla href="https://bugzilla.suse.com/1049374">SUSE bug 1049374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2712-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00041.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549714" comment="krb5-1.12.5-40.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549715" comment="krb5-32bit-1.12.5-40.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549716" comment="krb5-client-1.12.5-40.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549717" comment="krb5-doc-1.12.5-40.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549718" comment="krb5-plugin-kdb-ldap-1.12.5-40.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549719" comment="krb5-plugin-preauth-otp-1.12.5-40.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549720" comment="krb5-plugin-preauth-pkinit-1.12.5-40.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549721" comment="krb5-server-1.12.5-40.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2149-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00042.html" source="SUSE-SU"/>
    <description>
    A SIGFPE is raised in the function box_blur_line of rsvg-filter.c in GNOME librsvg 2.40.17 during an attempted parse of a crafted SVG file, because of incorrect protection against division by zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464</cve>
	<bugzilla href="https://bugzilla.suse.com/1049607">SUSE bug 1049607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549531" comment="gdk-pixbuf-loader-rsvg-2.40.18-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549532" comment="librsvg-2-2-2.40.18-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549533" comment="librsvg-2-2-32bit-2.40.18-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549534" comment="rsvg-view-2.40.18-5.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11465" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11465" ref_url="https://www.suse.com/security/cve/CVE-2017-11465" source="SUSE CVE"/>
    <description>
    The parser_yyerror function in the UTF-8 parser in Ruby 2.4.1 allows attackers to cause a denial of service (invalid write or read) or possibly have unspecified other impact via a crafted Ruby script, related to the parser_tokadd_utf8 function in parse.y. NOTE: this might have security relevance as a bypass of a $SAFE protection mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11465/">CVE-2017-11465</cve>
	<bugzilla href="https://bugzilla.suse.com/1049589">SUSE bug 1049589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11472" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11472" ref_url="https://www.suse.com/security/cve/CVE-2017-11472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11472/">CVE-2017-11472</cve>
	<bugzilla href="https://bugzilla.suse.com/1049580">SUSE bug 1049580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11473" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<bugzilla href="https://bugzilla.suse.com/1049603">SUSE bug 1049603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061680">SUSE bug 1061680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11478" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11478" ref_url="https://www.suse.com/security/cve/CVE-2017-11478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadOneDJVUImage function in coders/djvu.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed DJVU image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11478/">CVE-2017-11478</cve>
	<bugzilla href="https://bugzilla.suse.com/1049796">SUSE bug 1049796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11479</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11479" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11479" ref_url="https://www.suse.com/security/cve/CVE-2017-11479" source="SUSE CVE"/>
    <description>
    Kibana versions prior to 5.6.1 had a cross-site scripting (XSS) vulnerability in Timelion that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11479/">CVE-2017-11479</cve>
	<bugzilla href="https://bugzilla.suse.com/1044849">SUSE bug 1044849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075536">SUSE bug 1075536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11481</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11481" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11481" ref_url="https://www.suse.com/security/cve/CVE-2017-11481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
    <description>
    Kibana versions prior to 6.0.1 and 5.6.5 had a cross-site scripting (XSS) vulnerability via URL fields that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11481/">CVE-2017-11481</cve>
	<bugzilla href="https://bugzilla.suse.com/1044849">SUSE bug 1044849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072315">SUSE bug 1072315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11499</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11499" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2179-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00061.html" source="SUSE-SU"/>
    <description>
    Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499</cve>
	<bugzilla href="https://bugzilla.suse.com/1044849">SUSE bug 1044849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048299">SUSE bug 1048299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051117">SUSE bug 1051117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009526518" comment="nodejs-common-1.0-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594271" comment="nodejs6-6.11.1-11.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11505" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11505" ref_url="https://www.suse.com/security/cve/CVE-2017-11505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadOneJNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a malformed JNG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11505/">CVE-2017-11505</cve>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11522" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11522" ref_url="https://www.suse.com/security/cve/CVE-2017-11522" source="SUSE CVE"/>
    <description>
    The WriteOnePNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11522/">CVE-2017-11522</cve>
	<bugzilla href="https://bugzilla.suse.com/1050076">SUSE bug 1050076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11523" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11523" ref_url="https://www.suse.com/security/cve/CVE-2017-11523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11523/">CVE-2017-11523</cve>
	<bugzilla href="https://bugzilla.suse.com/1050083">SUSE bug 1050083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11524" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11524" ref_url="https://www.suse.com/security/cve/CVE-2017-11524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00013.html" source="SUSE-SU"/>
    <description>
    The WriteBlob function in MagickCore/blob.c in ImageMagick before 6.9.8-10 and 7.x before 7.6.0-0 allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11524/">CVE-2017-11524</cve>
	<bugzilla href="https://bugzilla.suse.com/1050087">SUSE bug 1050087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11525" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11525" ref_url="https://www.suse.com/security/cve/CVE-2017-11525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadCINImage function in coders/cin.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11525/">CVE-2017-11525</cve>
	<bugzilla href="https://bugzilla.suse.com/1050098">SUSE bug 1050098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11526" ref_url="https://www.suse.com/security/cve/CVE-2017-11526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadOneMNGImage function in coders/png.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11526/">CVE-2017-11526</cve>
	<bugzilla href="https://bugzilla.suse.com/1050072">SUSE bug 1050072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050100">SUSE bug 1050100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11527" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11527" ref_url="https://www.suse.com/security/cve/CVE-2017-11527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007482.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadDPXImage function in coders/dpx.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11527/">CVE-2017-11527</cve>
	<bugzilla href="https://bugzilla.suse.com/1047054">SUSE bug 1047054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050116">SUSE bug 1050116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11528" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11528" ref_url="https://www.suse.com/security/cve/CVE-2017-11528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadDIBImage function in coders/dib.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11528/">CVE-2017-11528</cve>
	<bugzilla href="https://bugzilla.suse.com/1050119">SUSE bug 1050119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11529" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11529" ref_url="https://www.suse.com/security/cve/CVE-2017-11529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    The ReadMATImage function in coders/mat.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11529/">CVE-2017-11529</cve>
	<bugzilla href="https://bugzilla.suse.com/1050120">SUSE bug 1050120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11530" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11530" ref_url="https://www.suse.com/security/cve/CVE-2017-11530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadEPTImage function in coders/ept.c in ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11530/">CVE-2017-11530</cve>
	<bugzilla href="https://bugzilla.suse.com/1050122">SUSE bug 1050122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11531" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11531" ref_url="https://www.suse.com/security/cve/CVE-2017-11531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteHISTOGRAMImage() function in coders/histogram.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11531/">CVE-2017-11531</cve>
	<bugzilla href="https://bugzilla.suse.com/1050126">SUSE bug 1050126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11532" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11532" ref_url="https://www.suse.com/security/cve/CVE-2017-11532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteMPCImage() function in coders/mpc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11532/">CVE-2017-11532</cve>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050623">SUSE bug 1050623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11533" ref_url="https://www.suse.com/security/cve/CVE-2017-11533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteUILImage() function in coders/uil.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11533/">CVE-2017-11533</cve>
	<bugzilla href="https://bugzilla.suse.com/1050132">SUSE bug 1050132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11534" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11534" ref_url="https://www.suse.com/security/cve/CVE-2017-11534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the lite_font_map() function in coders/wmf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11534/">CVE-2017-11534</cve>
	<bugzilla href="https://bugzilla.suse.com/1050135">SUSE bug 1050135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11535" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11535" ref_url="https://www.suse.com/security/cve/CVE-2017-11535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WritePSImage() function in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11535/">CVE-2017-11535</cve>
	<bugzilla href="https://bugzilla.suse.com/1050139">SUSE bug 1050139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11536" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11536" ref_url="https://www.suse.com/security/cve/CVE-2017-11536" source="SUSE CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteJP2Image() function in coders/jp2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11536/">CVE-2017-11536</cve>
	<bugzilla href="https://bugzilla.suse.com/1050056">SUSE bug 1050056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11537" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11537" ref_url="https://www.suse.com/security/cve/CVE-2017-11537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Floating Point Exception (FPE) in the WritePALMImage() function in coders/palm.c, related to an incorrect bits-per-pixel calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11537/">CVE-2017-11537</cve>
	<bugzilla href="https://bugzilla.suse.com/1050048">SUSE bug 1050048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11538" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11538" ref_url="https://www.suse.com/security/cve/CVE-2017-11538" source="SUSE CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the WriteOnePNGImage() function in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11538/">CVE-2017-11538</cve>
	<bugzilla href="https://bugzilla.suse.com/1050043">SUSE bug 1050043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11539" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11539" ref_url="https://www.suse.com/security/cve/CVE-2017-11539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the ReadOnePNGImage() function in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11539/">CVE-2017-11539</cve>
	<bugzilla href="https://bugzilla.suse.com/1050037">SUSE bug 1050037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11540" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11540" ref_url="https://www.suse.com/security/cve/CVE-2017-11540" source="SUSE CVE"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the GetPixelIndex() function, called from the WritePICONImage function in coders/xpm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11540/">CVE-2017-11540</cve>
	<bugzilla href="https://bugzilla.suse.com/1050144">SUSE bug 1050144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11542" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11543" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11545" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11545" ref_url="https://www.suse.com/security/cve/CVE-2017-11545" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11543. Reason: This candidate is a duplicate of CVE-2017-11543. Notes: All CVE users should reference CVE-2017-11543 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11545/">CVE-2017-11545</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333975" comment="tcpdump is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11548" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11548" ref_url="https://www.suse.com/security/cve/CVE-2017-11548" source="SUSE CVE"/>
    <description>
    The _tokenize_matrix function in audio_out.c in Xiph.Org libao 1.2.0 allows remote attackers to cause a denial of service (memory corruption) via a crafted MP3 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11548/">CVE-2017-11548</cve>
	<bugzilla href="https://bugzilla.suse.com/1081767">SUSE bug 1081767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081784">SUSE bug 1081784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338952" comment="libao is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11553" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11553" ref_url="https://www.suse.com/security/cve/CVE-2017-11553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the extend_alias_table function in localealias.c of Exiv2 0.26. A crafted input will lead to remote denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11553/">CVE-2017-11553</cve>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103870">SUSE bug 1103870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11592" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11592" ref_url="https://www.suse.com/security/cve/CVE-2017-11592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a Mismatched Memory Management Routines vulnerability in the Exiv2::FileIo::seek function of Exiv2 0.26 that will lead to a remote denial of service attack (heap memory corruption) via crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11592/">CVE-2017-11592</cve>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103872">SUSE bug 1103872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096564">SUSE bug 1096564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536549" comment="kgraft-patch-4_4_74-92_38-default-11-2.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11610</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11610" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11610" ref_url="https://www.suse.com/security/cve/CVE-2017-11610" source="SUSE CVE"/>
    <description>
    The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11610/">CVE-2017-11610</cve>
	<bugzilla href="https://bugzilla.suse.com/1051136">SUSE bug 1051136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685559" comment="python-supervisor is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11613" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00056.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.8, there is a denial of service vulnerability in the TIFFOpen function. A crafted input will lead to a denial of service attack. During the TIFFOpen process, td_imagelength is not checked. The value of td_imagelength can be directly controlled by an input file. In the ChopUpSingleUncompressedStrip function, the _TIFFCheckMalloc function is called based on td_imagelength. If we set the value of td_imagelength close to the amount of system memory, it will hang the system or trigger the OOM killer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<bugzilla href="https://bugzilla.suse.com/1082332">SUSE bug 1082332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106853">SUSE bug 1106853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11624" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc after two consecutive calls to QPDFObjectHandle::parseInternal, aka an "infinite loop."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<bugzilla href="https://bugzilla.suse.com/1050581">SUSE bug 1050581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545821" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545822" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545823" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545824" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545825" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545826" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594603" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594604" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594605" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594606" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594607" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594608" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11625" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDF::resolveObjectsInStream function in QPDF.cc, aka an "infinite loop."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<bugzilla href="https://bugzilla.suse.com/1050579">SUSE bug 1050579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545821" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545822" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545823" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545824" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545825" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545826" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594603" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594604" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594605" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594606" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594607" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594608" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11626" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the QPDFTokenizer::resolveLiteral function in QPDFTokenizer.cc after four consecutive calls to QPDFObjectHandle::parseInternal, aka an "infinite loop."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<bugzilla href="https://bugzilla.suse.com/1050578">SUSE bug 1050578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545821" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545822" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545823" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545824" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545825" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545826" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594603" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594604" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594605" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594606" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594607" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594608" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11627" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    A stack-consumption vulnerability was found in libqpdf in QPDF 6.0.0, which allows attackers to cause a denial of service via a crafted file, related to the PointerHolder function in PointerHolder.hh, aka an "infinite loop."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<bugzilla href="https://bugzilla.suse.com/1050577">SUSE bug 1050577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545821" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545822" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545823" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545824" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545825" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545826" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594603" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594604" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594605" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594606" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594607" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594608" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11636" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11636" ref_url="https://www.suse.com/security/cve/CVE-2017-11636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00095.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a heap overflow in the WriteRGBImage() function in coders/rgb.c when processing multiple frames that have non-identical widths.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11636/">CVE-2017-11636</cve>
	<bugzilla href="https://bugzilla.suse.com/1050674">SUSE bug 1050674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11637" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11637" ref_url="https://www.suse.com/security/cve/CVE-2017-11637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a NULL pointer dereference in the WritePCLImage() function in coders/pcl.c during writes of monochrome images.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11637/">CVE-2017-11637</cve>
	<bugzilla href="https://bugzilla.suse.com/1050669">SUSE bug 1050669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11638" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11638" ref_url="https://www.suse.com/security/cve/CVE-2017-11638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a segmentation violation in the WriteMAPImage() function in coders/map.c when processing a non-colormapped image, a different vulnerability than CVE-2017-11642.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11638/">CVE-2017-11638</cve>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11639" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11639" ref_url="https://www.suse.com/security/cve/CVE-2017-11639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteCIPImage() function in coders/cip.c, related to the GetPixelLuma function in MagickCore/pixel-accessor.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11639/">CVE-2017-11639</cve>
	<bugzilla href="https://bugzilla.suse.com/1050635">SUSE bug 1050635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11640" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11640" ref_url="https://www.suse.com/security/cve/CVE-2017-11640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to an address access exception in the WritePTIFImage() function in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11640/">CVE-2017-11640</cve>
	<bugzilla href="https://bugzilla.suse.com/1050632">SUSE bug 1050632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11641" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11641" ref_url="https://www.suse.com/security/cve/CVE-2017-11641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a Memory Leak in the PersistCache function in magick/pixel_cache.c during writing of Magick Persistent Cache (MPC) files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11641/">CVE-2017-11641</cve>
	<bugzilla href="https://bugzilla.suse.com/1050129">SUSE bug 1050129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050623">SUSE bug 1050623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11642" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11642" ref_url="https://www.suse.com/security/cve/CVE-2017-11642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a NULL pointer dereference in the WriteMAPImage() function in coders/map.c when processing a non-colormapped image, a different vulnerability than CVE-2017-11638.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11642/">CVE-2017-11642</cve>
	<bugzilla href="https://bugzilla.suse.com/1050617">SUSE bug 1050617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11643" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11643" ref_url="https://www.suse.com/security/cve/CVE-2017-11643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2249-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00095.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a heap overflow in the WriteCMYKImage() function in coders/cmyk.c when processing multiple frames that have non-identical widths.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11643/">CVE-2017-11643</cve>
	<bugzilla href="https://bugzilla.suse.com/1050611">SUSE bug 1050611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050674">SUSE bug 1050674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11644" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11644" ref_url="https://www.suse.com/security/cve/CVE-2017-11644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the ReadMATImage() function in coders/mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11644/">CVE-2017-11644</cve>
	<bugzilla href="https://bugzilla.suse.com/1050606">SUSE bug 1050606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11671" ref_url="https://www.suse.com/security/cve/CVE-2017-11671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2901-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00117.html" source="SUSE-SU"/>
    <description>
    Under certain circumstances, the ix86_expand_builtin function in i386.c in GNU Compiler Collection (GCC) version 4.6, 4.7, 4.8, 4.9, 5 before 5.5, and 6 before 6.4 will generate instruction sequences that clobber the status flag of the RDRAND and RDSEED intrinsics before it can be read, potentially causing failures of these instructions to go unreported. This could potentially lead to less randomness in random number generation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-11671/">CVE-2017-11671</cve>
	<bugzilla href="https://bugzilla.suse.com/1050947">SUSE bug 1050947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549642" comment="cpp48-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545006" comment="gcc48-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545007" comment="gcc48-32bit-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545008" comment="gcc48-c++-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518111" comment="gcc48-info-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545009" comment="gcc48-locale-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518112" comment="libasan0-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518113" comment="libasan0-32bit-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545010" comment="libstdc++48-devel-4.8.5-31.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545011" comment="libstdc++48-devel-32bit-4.8.5-31.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11714" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11714" ref_url="https://www.suse.com/security/cve/CVE-2017-11714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    psi/ztoken.c in Artifex Ghostscript 9.21 mishandles references to the scanner state structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bounds read in the igc_reloc_struct_ptr function in psi/igc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11714/">CVE-2017-11714</cve>
	<bugzilla href="https://bugzilla.suse.com/1051184">SUSE bug 1051184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11722" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11722" ref_url="https://www.suse.com/security/cve/CVE-2017-11722" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
    <description>
    The WriteOnePNGImage function in coders/png.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file, because the program's actual control flow was inconsistent with its indentation. This resulted in a logging statement executing outside of a loop, and consequently using an invalid array index corresponding to the loop's exit condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-11722/">CVE-2017-11722</cve>
	<bugzilla href="https://bugzilla.suse.com/1051411">SUSE bug 1051411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11724" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11724" ref_url="https://www.suse.com/security/cve/CVE-2017-11724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    The ReadMATImage function in coders/mat.c in ImageMagick through 6.9.9-3 and 7.x through 7.0.6-3 has memory leaks involving the quantum_info and clone_info data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11724/">CVE-2017-11724</cve>
	<bugzilla href="https://bugzilla.suse.com/1051446">SUSE bug 1051446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11750" ref_url="https://www.suse.com/security/cve/CVE-2017-11750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadOneJNGImage function in coders/png.c in ImageMagick 6.9.9-4 and 7.0.6-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11750/">CVE-2017-11750</cve>
	<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051442">SUSE bug 1051442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11751" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11751" ref_url="https://www.suse.com/security/cve/CVE-2017-11751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    The WritePICONImage function in coders/xpm.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11751/">CVE-2017-11751</cve>
	<bugzilla href="https://bugzilla.suse.com/1051412">SUSE bug 1051412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051416">SUSE bug 1051416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051430">SUSE bug 1051430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11752" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11752" ref_url="https://www.suse.com/security/cve/CVE-2017-11752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadMAGICKImage function in coders/magick.c in ImageMagick 7.0.6-4 allows remote attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11752/">CVE-2017-11752</cve>
	<bugzilla href="https://bugzilla.suse.com/1051441">SUSE bug 1051441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11753" ref_url="https://www.suse.com/security/cve/CVE-2017-11753" source="SUSE CVE"/>
    <description>
    The GetImageDepth function in MagickCore/attribute.c in ImageMagick 7.0.6-4 might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted Flexible Image Transport System (FITS) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11753/">CVE-2017-11753</cve>
	<bugzilla href="https://bugzilla.suse.com/1052488">SUSE bug 1052488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550701" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550702" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550703" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550704" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533165" comment="glibc-html-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533166" comment="glibc-info-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550705" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550706" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550707" comment="glibc-profile-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550708" comment="glibc-profile-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550709" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003870.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0668-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550759" comment="glibc-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550760" comment="glibc-32bit-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550761" comment="glibc-devel-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550762" comment="glibc-devel-32bit-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533214" comment="glibc-html-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519002" comment="glibc-i18ndata-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533215" comment="glibc-info-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550763" comment="glibc-locale-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550764" comment="glibc-locale-32bit-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550765" comment="glibc-profile-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550766" comment="glibc-profile-32bit-2.22-62.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550767" comment="nscd-2.22-62.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12134" ref_url="https://www.suse.com/security/cve/CVE-2017-12134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12134/">CVE-2017-12134</cve>
	<bugzilla href="https://bugzilla.suse.com/1051790">SUSE bug 1051790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549592" comment="xen-doc-html-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549593" comment="xen-tools-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549594" comment="xen-tools-domU-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12136" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    Race condition in the grant table code in Xen 4.6.x through 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136</cve>
	<bugzilla href="https://bugzilla.suse.com/1051789">SUSE bug 1051789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549592" comment="xen-doc-html-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549593" comment="xen-tools-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549594" comment="xen-tools-domU-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549592" comment="xen-doc-html-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549593" comment="xen-tools-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549594" comment="xen-tools-domU-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12140" ref_url="https://www.suse.com/security/cve/CVE-2017-12140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadDCMImage function in coders\dcm.c in ImageMagick 7.0.6-1 has an integer signedness error leading to excessive memory consumption via a crafted DCM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12140/">CVE-2017-12140</cve>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12143" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12143" ref_url="https://www.suse.com/security/cve/CVE-2017-12143" source="SUSE CVE"/>
    <description>
    In libquicktime 1.2.4, an allocation failure was found in the function quicktime_read_info in lqt_quicktime.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12143/">CVE-2017-12143</cve>
	<bugzilla href="https://bugzilla.suse.com/1051859">SUSE bug 1051859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338970" comment="libquicktime is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12145" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12145" ref_url="https://www.suse.com/security/cve/CVE-2017-12145" source="SUSE CVE"/>
    <description>
    In libquicktime 1.2.4, an allocation failure was found in the function quicktime_read_ftyp in ftyp.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12145/">CVE-2017-12145</cve>
	<bugzilla href="https://bugzilla.suse.com/1051855">SUSE bug 1051855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338970" comment="libquicktime is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12148</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12148" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12148" ref_url="https://www.suse.com/security/cve/CVE-2017-12148" source="SUSE CVE"/>
    <description>
    A flaw was found in Ansible Tower's interface before 3.1.5 and 3.2.0 with SCM repositories. If a Tower project (SCM repository) definition does not have the 'delete before update' flag set, an attacker with commit access to the upstream playbook source repository could create a Trojan playbook that, when executed by Tower, modifies the checked out SCM repository to add git hooks. These git hooks could, in turn, cause arbitrary command and code execution as the user Tower runs as.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12148/">CVE-2017-12148</cve>
	<bugzilla href="https://bugzilla.suse.com/1059326">SUSE bug 1059326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2706-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<bugzilla href="https://bugzilla.suse.com/1058622">SUSE bug 1058622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549820" comment="libdcerpc-atsvc0-4.2.4-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549671" comment="libdcerpc-binding0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549672" comment="libdcerpc-binding0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549673" comment="libdcerpc0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549674" comment="libdcerpc0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549675" comment="libndr-krb5pac0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549676" comment="libndr-krb5pac0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549677" comment="libndr-nbt0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549678" comment="libndr-nbt0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549679" comment="libndr-standard0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549680" comment="libndr-standard0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549681" comment="libndr0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549682" comment="libndr0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549683" comment="libnetapi0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549684" comment="libnetapi0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549685" comment="libsamba-credentials0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549686" comment="libsamba-credentials0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549687" comment="libsamba-errors0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549688" comment="libsamba-errors0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549689" comment="libsamba-hostconfig0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549690" comment="libsamba-hostconfig0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549691" comment="libsamba-passdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549692" comment="libsamba-passdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549693" comment="libsamba-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549694" comment="libsamba-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549695" comment="libsamdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549696" comment="libsamdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549697" comment="libsmbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549698" comment="libsmbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549699" comment="libsmbconf0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549700" comment="libsmbconf0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549701" comment="libsmbldap0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549702" comment="libsmbldap0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549703" comment="libtevent-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549704" comment="libtevent-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549705" comment="libwbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549706" comment="libwbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549707" comment="samba-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549708" comment="samba-client-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549709" comment="samba-client-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518179" comment="samba-doc-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549710" comment="samba-libs-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549711" comment="samba-libs-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549712" comment="samba-winbind-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549713" comment="samba-winbind-32bit-4.4.2-38.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2706-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<bugzilla href="https://bugzilla.suse.com/1058565">SUSE bug 1058565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549820" comment="libdcerpc-atsvc0-4.2.4-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549671" comment="libdcerpc-binding0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549672" comment="libdcerpc-binding0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549673" comment="libdcerpc0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549674" comment="libdcerpc0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549675" comment="libndr-krb5pac0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549676" comment="libndr-krb5pac0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549677" comment="libndr-nbt0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549678" comment="libndr-nbt0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549679" comment="libndr-standard0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549680" comment="libndr-standard0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549681" comment="libndr0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549682" comment="libndr0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549683" comment="libnetapi0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549684" comment="libnetapi0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549685" comment="libsamba-credentials0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549686" comment="libsamba-credentials0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549687" comment="libsamba-errors0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549688" comment="libsamba-errors0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549689" comment="libsamba-hostconfig0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549690" comment="libsamba-hostconfig0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549691" comment="libsamba-passdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549692" comment="libsamba-passdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549693" comment="libsamba-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549694" comment="libsamba-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549695" comment="libsamdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549696" comment="libsamdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549697" comment="libsmbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549698" comment="libsmbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549699" comment="libsmbconf0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549700" comment="libsmbconf0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549701" comment="libsmbldap0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549702" comment="libsmbldap0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549703" comment="libtevent-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549704" comment="libtevent-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549705" comment="libwbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549706" comment="libwbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549707" comment="samba-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549708" comment="samba-client-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549709" comment="samba-client-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518179" comment="samba-doc-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549710" comment="samba-libs-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549711" comment="samba-libs-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549712" comment="samba-winbind-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549713" comment="samba-winbind-32bit-4.4.2-38.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00019.html" source="SUSE-SU"/>
    <description>
    A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00019.html" source="SUSE-SU"/>
    <description>
    The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154</cve>
	<bugzilla href="https://bugzilla.suse.com/1058038">SUSE bug 1058038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058507">SUSE bug 1058507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2706-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2713-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549820" comment="libdcerpc-atsvc0-4.2.4-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549671" comment="libdcerpc-binding0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549672" comment="libdcerpc-binding0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549673" comment="libdcerpc0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549674" comment="libdcerpc0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549675" comment="libndr-krb5pac0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549676" comment="libndr-krb5pac0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549677" comment="libndr-nbt0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549678" comment="libndr-nbt0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549679" comment="libndr-standard0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549680" comment="libndr-standard0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549681" comment="libndr0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549682" comment="libndr0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549683" comment="libnetapi0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549684" comment="libnetapi0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549685" comment="libsamba-credentials0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549686" comment="libsamba-credentials0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549687" comment="libsamba-errors0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549688" comment="libsamba-errors0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549689" comment="libsamba-hostconfig0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549690" comment="libsamba-hostconfig0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549691" comment="libsamba-passdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549692" comment="libsamba-passdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549693" comment="libsamba-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549694" comment="libsamba-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549695" comment="libsamdb0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549696" comment="libsamdb0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549697" comment="libsmbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549698" comment="libsmbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549699" comment="libsmbconf0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549700" comment="libsmbconf0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549701" comment="libsmbldap0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549702" comment="libsmbldap0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549703" comment="libtevent-util0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549704" comment="libtevent-util0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549705" comment="libwbclient0-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549706" comment="libwbclient0-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549707" comment="samba-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549708" comment="samba-client-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549709" comment="samba-client-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518179" comment="samba-doc-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549710" comment="samba-libs-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549711" comment="samba-libs-32bit-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549712" comment="samba-winbind-4.4.2-38.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549713" comment="samba-winbind-32bit-4.4.2-38.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12164" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12164" ref_url="https://www.suse.com/security/cve/CVE-2017-12164" source="SUSE CVE"/>
    <description>
    A flaw was discovered in gdm 3.24.1 where gdm greeter was no longer setting the ran_once boolean during autologin. If autologin was enabled for a victim, an attacker could simply select 'login as another user' to unlock their screen.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12164/">CVE-2017-12164</cve>
	<bugzilla href="https://bugzilla.suse.com/1058136">SUSE bug 1058136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180206">SUSE bug 1180206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334029" comment="gdm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00082.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<bugzilla href="https://bugzilla.suse.com/1060877">SUSE bug 1060877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549760" comment="openvpn-2.3.8-16.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549761" comment="openvpn-auth-pam-plugin-2.3.8-16.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12168" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12168" ref_url="https://www.suse.com/security/cve/CVE-2017-12168" source="SUSE CVE"/>
    <description>
    The access_pmu_evcntr function in arch/arm64/kvm/sys_regs.c in the Linux kernel before 4.8.11 allows privileged KVM guest OS users to cause a denial of service (assertion failure and host OS crash) by accessing the Performance Monitors Cycle Count Register (PMCCNTR).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12168/">CVE-2017-12168</cve>
	<bugzilla href="https://bugzilla.suse.com/1059448">SUSE bug 1059448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12172" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12172" ref_url="https://www.suse.com/security/cve/CVE-2017-12172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00039.html" source="SUSE-SU"/>
    <description>
    PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12172/">CVE-2017-12172</cve>
	<bugzilla href="https://bugzilla.suse.com/1062538">SUSE bug 1062538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550953" comment="postgresql94-9.4.15-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550954" comment="postgresql94-contrib-9.4.15-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533368" comment="postgresql94-docs-9.4.15-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550955" comment="postgresql94-server-9.4.15-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334042" comment="postgresql-init is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12173" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2942-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00016.html" source="SUSE-SU"/>
    <description>
    It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173</cve>
	<bugzilla href="https://bugzilla.suse.com/1061832">SUSE bug 1061832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549796" comment="libipa_hbac0-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549797" comment="libsss_idmap0-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549798" comment="libsss_sudo-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549799" comment="python-sssd-config-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549800" comment="sssd-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549801" comment="sssd-32bit-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549802" comment="sssd-ad-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549803" comment="sssd-ipa-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549804" comment="sssd-krb5-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549805" comment="sssd-krb5-common-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549806" comment="sssd-ldap-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549807" comment="sssd-proxy-1.13.4-34.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549808" comment="sssd-tools-1.13.4-34.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing extra length validation in ProcEstablishConnection function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<bugzilla href="https://bugzilla.suse.com/1063041">SUSE bug 1063041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12177" ref_url="https://www.suse.com/security/cve/CVE-2017-12177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was vulnerable to integer overflow in ProcDbeGetVisualInfo function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12177/">CVE-2017-12177</cve>
	<bugzilla href="https://bugzilla.suse.com/1063040">SUSE bug 1063040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12178" ref_url="https://www.suse.com/security/cve/CVE-2017-12178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 had wrong extra length check in ProcXIChangeHierarchy function allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12178/">CVE-2017-12178</cve>
	<bugzilla href="https://bugzilla.suse.com/1063039">SUSE bug 1063039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12179" ref_url="https://www.suse.com/security/cve/CVE-2017-12179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was vulnerable to integer overflow in (S)ProcXIBarrierReleasePointer functions allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12179/">CVE-2017-12179</cve>
	<bugzilla href="https://bugzilla.suse.com/1063038">SUSE bug 1063038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12180" ref_url="https://www.suse.com/security/cve/CVE-2017-12180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFree86 VidModeExtension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12180/">CVE-2017-12180</cve>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12181" ref_url="https://www.suse.com/security/cve/CVE-2017-12181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFree86 DGA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12181/">CVE-2017-12181</cve>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12182" ref_url="https://www.suse.com/security/cve/CVE-2017-12182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFree86 DRI extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12182/">CVE-2017-12182</cve>
	<bugzilla href="https://bugzilla.suse.com/1063037">SUSE bug 1063037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12183" ref_url="https://www.suse.com/security/cve/CVE-2017-12183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XFIXES extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12183/">CVE-2017-12183</cve>
	<bugzilla href="https://bugzilla.suse.com/1063035">SUSE bug 1063035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12184" ref_url="https://www.suse.com/security/cve/CVE-2017-12184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in XINERAMA extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12184/">CVE-2017-12184</cve>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12185" ref_url="https://www.suse.com/security/cve/CVE-2017-12185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in MIT-SCREEN-SAVER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12185/">CVE-2017-12185</cve>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12186" ref_url="https://www.suse.com/security/cve/CVE-2017-12186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in X-Resource extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12186/">CVE-2017-12186</cve>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2823-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00074.html" source="SUSE-SU"/>
    <description>
    xorg-x11-server before 1.19.5 was missing length validation in RENDER extension allowing malicious X client to cause X server to crash or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<bugzilla href="https://bugzilla.suse.com/1063034">SUSE bug 1063034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12188" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12188" ref_url="https://www.suse.com/security/cve/CVE-2017-12188" source="SUSE CVE"/>
    <description>
    arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12188/">CVE-2017-12188</cve>
	<bugzilla href="https://bugzilla.suse.com/1062604">SUSE bug 1062604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096566">SUSE bug 1096566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12193" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link creation operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193</cve>
	<bugzilla href="https://bugzilla.suse.com/1066192">SUSE bug 1066192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12374" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12375" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12376" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12377" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12378" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<bugzilla href="https://bugzilla.suse.com/1077732">SUSE bug 1077732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12418" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12418" ref_url="https://www.suse.com/security/cve/CVE-2017-12418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-5 has memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12418/">CVE-2017-12418</cve>
	<bugzilla href="https://bugzilla.suse.com/1052207">SUSE bug 1052207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12424" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12424" ref_url="https://www.suse.com/security/cve/CVE-2017-12424" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003379.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2979-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00030.html" source="SUSE-SU"/>
    <description>
    In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12424/">CVE-2017-12424</cve>
	<bugzilla href="https://bugzilla.suse.com/1052261">SUSE bug 1052261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549819" comment="shadow-4.2.1-27.3.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12427" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12427" ref_url="https://www.suse.com/security/cve/CVE-2017-12427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12427/">CVE-2017-12427</cve>
	<bugzilla href="https://bugzilla.suse.com/1052248">SUSE bug 1052248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12428" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12428" ref_url="https://www.suse.com/security/cve/CVE-2017-12428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory leak vulnerability was found in the function ReadWMFImage in coders/wmf.c, which allows attackers to cause a denial of service in CloneDrawInfo in draw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12428/">CVE-2017-12428</cve>
	<bugzilla href="https://bugzilla.suse.com/1052249">SUSE bug 1052249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052253">SUSE bug 1052253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12429" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12429" ref_url="https://www.suse.com/security/cve/CVE-2017-12429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12429/">CVE-2017-12429</cve>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12430" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12430" ref_url="https://www.suse.com/security/cve/CVE-2017-12430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadMPCImage in coders/mpc.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12430/">CVE-2017-12430</cve>
	<bugzilla href="https://bugzilla.suse.com/1052251">SUSE bug 1052251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052252">SUSE bug 1052252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12431" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12431" ref_url="https://www.suse.com/security/cve/CVE-2017-12431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a use-after-free vulnerability was found in the function ReadWMFImage in coders/wmf.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12431/">CVE-2017-12431</cve>
	<bugzilla href="https://bugzilla.suse.com/1052249">SUSE bug 1052249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052253">SUSE bug 1052253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12432" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12432" ref_url="https://www.suse.com/security/cve/CVE-2017-12432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadPCXImage in coders/pcx.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12432/">CVE-2017-12432</cve>
	<bugzilla href="https://bugzilla.suse.com/1052254">SUSE bug 1052254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12433" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12433" ref_url="https://www.suse.com/security/cve/CVE-2017-12433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory leak vulnerability was found in the function ReadPESImage in coders/pes.c, which allows attackers to cause a denial of service, related to ResizeMagickMemory in memory.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12433/">CVE-2017-12433</cve>
	<bugzilla href="https://bugzilla.suse.com/1052545">SUSE bug 1052545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12434" ref_url="https://www.suse.com/security/cve/CVE-2017-12434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a missing NULL check vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service (assertion failure) in DestroyImageInfo in image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12434/">CVE-2017-12434</cve>
	<bugzilla href="https://bugzilla.suse.com/1052550">SUSE bug 1052550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12435" ref_url="https://www.suse.com/security/cve/CVE-2017-12435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-1, a memory exhaustion vulnerability was found in the function ReadSUNImage in coders/sun.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12435/">CVE-2017-12435</cve>
	<bugzilla href="https://bugzilla.suse.com/1052553">SUSE bug 1052553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057508">SUSE bug 1057508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12440</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12440" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12440" ref_url="https://www.suse.com/security/cve/CVE-2017-12440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003272.html" source="SUSE-SU"/>
    <description>
    Aodh as packaged in Openstack Ocata and Newton before change-ID I8fd11a7f9fe3c0ea5f9843a89686ac06713b7851 and before Pike-rc1 does not verify that trust IDs belong to the user when creating alarm action with the scheme trust+http, which allows remote authenticated users with knowledge of trust IDs where Aodh is the trustee to obtain a Keystone token and perform unspecified authenticated actions by adding an alarm action with the scheme trust+http, and providing a trust id where Aodh is the trustee.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.7/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12440/">CVE-2017-12440</cve>
	<bugzilla href="https://bugzilla.suse.com/1052604">SUSE bug 1052604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594281" comment="openstack-aodh-3.0.4~a0~dev1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594282" comment="openstack-aodh-api-3.0.4~a0~dev1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594283" comment="openstack-aodh-doc-3.0.4~a0~dev1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594284" comment="openstack-aodh-evaluator-3.0.4~a0~dev1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594285" comment="openstack-aodh-expirer-3.0.4~a0~dev1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594286" comment="openstack-aodh-listener-3.0.4~a0~dev1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594287" comment="openstack-aodh-notifier-3.0.4~a0~dev1-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594288" comment="python-aodh-3.0.4~a0~dev1-2.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_cache_close function in bfd/cache.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause a heap use after free and possibly achieve code execution via a crafted nested archive file. This issue occurs because incorrect functions are called during an attempt to release memory. The issue can be addressed by better input validation in the bfd_generic_archive_p function in bfd/archive.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448</cve>
	<bugzilla href="https://bugzilla.suse.com/1052518">SUSE bug 1052518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12450" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450</cve>
	<bugzilla href="https://bugzilla.suse.com/1052514">SUSE bug 1052514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12452" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_mach_o_i386_canonicalize_one_reloc function in bfd/mach-o-i386.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted mach-o file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452</cve>
	<bugzilla href="https://bugzilla.suse.com/1052511">SUSE bug 1052511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12453" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The _bfd_vms_slurp_eeom function in libbfd.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap read via a crafted vms alpha file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453</cve>
	<bugzilla href="https://bugzilla.suse.com/1052509">SUSE bug 1052509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12454" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The _bfd_vms_slurp_egsd function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an arbitrary memory read via a crafted vms alpha file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454</cve>
	<bugzilla href="https://bugzilla.suse.com/1052507">SUSE bug 1052507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The read_symbol_stabs_debugging_info function in rddbg.c in GNU Binutils 2.29 and earlier allows remote attackers to cause an out of bounds heap read via a crafted binary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456</cve>
	<bugzilla href="https://bugzilla.suse.com/1052503">SUSE bug 1052503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059785">SUSE bug 1059785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12562" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12562" ref_url="https://www.suse.com/security/cve/CVE-2017-12562" source="SUSE CVE"/>
    <description>
    Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12562/">CVE-2017-12562</cve>
	<bugzilla href="https://bugzilla.suse.com/1052476">SUSE bug 1052476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334031" comment="libsndfile is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12563" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12563" ref_url="https://www.suse.com/security/cve/CVE-2017-12563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a memory exhaustion vulnerability was found in the function ReadPSDImage in coders/psd.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12563/">CVE-2017-12563</cve>
	<bugzilla href="https://bugzilla.suse.com/1052460">SUSE bug 1052460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12564" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12564" ref_url="https://www.suse.com/security/cve/CVE-2017-12564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12564/">CVE-2017-12564</cve>
	<bugzilla href="https://bugzilla.suse.com/1052468">SUSE bug 1052468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12565" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12565" ref_url="https://www.suse.com/security/cve/CVE-2017-12565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadOneJNGImage in coders/png.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12565/">CVE-2017-12565</cve>
	<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052470">SUSE bug 1052470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12566" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12566" ref_url="https://www.suse.com/security/cve/CVE-2017-12566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a memory leak vulnerability was found in the function ReadMVGImage in coders/mvg.c, which allows attackers to cause a denial of service, related to the function ReadSVGImage in svg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12566/">CVE-2017-12566</cve>
	<bugzilla href="https://bugzilla.suse.com/1052472">SUSE bug 1052472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12587" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12587" ref_url="https://www.suse.com/security/cve/CVE-2017-12587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a large loop vulnerability in the ReadPWPImage function in coders\pwp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12587/">CVE-2017-12587</cve>
	<bugzilla href="https://bugzilla.suse.com/1052450">SUSE bug 1052450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12588" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12588" ref_url="https://www.suse.com/security/cve/CVE-2017-12588" source="SUSE CVE"/>
    <description>
    The zmq3 input and output modules in rsyslog before 8.28.0 interpreted description fields as format strings, possibly allowing a format string attack with unspecified impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12588/">CVE-2017-12588</cve>
	<bugzilla href="https://bugzilla.suse.com/1051798">SUSE bug 1051798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333979" comment="rsyslog is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    The tokenizer in QPDF 6.0.0 and 7.0.b1 is recursive for arrays and dictionaries, which allows remote attackers to cause a denial of service (stack consumption and segmentation fault) or possibly have unspecified other impact via a PDF document with a deep data structure, as demonstrated by a crash in QPDFObjectHandle::parseInternal in libqpdf/QPDFObjectHandle.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<bugzilla href="https://bugzilla.suse.com/1055960">SUSE bug 1055960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545821" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545822" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545823" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545824" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545825" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545826" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594603" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594604" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594605" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594606" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594607" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594608" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00013.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, a crafted image causes a heap-based buffer over-read in the hufDecode function in IlmImf/ImfHuf.cpp during exrmaketiled execution; it may result in denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<bugzilla href="https://bugzilla.suse.com/1052522">SUSE bug 1052522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550747" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550748" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12610</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12610" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12610" ref_url="https://www.suse.com/security/cve/CVE-2017-12610" source="SUSE CVE"/>
    <description>
    In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12610/">CVE-2017-12610</cve>
	<bugzilla href="https://bugzilla.suse.com/1102917">SUSE bug 1102917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339374" comment="kafka is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12613" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12613" ref_url="https://www.suse.com/security/cve/CVE-2017-12613" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1214-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00035.html" source="SUSE-SU"/>
    <description>
    When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2 and prior, out of bounds memory may be accessed in converting this value to an apr_time_exp_t value, potentially revealing the contents of a different static heap value or resulting in program termination, and may represent an information disclosure or denial of service vulnerability to applications which call these APR functions with unvalidated external input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12613/">CVE-2017-12613</cve>
	<bugzilla href="https://bugzilla.suse.com/1064982">SUSE bug 1064982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190072">SUSE bug 1190072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334654" comment="libapr1 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12616" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12616" ref_url="https://www.suse.com/security/cve/CVE-2017-12616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00032.html" source="SUSE-SU"/>
    <description>
    When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12616/">CVE-2017-12616</cve>
	<bugzilla href="https://bugzilla.suse.com/1059551">SUSE bug 1059551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" source="SUSE-SU"/>
		<reference ref_id="TID7022154" ref_url="https://www.suse.com/support/kb/doc/?id=7022154" source="SUSE-SU"/>
		<reference ref_id="TID7022163" ref_url="https://www.suse.com/support/kb/doc/?id=7022163" source="SUSE-SU"/>
		<reference ref_id="TID7022269" ref_url="https://www.suse.com/support/kb/doc/?id=7022269" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00033.html" source="SUSE-SU"/>
    <description>
    When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617</cve>
	<bugzilla href="https://bugzilla.suse.com/1059554">SUSE bug 1059554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189861">SUSE bug 1189861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532585" comment="tomcat-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532586" comment="tomcat-admin-webapps-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532587" comment="tomcat-docs-webapp-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532588" comment="tomcat-el-3_0-api-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532589" comment="tomcat-javadoc-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532590" comment="tomcat-jsp-2_3-api-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532591" comment="tomcat-lib-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532592" comment="tomcat-servlet-3_1-api-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532593" comment="tomcat-webapps-8.0.43-29.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12618" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003689.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3325-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00051.html" source="SUSE-SU"/>
    <description>
    Apache Portable Runtime Utility (APR-util) 1.6.0 and prior fail to validate the integrity of SDBM database files used by apr_sdbm*() functions, resulting in a possible out of bound read access. A local user with write access to the database can make a program or process using these functions crash, and cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618</cve>
	<bugzilla href="https://bugzilla.suse.com/1064990">SUSE bug 1064990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541094" comment="libapr-util1-1.5.3-2.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549925" comment="libapr-util1-dbd-sqlite3-1.5.3-2.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12627" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00099.html" source="SUSE-SU"/>
    <description>
    In Apache Xerces-C XML Parser library before 3.2.1, processing of external DTD paths can result in a null pointer dereference under certain conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627</cve>
	<bugzilla href="https://bugzilla.suse.com/1083630">SUSE bug 1083630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334373" comment="xerces-c is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531170" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531171" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551593" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551594" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595706" comment="libxerces-c-3_1-3.1.1-13.3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551594" comment="libxerces-c-3_1-32bit-3.1.1-13.3.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12636</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12636" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12636" ref_url="https://www.suse.com/security/cve/CVE-2017-12636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004523.html" source="SUSE-SU"/>
    <description>
    CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12636/">CVE-2017-12636</cve>
	<bugzilla href="https://bugzilla.suse.com/1068386">SUSE bug 1068386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100973">SUSE bug 1100973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104204">SUSE bug 1104204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119720">SUSE bug 1119720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594494" comment="couchdb-1.7.2-2.8.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12640" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12640" ref_url="https://www.suse.com/security/cve/CVE-2017-12640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has an out-of-bounds read vulnerability in ReadOneMNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12640/">CVE-2017-12640</cve>
	<bugzilla href="https://bugzilla.suse.com/1052781">SUSE bug 1052781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12641" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12641" ref_url="https://www.suse.com/security/cve/CVE-2017-12641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12641/">CVE-2017-12641</cve>
	<bugzilla href="https://bugzilla.suse.com/1052777">SUSE bug 1052777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12642" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12642" ref_url="https://www.suse.com/security/cve/CVE-2017-12642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMPCImage in coders\mpc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12642/">CVE-2017-12642</cve>
	<bugzilla href="https://bugzilla.suse.com/1052771">SUSE bug 1052771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12643" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12643" ref_url="https://www.suse.com/security/cve/CVE-2017-12643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory exhaustion vulnerability in ReadOneJNGImage in coders\png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12643/">CVE-2017-12643</cve>
	<bugzilla href="https://bugzilla.suse.com/1052768">SUSE bug 1052768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12644" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12644" ref_url="https://www.suse.com/security/cve/CVE-2017-12644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12644/">CVE-2017-12644</cve>
	<bugzilla href="https://bugzilla.suse.com/1051847">SUSE bug 1051847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052764">SUSE bug 1052764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12652" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006673.html" source="SUSE-SU"/>
    <description>
    libpng before 1.6.32 does not properly check the length of chunks against the user limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549087" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549088" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596221" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549088" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334032" comment="libpng15 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12654" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12654" ref_url="https://www.suse.com/security/cve/CVE-2017-12654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    The ReadPICTImage function in coders/pict.c in ImageMagick 7.0.6-3 allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12654/">CVE-2017-12654</cve>
	<bugzilla href="https://bugzilla.suse.com/1052761">SUSE bug 1052761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12662" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12662" ref_url="https://www.suse.com/security/cve/CVE-2017-12662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12662/">CVE-2017-12662</cve>
	<bugzilla href="https://bugzilla.suse.com/1052758">SUSE bug 1052758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12663" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12663" ref_url="https://www.suse.com/security/cve/CVE-2017-12663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12663/">CVE-2017-12663</cve>
	<bugzilla href="https://bugzilla.suse.com/1052754">SUSE bug 1052754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12664" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12664" ref_url="https://www.suse.com/security/cve/CVE-2017-12664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12664/">CVE-2017-12664</cve>
	<bugzilla href="https://bugzilla.suse.com/1052750">SUSE bug 1052750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12665" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12665" ref_url="https://www.suse.com/security/cve/CVE-2017-12665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12665/">CVE-2017-12665</cve>
	<bugzilla href="https://bugzilla.suse.com/1052747">SUSE bug 1052747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12667" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12667" ref_url="https://www.suse.com/security/cve/CVE-2017-12667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12667/">CVE-2017-12667</cve>
	<bugzilla href="https://bugzilla.suse.com/1052732">SUSE bug 1052732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12668" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12668" ref_url="https://www.suse.com/security/cve/CVE-2017-12668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12668/">CVE-2017-12668</cve>
	<bugzilla href="https://bugzilla.suse.com/1052688">SUSE bug 1052688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12669" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12669" ref_url="https://www.suse.com/security/cve/CVE-2017-12669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12669/">CVE-2017-12669</cve>
	<bugzilla href="https://bugzilla.suse.com/1052689">SUSE bug 1052689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12670" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12670" ref_url="https://www.suse.com/security/cve/CVE-2017-12670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, missing validation was found in coders/mat.c, leading to an assertion failure in the function DestroyImage in MagickCore/image.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12670/">CVE-2017-12670</cve>
	<bugzilla href="https://bugzilla.suse.com/1052731">SUSE bug 1052731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12671" ref_url="https://www.suse.com/security/cve/CVE-2017-12671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a missing NULL assignment was found in coders/png.c, leading to an invalid free in the function RelinquishMagickMemory in MagickCore/memory.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12671/">CVE-2017-12671</cve>
	<bugzilla href="https://bugzilla.suse.com/1052721">SUSE bug 1052721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12672" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12672" ref_url="https://www.suse.com/security/cve/CVE-2017-12672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12672/">CVE-2017-12672</cve>
	<bugzilla href="https://bugzilla.suse.com/1052720">SUSE bug 1052720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12673" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12673" ref_url="https://www.suse.com/security/cve/CVE-2017-12673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadOneMNGImage in coders/png.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12673/">CVE-2017-12673</cve>
	<bugzilla href="https://bugzilla.suse.com/1052717">SUSE bug 1052717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12674" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12674" ref_url="https://www.suse.com/security/cve/CVE-2017-12674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-2, a CPU exhaustion vulnerability was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12674/">CVE-2017-12674</cve>
	<bugzilla href="https://bugzilla.suse.com/1052711">SUSE bug 1052711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12675" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12675" ref_url="https://www.suse.com/security/cve/CVE-2017-12675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a missing check for multidimensional data was found in coders/mat.c, leading to a memory leak in the function ReadImage in MagickCore/constitute.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12675/">CVE-2017-12675</cve>
	<bugzilla href="https://bugzilla.suse.com/1052710">SUSE bug 1052710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12676" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12676" ref_url="https://www.suse.com/security/cve/CVE-2017-12676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-3, a memory leak vulnerability was found in the function ReadOneJNGImage in coders/png.c, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12676/">CVE-2017-12676</cve>
	<bugzilla href="https://bugzilla.suse.com/1052708">SUSE bug 1052708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12678" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12678" ref_url="https://www.suse.com/security/cve/CVE-2017-12678" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2185-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00076.html" source="SUSE-SU"/>
    <description>
    In TagLib 1.11.1, the rebuildAggregateFrames function in id3v2framefactory.cpp has a pointer to cast vulnerability, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12678/">CVE-2017-12678</cve>
	<bugzilla href="https://bugzilla.suse.com/1052699">SUSE bug 1052699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334033" comment="taglib is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12691" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12691" ref_url="https://www.suse.com/security/cve/CVE-2017-12691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    The ReadOneLayer function in coders/xcf.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12691/">CVE-2017-12691</cve>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082363">SUSE bug 1082363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12692" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12692" ref_url="https://www.suse.com/security/cve/CVE-2017-12692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The ReadVIFFImage function in coders/viff.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted VIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12692/">CVE-2017-12692</cve>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082362">SUSE bug 1082362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12693" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12693" ref_url="https://www.suse.com/security/cve/CVE-2017-12693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The ReadBMPImage function in coders/bmp.c in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (memory consumption) via a crafted BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12693/">CVE-2017-12693</cve>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082348">SUSE bug 1082348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12794</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12794" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12794" ref_url="https://www.suse.com/security/cve/CVE-2017-12794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0632-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12794/">CVE-2017-12794</cve>
	<bugzilla href="https://bugzilla.suse.com/1056284">SUSE bug 1056284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594740" comment="python-Django-1.8.19-3.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12799" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799</cve>
	<bugzilla href="https://bugzilla.suse.com/1053347">SUSE bug 1053347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12805" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12805" ref_url="https://www.suse.com/security/cve/CVE-2017-12805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12805/">CVE-2017-12805</cve>
	<bugzilla href="https://bugzilla.suse.com/1135236">SUSE bug 1135236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12809" ref_url="https://www.suse.com/security/cve/CVE-2017-12809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with the IDE disk and CD/DVD-ROM Emulator support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12809/">CVE-2017-12809</cve>
	<bugzilla href="https://bugzilla.suse.com/1054724">SUSE bug 1054724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12814" ref_url="https://www.suse.com/security/cve/CVE-2017-12814" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-12814/">CVE-2017-12814</cve>
	<bugzilla href="https://bugzilla.suse.com/1057727">SUSE bug 1057727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12836" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003198.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2483-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00067.html" source="SUSE-SU"/>
    <description>
    CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<bugzilla href="https://bugzilla.suse.com/1052481">SUSE bug 1052481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052696">SUSE bug 1052696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052932">SUSE bug 1052932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053364">SUSE bug 1053364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054653">SUSE bug 1054653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066430">SUSE bug 1066430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071709">SUSE bug 1071709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549627" comment="cvs-1.12.12-182.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532408" comment="cvs-doc-1.12.12-182.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00083.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive modifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837</cve>
	<bugzilla href="https://bugzilla.suse.com/1057724">SUSE bug 1057724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549842" comment="perl-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549843" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549844" comment="perl-base-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12855" ref_url="https://www.suse.com/security/cve/CVE-2017-12855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00022.html" source="SUSE-SU"/>
    <description>
    Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances, Xen will clear the status bits too early, incorrectly informing the guest that the grant is no longer in use. A guest may prematurely believe that a granted frame is safely private again, and reuse it in a way which contains sensitive information, while the domain on the far end of the grant is still using the grant. Xen 4.9, 4.8, 4.7, 4.6, and 4.5 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12855/">CVE-2017-12855</cve>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518050" comment="xen-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549592" comment="xen-doc-html-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518051" comment="xen-libs-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518052" comment="xen-libs-32bit-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549593" comment="xen-tools-4.7.3_03-43.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549594" comment="xen-tools-domU-4.7.3_03-43.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12858" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12858" ref_url="https://www.suse.com/security/cve/CVE-2017-12858" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the _zip_dirent_read function in zip_dirent.c in libzip allows attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12858/">CVE-2017-12858</cve>
	<bugzilla href="https://bugzilla.suse.com/1055377">SUSE bug 1055377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184178">SUSE bug 1184178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334034" comment="libzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12875" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12875" ref_url="https://www.suse.com/security/cve/CVE-2017-12875" source="SUSE CVE"/>
    <description>
    The WritePixelCachePixels function in ImageMagick 7.0.6-6 allows remote attackers to cause a denial of service (CPU consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12875/">CVE-2017-12875</cve>
	<bugzilla href="https://bugzilla.suse.com/1056988">SUSE bug 1056988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12876" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12876" ref_url="https://www.suse.com/security/cve/CVE-2017-12876" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in enhance.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12876/">CVE-2017-12876</cve>
	<bugzilla href="https://bugzilla.suse.com/1054034">SUSE bug 1054034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12877" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12877" ref_url="https://www.suse.com/security/cve/CVE-2017-12877" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the DestroyImage function in image.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12877/">CVE-2017-12877</cve>
	<bugzilla href="https://bugzilla.suse.com/1054029">SUSE bug 1054029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12880</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12880" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12880" ref_url="https://www.suse.com/security/cve/CVE-2017-12880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2820-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00096.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2017-11424.  Reason: This candidate is a duplicate of CVE-2017-11424.  Notes: All CVE users should reference CVE-2017-11424 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12880/">CVE-2017-12880</cve>
	<bugzilla href="https://bugzilla.suse.com/1054106">SUSE bug 1054106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525305" comment="python-PyJWT-1.5.3-3.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00083.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883</cve>
	<bugzilla href="https://bugzilla.suse.com/1057721">SUSE bug 1057721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549842" comment="perl-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549843" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549844" comment="perl-base-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1289" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
    <description>
    IBM SDK, Java Technology Edition is vulnerable XML External Entity Injection (XXE) error when processing XML data. A remote attacker could exploit this vulnerability to expose highly sensitive information or consume memory resources. IBM X-Force ID: 125150.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12893" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The SMB/CIFS parser in tcpdump before 4.9.2 has a buffer over-read in smbutil.c:name_len().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12894" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12895" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12896" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:isakmp_rfc3948_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12897" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12898" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:interp_reply().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12899" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in util-print.c:tok2strbuf().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12901" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12902" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12935" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12935" ref_url="https://www.suse.com/security/cve/CVE-2017-12935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadMNGImage function in coders/png.c in GraphicsMagick 1.3.26 mishandles large MNG images, leading to an invalid memory read in the SetImageColorCallBack function in magick/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12935/">CVE-2017-12935</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334655" comment="unrar is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12938" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12938" ref_url="https://www.suse.com/security/cve/CVE-2017-12938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
    <description>
    UnRAR before 5.5.7 allows remote attackers to bypass a directory-traversal protection mechanism via vectors involving a symlink to the . directory, a symlink to the .. directory, and a regular file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12938/">CVE-2017-12938</cve>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334655" comment="unrar is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12940" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12940" ref_url="https://www.suse.com/security/cve/CVE-2017-12940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
    <description>
    libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the EncodeFileName::Decode call within the Archive::ReadHeader15 function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12940/">CVE-2017-12940</cve>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196772">SUSE bug 1196772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196774">SUSE bug 1196774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334655" comment="unrar is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12941" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12941" ref_url="https://www.suse.com/security/cve/CVE-2017-12941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
    <description>
    libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the Unpack::Unpack20 function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12941/">CVE-2017-12941</cve>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196772">SUSE bug 1196772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196774">SUSE bug 1196774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334655" comment="unrar is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12942" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12942" ref_url="https://www.suse.com/security/cve/CVE-2017-12942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
    <description>
    libunrar.a in UnRAR before 5.5.7 has a buffer overflow in the Unpack::LongLZ function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12942/">CVE-2017-12942</cve>
	<bugzilla href="https://bugzilla.suse.com/1054038">SUSE bug 1054038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196772">SUSE bug 1196772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196774">SUSE bug 1196774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334655" comment="unrar is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12944" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00061.html" source="SUSE-SU"/>
    <description>
    The TIFFReadDirEntryArray function in tif_read.c in LibTIFF 4.0.8 mishandles memory allocation for short files, which allows remote attackers to cause a denial of service (allocation failure and application crash) in the TIFFFetchStripThing function in tif_dirread.c during a tiff2pdf invocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944</cve>
	<bugzilla href="https://bugzilla.suse.com/1003874">SUSE bug 1003874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054594">SUSE bug 1054594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12955" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12955" ref_url="https://www.suse.com/security/cve/CVE-2017-12955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer overflow in basicio.cpp of Exiv2 0.26. The vulnerability causes an out-of-bounds write in Exiv2::Image::printIFDStructure(), which may lead to remote denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12955/">CVE-2017-12955</cve>
	<bugzilla href="https://bugzilla.suse.com/1054593">SUSE bug 1054593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12956" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12956" ref_url="https://www.suse.com/security/cve/CVE-2017-12956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in Exiv2::FileIo::path[abi:cxx11]() in basicio.cpp of libexiv2 in Exiv2 0.26 that will lead to remote denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12956/">CVE-2017-12956</cve>
	<bugzilla href="https://bugzilla.suse.com/1054592">SUSE bug 1054592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12957" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12957" ref_url="https://www.suse.com/security/cve/CVE-2017-12957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in libexiv2 in Exiv2 0.26 that is triggered in the Exiv2::Image::io function in image.cpp. It will lead to remote denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12957/">CVE-2017-12957</cve>
	<bugzilla href="https://bugzilla.suse.com/1054590">SUSE bug 1054590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12967" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12967" ref_url="https://www.suse.com/security/cve/CVE-2017-12967" source="SUSE CVE"/>
    <description>
    The getsym function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a malformed tekhex binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12967/">CVE-2017-12967</cve>
	<bugzilla href="https://bugzilla.suse.com/1054665">SUSE bug 1054665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12982" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12982" ref_url="https://www.suse.com/security/cve/CVE-2017-12982" source="SUSE CVE"/>
    <description>
    The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_malloc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12982/">CVE-2017-12982</cve>
	<bugzilla href="https://bugzilla.suse.com/1054696">SUSE bug 1054696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12983" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12983" ref_url="https://www.suse.com/security/cve/CVE-2017-12983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12983/">CVE-2017-12983</cve>
	<bugzilla href="https://bugzilla.suse.com/1054757">SUSE bug 1054757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12985" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-ip6.c:ip6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12986" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12987" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12988" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12989" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12990" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.2 could enter an infinite loop due to bugs in print-isakmp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12991" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12992" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12993" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12995" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12996" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PIMv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c:pimv2_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The LLDP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-lldp.c:lldp_private_8021_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12998" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_extd_ip_reach().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12999" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13000" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13001" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13002" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13003" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The LMP parser in tcpdump before 4.9.2 has a buffer over-read in print-lmp.c:lmp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13004" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13005" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13006" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The L2TP parser in tcpdump before 4.9.2 has a buffer over-read in print-l2tp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13007" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13008" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13009" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13010" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BEEP parser in tcpdump before 4.9.2 has a buffer over-read in print-beep.c:l_strnstart().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13011" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    Several protocol parsers in tcpdump before 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123142">SUSE bug 1123142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13012" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ICMP parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp.c:icmp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13013" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ARP parser in tcpdump before 4.9.2 has a buffer over-read in print-arp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13014" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The White Board protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-wb.c:wb_prep(), several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13015" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The EAP parser in tcpdump before 4.9.2 has a buffer over-read in print-eap.c:eap_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13016" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13017" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The DHCPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-dhcp6.c:dhcp6opt_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13018" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13019" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13020" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13021" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13022" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printroute().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13023" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13024" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13025" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 mobility parser in tcpdump before 4.9.2 has a buffer over-read in print-mobility.c:mobility_opt_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13026" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13027" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_mgmt_addr_tlv_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13028" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13029" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:print_ccp_config_options().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13030" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PIM parser in tcpdump before 4.9.2 has a buffer over-read in print-pim.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13031" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 fragmentation header parser in tcpdump before 4.9.2 has a buffer over-read in print-frag6.c:frag6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13032" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RADIUS parser in tcpdump before 4.9.2 has a buffer over-read in print-radius.c:print_attr_string().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13033" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The VTP parser in tcpdump before 4.9.2 has a buffer over-read in print-vtp.c:vtp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13034" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PGM parser in tcpdump before 4.9.2 has a buffer over-read in print-pgm.c:pgm_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13035" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_id().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13036" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The OSPFv3 parser in tcpdump before 4.9.2 has a buffer over-read in print-ospf6.c:ospf6_decode_v3().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13037" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IP parser in tcpdump before 4.9.2 has a buffer over-read in print-ip.c:ip_printts().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13038" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The PPP parser in tcpdump before 4.9.2 has a buffer over-read in print-ppp.c:handle_mlppp().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13039" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13040" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The MPTCP parser in tcpdump before 4.9.2 has a buffer over-read in print-mptcp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13041" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_nodeinfo_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13042" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13043" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_multicast_vpn().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13044" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The HNCP parser in tcpdump before 4.9.2 has a buffer over-read in print-hncp.c:dhcpv4_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13045" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The VQP parser in tcpdump before 4.9.2 has a buffer over-read in print-vqp.c:vqp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13046" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13047" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO ES-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:esis_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13048" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13049" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Rx protocol parser in tcpdump before 4.9.2 has a buffer over-read in print-rx.c:ubik_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13050" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RPKI-Router parser in tcpdump before 4.9.2 has a buffer over-read in print-rpki-rtr.c:rpki_rtr_pdu_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13051" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The RSVP parser in tcpdump before 4.9.2 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13052" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The CFM parser in tcpdump before 4.9.2 has a buffer over-read in print-cfm.c:cfm_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13053" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_rt_routing_info().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13054" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The LLDP parser in tcpdump before 4.9.2 has a buffer over-read in print-lldp.c:lldp_private_8023_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13055" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13058" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13058" ref_url="https://www.suse.com/security/cve/CVE-2017-13058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00040.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function WritePCXImage in coders/pcx.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13058/">CVE-2017-13058</cve>
	<bugzilla href="https://bugzilla.suse.com/1055069">SUSE bug 1055069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111072">SUSE bug 1111072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13059" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13059" ref_url="https://www.suse.com/security/cve/CVE-2017-13059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function WriteOneJNGImage in coders/png.c, which allows attackers to cause a denial of service (WriteJNGImage memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13059/">CVE-2017-13059</cve>
	<bugzilla href="https://bugzilla.suse.com/1055068">SUSE bug 1055068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13060" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13060" ref_url="https://www.suse.com/security/cve/CVE-2017-13060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-5, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13060/">CVE-2017-13060</cve>
	<bugzilla href="https://bugzilla.suse.com/1055065">SUSE bug 1055065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13061" ref_url="https://www.suse.com/security/cve/CVE-2017-13061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-5, a length-validation vulnerability was found in the function ReadPSDLayersInternal in coders/psd.c, which allows attackers to cause a denial of service (ReadPSDImage memory exhaustion) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13061/">CVE-2017-13061</cve>
	<bugzilla href="https://bugzilla.suse.com/1055063">SUSE bug 1055063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13062" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13062" ref_url="https://www.suse.com/security/cve/CVE-2017-13062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6, a memory leak vulnerability was found in the function formatIPTC in coders/meta.c, which allows attackers to cause a denial of service (WriteMETAImage memory consumption) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13062/">CVE-2017-13062</cve>
	<bugzilla href="https://bugzilla.suse.com/1055053">SUSE bug 1055053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055055">SUSE bug 1055055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13063" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13063" ref_url="https://www.suse.com/security/cve/CVE-2017-13063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c:314:12.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13063/">CVE-2017-13063</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055038">SUSE bug 1055038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055050">SUSE bug 1055050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13064" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13064" ref_url="https://www.suse.com/security/cve/CVE-2017-13064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00112.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a heap-based buffer overflow vulnerability in the function GetStyleTokens in coders/svg.c:311:12.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13064/">CVE-2017-13064</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055042">SUSE bug 1055042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055050">SUSE bug 1055050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13065" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13065" ref_url="https://www.suse.com/security/cve/CVE-2017-13065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a NULL pointer dereference vulnerability in the function SVGStartElement in coders/svg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13065/">CVE-2017-13065</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055038">SUSE bug 1055038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13066" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13066" ref_url="https://www.suse.com/security/cve/CVE-2017-13066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a memory leak vulnerability in the function CloneImage in magick/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13066/">CVE-2017-13066</cve>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055010">SUSE bug 1055010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549750" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549750" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063671">SUSE bug 1063671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178872">SUSE bug 1178872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518323" comment="kernel-firmware-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518324" comment="ucode-amd-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549750" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518323" comment="kernel-firmware-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518324" comment="ucode-amd-20170530-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549750" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549750" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549750" comment="wpa_supplicant-2.2-15.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00081.html" source="SUSE-SU"/>
    <description>
    The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089</cve>
	<bugzilla href="https://bugzilla.suse.com/1064715">SUSE bug 1064715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549780" comment="wget-1.14-21.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2871-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2871-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00081.html" source="SUSE-SU"/>
    <description>
    The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes by using the MIN() macro, but ends up passing the negative chunk length to retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. The attacker can corrupt malloc metadata after the allocated buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090</cve>
	<bugzilla href="https://bugzilla.suse.com/1064716">SUSE bug 1064716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549780" comment="wget-1.14-21.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13131" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13131" ref_url="https://www.suse.com/security/cve/CVE-2017-13131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-8, a memory leak vulnerability was found in the function ReadMIFFImage in coders/miff.c, which allows attackers to cause a denial of service (memory consumption in NewLinkedList in MagickCore/linked-list.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13131/">CVE-2017-13131</cve>
	<bugzilla href="https://bugzilla.suse.com/1055229">SUSE bug 1055229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13132" ref_url="https://www.suse.com/security/cve/CVE-2017-13132" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.6-8, the WritePDFImage function in coders/pdf.c operates on an incorrect data structure in the "dump uncompressed PseudoColor packets" step, which allows attackers to cause a denial of service (assertion failure in WriteBlobStream in MagickCore/blob.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13132/">CVE-2017-13132</cve>
	<bugzilla href="https://bugzilla.suse.com/1055226">SUSE bug 1055226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13133" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13133" ref_url="https://www.suse.com/security/cve/CVE-2017-13133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-8, the load_level function in coders/xcf.c lacks offset validation, which allows attackers to cause a denial of service (load_tile memory exhaustion) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13133/">CVE-2017-13133</cve>
	<bugzilla href="https://bugzilla.suse.com/1055219">SUSE bug 1055219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13134" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13134" ref_url="https://www.suse.com/security/cve/CVE-2017-13134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-6 and GraphicsMagick 1.3.26, a heap-based buffer over-read was found in the function SFWScan in coders/sfw.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13134/">CVE-2017-13134</cve>
	<bugzilla href="https://bugzilla.suse.com/1055214">SUSE bug 1055214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13139" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13139" ref_url="https://www.suse.com/security/cve/CVE-2017-13139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13139/">CVE-2017-13139</cve>
	<bugzilla href="https://bugzilla.suse.com/1055430">SUSE bug 1055430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13140" ref_url="https://www.suse.com/security/cve/CVE-2017-13140" source="SUSE CVE"/>
    <description>
    In ImageMagick before 6.9.9-1 and 7.x before 7.0.6-2, the ReadOnePNGImage function in coders/png.c allows remote attackers to cause a denial of service (application hang in LockSemaphoreInfo) via a PNG file with a width equal to MAGICK_WIDTH_LIMIT.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13140/">CVE-2017-13140</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055458">SUSE bug 1055458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13141" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13141" ref_url="https://www.suse.com/security/cve/CVE-2017-13141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.9-4 and 7.x before 7.0.6-4, a crafted file could trigger a memory leak in ReadOnePNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13141/">CVE-2017-13141</cve>
	<bugzilla href="https://bugzilla.suse.com/1055456">SUSE bug 1055456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13142" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13142" ref_url="https://www.suse.com/security/cve/CVE-2017-13142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, a crafted PNG file could trigger a crash because there was an insufficient check for short files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13142/">CVE-2017-13142</cve>
	<bugzilla href="https://bugzilla.suse.com/1055455">SUSE bug 1055455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13144" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13144" ref_url="https://www.suse.com/security/cve/CVE-2017-13144" source="SUSE CVE"/>
    <description>
    In ImageMagick before 6.9.7-10, there is a crash (rather than a "width or height exceeds limit" error report) if the image dimensions are too large, as demonstrated by use of the mpc coder.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13144/">CVE-2017-13144</cve>
	<bugzilla href="https://bugzilla.suse.com/1055437">SUSE bug 1055437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13145" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13145" ref_url="https://www.suse.com/security/cve/CVE-2017-13145" source="SUSE CVE"/>
    <description>
    In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13145/">CVE-2017-13145</cve>
	<bugzilla href="https://bugzilla.suse.com/1055464">SUSE bug 1055464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13146" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13146" ref_url="https://www.suse.com/security/cve/CVE-2017-13146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.8-5 and 7.x before 7.0.5-6, there is a memory leak in the ReadMATImage function in coders/mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13146/">CVE-2017-13146</cve>
	<bugzilla href="https://bugzilla.suse.com/1055323">SUSE bug 1055323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13147" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13147" ref_url="https://www.suse.com/security/cve/CVE-2017-13147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.3.26, an allocation failure vulnerability was found in the function ReadMNGImage in coders/png.c when a small MNG file has a MEND chunk with a large length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13147/">CVE-2017-13147</cve>
	<bugzilla href="https://bugzilla.suse.com/1055374">SUSE bug 1055374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1030-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the kernel v4l2 video driver. Product: Android. Versions: Android kernel. Android ID A-34624167.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<bugzilla href="https://bugzilla.suse.com/1072865">SUSE bug 1072865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085447">SUSE bug 1085447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009536459" comment="kgraft-patch-4_4_103-92_53-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536458" comment="kgraft-patch-4_4_103-92_56-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536465" comment="kgraft-patch-4_4_114-92_64-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536464" comment="kgraft-patch-4_4_114-92_67-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536735" comment="kgraft-patch-4_4_59-92_17-default-10-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536466" comment="kgraft-patch-4_4_59-92_20-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536467" comment="kgraft-patch-4_4_59-92_24-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536461" comment="kgraft-patch-4_4_74-92_29-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536460" comment="kgraft-patch-4_4_74-92_32-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536463" comment="kgraft-patch-4_4_74-92_35-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536462" comment="kgraft-patch-4_4_74-92_38-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536457" comment="kgraft-patch-4_4_90-92_45-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536456" comment="kgraft-patch-4_4_90-92_50-default-7-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13168" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13168" ref_url="https://www.suse.com/security/cve/CVE-2017-13168" source="SUSE CVE"/>
    <description>
    An elevation of privilege vulnerability in the kernel scsi driver. Product: Android. Versions: Android kernel. Android ID A-65023233.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13168/">CVE-2017-13168</cve>
	<bugzilla href="https://bugzilla.suse.com/1072831">SUSE bug 1072831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13194" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0210-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00088.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the Android media framework (libvpx) related to odd frame width. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64710201.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194</cve>
	<bugzilla href="https://bugzilla.suse.com/1075992">SUSE bug 1075992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550423" comment="libvpx1-1.3.0-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13215" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
    <description>
    A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215</cve>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13220" ref_url="https://www.suse.com/security/cve/CVE-2017-13220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13220/">CVE-2017-13220</cve>
	<bugzilla href="https://bugzilla.suse.com/1076537">SUSE bug 1076537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13221" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13221" ref_url="https://www.suse.com/security/cve/CVE-2017-13221" source="SUSE CVE"/>
    <description>
    An elevation of privilege vulnerability in the Upstream kernel wifi driver. Product: Android. Versions: Android kernel. Android ID: A-64709938.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-13221/">CVE-2017-13221</cve>
	<bugzilla href="https://bugzilla.suse.com/1076600">SUSE bug 1076600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13305" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13305" ref_url="https://www.suse.com/security/cve/CVE-2017-13305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
    <description>
    A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13305/">CVE-2017-13305</cve>
	<bugzilla href="https://bugzilla.suse.com/1094353">SUSE bug 1094353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13648" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13648" ref_url="https://www.suse.com/security/cve/CVE-2017-13648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.3.26, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13648/">CVE-2017-13648</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055434">SUSE bug 1055434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13658" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13658" ref_url="https://www.suse.com/security/cve/CVE-2017-13658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 6.9.9-3 and 7.x before 7.0.6-3, there is a missing NULL check in the ReadMATImage function in coders/mat.c, leading to a denial of service (assertion failure and application exit) in the DestroyImageInfo function in MagickCore/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13658/">CVE-2017-13658</cve>
	<bugzilla href="https://bugzilla.suse.com/1055855">SUSE bug 1055855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530823" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530824" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530826" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530827" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530829" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530830" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530833" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551351" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551352" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551353" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551354" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551356" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537310" comment="qemu-ppc-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551358" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595404" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595405" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595406" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595407" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595408" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595409" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13673" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<bugzilla href="https://bugzilla.suse.com/1056386">SUSE bug 1056386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056387">SUSE bug 1056387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530823" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530824" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530826" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530827" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530829" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530830" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530833" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551351" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551352" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551353" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551354" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551356" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537310" comment="qemu-ppc-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551358" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595404" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595405" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595406" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595407" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595408" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595409" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13685" ref_url="https://www.suse.com/security/cve/CVE-2017-13685" source="SUSE CVE"/>
    <description>
    The dump_callback function in SQLite 3.20.0 allows remote attackers to cause a denial of service (EXC_BAD_ACCESS and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13685/">CVE-2017-13685</cve>
	<bugzilla href="https://bugzilla.suse.com/1056541">SUSE bug 1056541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13686" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13686" ref_url="https://www.suse.com/security/cve/CVE-2017-13686" source="SUSE CVE"/>
    <description>
    net/ipv4/route.c in the Linux kernel 4.13-rc1 through 4.13-rc6 is too late to check for a NULL fi field when RTM_F_FIB_MATCH is set, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via crafted system calls. NOTE: this does not affect any stable release.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13686/">CVE-2017-13686</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055631">SUSE bug 1055631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13687" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The Cisco HDLC parser in tcpdump before 4.9.2 has a buffer over-read in print-chdlc.c:chdlc_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13688" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The OLSR parser in tcpdump before 4.9.2 has a buffer over-read in print-olsr.c:olsr_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13689" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IKEv1 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:ikev1_id_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13690" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IKEv2 parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c, several functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13693" ref_url="https://www.suse.com/security/cve/CVE-2017-13693" source="SUSE CVE"/>
    <description>
    The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13693/">CVE-2017-13693</cve>
	<bugzilla href="https://bugzilla.suse.com/1055713">SUSE bug 1055713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13694" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13694" ref_url="https://www.suse.com/security/cve/CVE-2017-13694" source="SUSE CVE"/>
    <description>
    The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13694/">CVE-2017-13694</cve>
	<bugzilla href="https://bugzilla.suse.com/1055705">SUSE bug 1055705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13695" ref_url="https://www.suse.com/security/cve/CVE-2017-13695" source="SUSE CVE"/>
    <description>
    The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13695/">CVE-2017-13695</cve>
	<bugzilla href="https://bugzilla.suse.com/1055710">SUSE bug 1055710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13704" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13704" ref_url="https://www.suse.com/security/cve/CVE-2017-13704" source="SUSE CVE"/>
    <description>
    In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-13704/">CVE-2017-13704</cve>
	<bugzilla href="https://bugzilla.suse.com/1060586">SUSE bug 1060586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338972" comment="dnsmasq is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711</cve>
	<bugzilla href="https://bugzilla.suse.com/1056291">SUSE bug 1056291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13720" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3256-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00005.html" source="SUSE-SU"/>
    <description>
    In the PatternMatch function in fontfile/fontdir.c in libXfont through 1.5.2 and 2.x before 2.0.2, an attacker with access to an X connection can cause a buffer over-read during pattern matching of fonts, leading to information disclosure or a crash (denial of service). This occurs because '\0' characters are incorrectly skipped in situations involving ? characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<bugzilla href="https://bugzilla.suse.com/1054285">SUSE bug 1054285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550587" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13721" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
    <description>
    In X.Org Server (aka xserver and xorg-server) before 1.19.4, an attacker authenticated to an X server with the X shared memory extension enabled can cause aborts of the X server or replace shared memory segments of other X clients in the same session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052984">SUSE bug 1052984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13722" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3256-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0343-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00005.html" source="SUSE-SU"/>
    <description>
    In the pcfGetProperties function in bitmap/pcfread.c in libXfont through 1.5.2 and 2.x before 2.0.2, a missing boundary check (for PCF files) could be used by local attackers authenticated to an Xserver for a buffer over-read, for information disclosure or a crash of the X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<bugzilla href="https://bugzilla.suse.com/1049692">SUSE bug 1049692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550587" comment="libXfont1-1.5.1-11.3.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13723" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003402.html" source="SUSE-SU"/>
    <description>
    In X.Org Server (aka xserver and xorg-server) before 1.19.4, a local attacker authenticated to the X server could overflow a global buffer, causing crashes of the X server or potentially other problems by injecting large or malformed XKB related atoms and accessing them via xkbcomp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<bugzilla href="https://bugzilla.suse.com/1051150">SUSE bug 1051150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052984">SUSE bug 1052984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549838" comment="xorg-x11-server-7.6_1.18.3-76.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549839" comment="xorg-x11-server-extra-7.6_1.18.3-76.15.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13725" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00093.html" source="SUSE-SU"/>
    <description>
    The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<bugzilla href="https://bugzilla.suse.com/1050219">SUSE bug 1050219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050222">SUSE bug 1050222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050225">SUSE bug 1050225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057247">SUSE bug 1057247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549765" comment="tcpdump-4.9.2-14.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13728" ref_url="https://www.suse.com/security/cve/CVE-2017-13728" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an infinite loop in the next_char function in comp_scan.c in ncurses 6.0, related to libtic. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13728/">CVE-2017-13728</cve>
	<bugzilla href="https://bugzilla.suse.com/1056136">SUSE bug 1056136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550549" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550550" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550551" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550552" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541322" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550553" comment="ncurses-devel-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550554" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550555" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550556" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550557" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13729" ref_url="https://www.suse.com/security/cve/CVE-2017-13729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13729/">CVE-2017-13729</cve>
	<bugzilla href="https://bugzilla.suse.com/1056132">SUSE bug 1056132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550549" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550550" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550551" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550552" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541322" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550553" comment="ncurses-devel-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550554" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550555" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550556" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550557" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13730" ref_url="https://www.suse.com/security/cve/CVE-2017-13730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the function _nc_read_entry_source() in progs/tic.c in ncurses 6.0 that might lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13730/">CVE-2017-13730</cve>
	<bugzilla href="https://bugzilla.suse.com/1056131">SUSE bug 1056131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550549" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550550" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550551" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550552" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541322" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550553" comment="ncurses-devel-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550554" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550555" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550556" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550557" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13731" ref_url="https://www.suse.com/security/cve/CVE-2017-13731" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the function postprocess_termcap() in parse_entry.c in ncurses 6.0 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13731/">CVE-2017-13731</cve>
	<bugzilla href="https://bugzilla.suse.com/1056129">SUSE bug 1056129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550549" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550550" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550551" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550552" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541322" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550553" comment="ncurses-devel-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550554" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550555" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550556" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550557" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13732" ref_url="https://www.suse.com/security/cve/CVE-2017-13732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the function dump_uses() in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13732/">CVE-2017-13732</cve>
	<bugzilla href="https://bugzilla.suse.com/1056128">SUSE bug 1056128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550549" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550550" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550551" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550552" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541322" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550553" comment="ncurses-devel-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550554" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550555" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550556" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550557" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13733" ref_url="https://www.suse.com/security/cve/CVE-2017-13733" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0159-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00062.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the fmt_entry function in progs/dump_entry.c in ncurses 6.0 that might lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13733/">CVE-2017-13733</cve>
	<bugzilla href="https://bugzilla.suse.com/1056127">SUSE bug 1056127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115932">SUSE bug 1115932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550549" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550550" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550551" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550552" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541322" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550553" comment="ncurses-devel-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550554" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550555" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550556" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550557" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13734" ref_url="https://www.suse.com/security/cve/CVE-2017-13734" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003678.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the _nc_safe_strcat function in strings.c in ncurses 6.0 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13734/">CVE-2017-13734</cve>
	<bugzilla href="https://bugzilla.suse.com/1056126">SUSE bug 1056126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550549" comment="libncurses5-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550550" comment="libncurses5-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550551" comment="libncurses6-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550552" comment="libncurses6-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541322" comment="ncurses-devel-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550553" comment="ncurses-devel-32bit-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550554" comment="ncurses-utils-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550555" comment="tack-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550556" comment="terminfo-5.9-58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550557" comment="terminfo-base-5.9-58.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13738" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the _lou_getALine function in compileTranslationTable.c:346 in Liblouis 3.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738</cve>
	<bugzilla href="https://bugzilla.suse.com/1056105">SUSE bug 1056105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549662" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549663" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549664" comment="python-louis-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549665" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13739" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer overflow that causes a more than two thousand bytes out-of-bounds write in Liblouis 3.2.0, triggered in the function resolveSubtable() in compileTranslationTable.c. It will lead to denial of service or remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<bugzilla href="https://bugzilla.suse.com/1056101">SUSE bug 1056101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549662" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549663" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549664" comment="python-louis-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549665" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13740" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is a stack-based buffer overflow in Liblouis 3.2.0, triggered in the function parseChars() in compileTranslationTable.c, that will lead to denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<bugzilla href="https://bugzilla.suse.com/1056097">SUSE bug 1056097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549662" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549663" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549664" comment="python-louis-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549665" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13741" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free in the function compileBrailleIndicator() in compileTranslationTable.c in Liblouis 3.2.0 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<bugzilla href="https://bugzilla.suse.com/1056095">SUSE bug 1056095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549662" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549663" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549664" comment="python-louis-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549665" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13743" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is a buffer overflow in Liblouis 3.2.0, triggered in the function _lou_showString() in utils.c, that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<bugzilla href="https://bugzilla.suse.com/1056090">SUSE bug 1056090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549662" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549663" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549664" comment="python-louis-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549665" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13744" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003260.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00008.html" source="SUSE-SU"/>
    <description>
    There is an illegal address access in the function _lou_getALine() in compileTranslationTable.c:343 in Liblouis 3.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744</cve>
	<bugzilla href="https://bugzilla.suse.com/1056088">SUSE bug 1056088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549662" comment="liblouis-data-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549663" comment="liblouis9-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549664" comment="python-louis-2.6.4-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549665" comment="python3-louis-2.6.4-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13745</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13745" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13745" ref_url="https://www.suse.com/security/cve/CVE-2017-13745" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_dec_process_sot() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack by triggering an unexpected jpc_ppmstabtostreams return value, a different vulnerability than CVE-2018-9154.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13745/">CVE-2017-13745</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056069">SUSE bug 1056069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13746" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13746" ref_url="https://www.suse.com/security/cve/CVE-2017-13746" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_dec_process_siz() in jpc/jpc_dec.c:1297 in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13746/">CVE-2017-13746</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056068">SUSE bug 1056068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13747" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13747" ref_url="https://www.suse.com/security/cve/CVE-2017-13747" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_floorlog2() in jpc/jpc_math.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13747/">CVE-2017-13747</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056067">SUSE bug 1056067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13748" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13748" ref_url="https://www.suse.com/security/cve/CVE-2017-13748" source="SUSE CVE"/>
    <description>
    There are lots of memory leaks in JasPer 2.0.12, triggered in the function jas_strdup() in base/jas_string.c, that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13748/">CVE-2017-13748</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056066">SUSE bug 1056066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13749" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13749" ref_url="https://www.suse.com/security/cve/CVE-2017-13749" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_pi_nextrpcl() in jpc/jpc_t2cod.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13749/">CVE-2017-13749</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056065">SUSE bug 1056065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13750" ref_url="https://www.suse.com/security/cve/CVE-2017-13750" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_dec_process_siz() in jpc/jpc_dec.c:1296 in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13750/">CVE-2017-13750</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056064">SUSE bug 1056064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13751" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13751" ref_url="https://www.suse.com/security/cve/CVE-2017-13751" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function calcstepsizes() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13751/">CVE-2017-13751</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056063">SUSE bug 1056063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13752" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13752" ref_url="https://www.suse.com/security/cve/CVE-2017-13752" source="SUSE CVE"/>
    <description>
    There is a reachable assertion abort in the function jpc_dequantize() in jpc/jpc_dec.c in JasPer 2.0.12 that will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13752/">CVE-2017-13752</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056062">SUSE bug 1056062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13753" ref_url="https://www.suse.com/security/cve/CVE-2017-13753" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-9396.  Reason: This candidate is a duplicate of CVE-2016-9396.  Notes: All CVE users should reference CVE-2016-9396 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13753/">CVE-2017-13753</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056060">SUSE bug 1056060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082397">SUSE bug 1082397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334023" comment="jasper is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13757" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not validate the PLT section size, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to elf_i386_get_synthetic_symtab in elf32-i386.c and elf_x86_64_get_synthetic_symtab in elf64-x86-64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757</cve>
	<bugzilla href="https://bugzilla.suse.com/1056312">SUSE bug 1056312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13758" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13758" ref_url="https://www.suse.com/security/cve/CVE-2017-13758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-10, there is a heap-based buffer overflow in the TracePoint() function in MagickCore/draw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13758/">CVE-2017-13758</cve>
	<bugzilla href="https://bugzilla.suse.com/1056277">SUSE bug 1056277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096261">SUSE bug 1096261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13764" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13764" ref_url="https://www.suse.com/security/cve/CVE-2017-13764" source="SUSE CVE"/>
    <description>
    In Wireshark 2.4.0, the Modbus dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/packet-mbtcp.c by adding length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13764/">CVE-2017-13764</cve>
	<bugzilla href="https://bugzilla.suse.com/1056250">SUSE bug 1056250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13765" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00008.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<bugzilla href="https://bugzilla.suse.com/1056251">SUSE bug 1056251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549653" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549654" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549655" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549656" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549657" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549658" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13766" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00008.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 and 2.2.0 to 2.2.8, the Profinet I/O dissector could crash with an out-of-bounds write. This was addressed in plugins/profinet/packet-dcerpc-pn-io.c by adding string validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<bugzilla href="https://bugzilla.suse.com/1056249">SUSE bug 1056249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549653" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549654" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549655" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549656" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549657" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549658" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13767" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2349-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00008.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the MSDP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-msdp.c by adding length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<bugzilla href="https://bugzilla.suse.com/1056248">SUSE bug 1056248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549653" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549654" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549655" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549656" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549657" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549658" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13768" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13768" ref_url="https://www.suse.com/security/cve/CVE-2017-13768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    Null Pointer Dereference in the IdentifyImage function in MagickCore/identify.c in ImageMagick through 7.0.6-10 allows an attacker to perform denial of service by sending a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13768/">CVE-2017-13768</cve>
	<bugzilla href="https://bugzilla.suse.com/1056434">SUSE bug 1056434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13769" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13769" ref_url="https://www.suse.com/security/cve/CVE-2017-13769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The WriteTHUMBNAILImage function in coders/thumbnail.c in ImageMagick through 7.0.6-10 allows an attacker to cause a denial of service (buffer over-read) by sending a crafted JPEG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13769/">CVE-2017-13769</cve>
	<bugzilla href="https://bugzilla.suse.com/1056432">SUSE bug 1056432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13775" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13775" ref_url="https://www.suse.com/security/cve/CVE-2017-13775" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2894-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00112.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a denial of service issue in ReadJNXImage() in coders/jnx.c whereby large amounts of CPU and memory resources may be consumed although the file itself does not support the requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13775/">CVE-2017-13775</cve>
	<bugzilla href="https://bugzilla.suse.com/1056431">SUSE bug 1056431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13777" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13777" ref_url="https://www.suse.com/security/cve/CVE-2017-13777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00048.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 has a denial of service issue in ReadXBMImage() in a coders/xbm.c "Read hex image data" version==10 case that results in the reader not returning; it would cause large amounts of CPU and memory consumption although the crafted file itself does not request it.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13777/">CVE-2017-13777</cve>
	<bugzilla href="https://bugzilla.suse.com/1056426">SUSE bug 1056426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13788" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788</cve>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13797" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13797" ref_url="https://www.suse.com/security/cve/CVE-2017-13797" source="SUSE CVE"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13797/">CVE-2017-13797</cve>
	<bugzilla href="https://bugzilla.suse.com/1074985">SUSE bug 1074985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338973" comment="webkit2gtk3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13798" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798</cve>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13803" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803</cve>
	<bugzilla href="https://bugzilla.suse.com/1069925">SUSE bug 1069925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13856" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13866" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13870" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14033" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14033" ref_url="https://www.suse.com/security/cve/CVE-2017-14033" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14033/">CVE-2017-14033</cve>
	<bugzilla href="https://bugzilla.suse.com/1058757">SUSE bug 1058757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334078" comment="ruby is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14039" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was discovered in the opj_t2_encode_packet function in lib/openjp2/t2.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039</cve>
	<bugzilla href="https://bugzilla.suse.com/1056622">SUSE bug 1056622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549670" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14040" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    An invalid write access was discovered in bin/jp2/convert.c in OpenJPEG 2.2.0, triggering a crash in the tgatoimage function. The vulnerability may lead to remote denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040</cve>
	<bugzilla href="https://bugzilla.suse.com/1056621">SUSE bug 1056621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549670" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14041" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow was discovered in the pgxtoimage function in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041</cve>
	<bugzilla href="https://bugzilla.suse.com/1056562">SUSE bug 1056562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549670" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14042" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14042" ref_url="https://www.suse.com/security/cve/CVE-2017-14042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    A memory allocation failure was discovered in the ReadPNMImage function in coders/pnm.c in GraphicsMagick 1.3.26. The vulnerability causes a big memory allocation, which may lead to remote denial of service in the MagickRealloc function in magick/memory.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14042/">CVE-2017-14042</cve>
	<bugzilla href="https://bugzilla.suse.com/1054598">SUSE bug 1054598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054600">SUSE bug 1054600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056550">SUSE bug 1056550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059721">SUSE bug 1059721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14051" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14060" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14060" ref_url="https://www.suse.com/security/cve/CVE-2017-14060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-10, a NULL Pointer Dereference issue is present in the ReadCUTImage function in coders/cut.c that could allow an attacker to cause a Denial of Service (in the QueueAuthenticPixelCacheNexus function within the MagickCore/cache.c file) by submitting a malformed image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14060/">CVE-2017-14060</cve>
	<bugzilla href="https://bugzilla.suse.com/1056768">SUSE bug 1056768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14064" ref_url="https://www.suse.com/security/cve/CVE-2017-14064" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14064/">CVE-2017-14064</cve>
	<bugzilla href="https://bugzilla.suse.com/1056782">SUSE bug 1056782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334078" comment="ruby is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14103" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14103" ref_url="https://www.suse.com/security/cve/CVE-2017-14103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    The ReadJNGImage and ReadOneJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 do not properly manage image pointers after certain error conditions, which allows remote attackers to conduct use-after-free attacks via a crafted file, related to a ReadMNGImage out-of-order CloseBlob call. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-11403.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14103/">CVE-2017-14103</cve>
	<bugzilla href="https://bugzilla.suse.com/1057000">SUSE bug 1057000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00057.html" source="SUSE-SU"/>
    <description>
    The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106</cve>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003255.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2550-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00096.html" source="SUSE-SU"/>
    <description>
    The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107</cve>
	<bugzilla href="https://bugzilla.suse.com/1056996">SUSE bug 1056996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549647" comment="libzip2-0.11.1-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14108" ref_url="https://www.suse.com/security/cve/CVE-2017-14108" source="SUSE CVE"/>
    <description>
    libgedit.a in GNOME gedit through 3.22.1 allows remote attackers to cause a denial of service (CPU consumption) via a file that begins with many '\0' characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14108/">CVE-2017-14108</cve>
	<bugzilla href="https://bugzilla.suse.com/1057184">SUSE bug 1057184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338978" comment="gedit is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14120" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14120" ref_url="https://www.suse.com/security/cve/CVE-2017-14120" source="SUSE CVE"/>
    <description>
    unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a directory traversal vulnerability for RAR v2 archives: pathnames of the form ../[filename] are unpacked into the upper directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14120/">CVE-2017-14120</cve>
	<bugzilla href="https://bugzilla.suse.com/1057003">SUSE bug 1057003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334206" comment="libqt5-qtbase is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14121" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14121" ref_url="https://www.suse.com/security/cve/CVE-2017-14121" source="SUSE CVE"/>
    <description>
    The DecodeNumber function in unrarlib.c in unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a NULL pointer dereference flaw triggered by a crafted RAR archive. NOTE: this may be the same as one of the several test cases in the CVE-2017-11189 references.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14121/">CVE-2017-14121</cve>
	<bugzilla href="https://bugzilla.suse.com/1057004">SUSE bug 1057004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334206" comment="libqt5-qtbase is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14122" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14122" ref_url="https://www.suse.com/security/cve/CVE-2017-14122" source="SUSE CVE"/>
    <description>
    unrar 0.0.1 (aka unrar-free or unrar-gpl) suffers from a stack-based buffer over-read in unrarlib.c, related to ExtrFile and stricomp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14122/">CVE-2017-14122</cve>
	<bugzilla href="https://bugzilla.suse.com/1057005">SUSE bug 1057005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14128" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The decode_line_info function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (read_1_byte heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128</cve>
	<bugzilla href="https://bugzilla.suse.com/1057139">SUSE bug 1057139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14129" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The read_section function in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (parse_comp_unit heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129</cve>
	<bugzilla href="https://bugzilla.suse.com/1057144">SUSE bug 1057144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14130" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The _bfd_elf_parse_attributes function in elf-attrs.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (_bfd_elf_attr_strdup heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130</cve>
	<bugzilla href="https://bugzilla.suse.com/1057149">SUSE bug 1057149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 1.900.8, 1.900.9, 1.900.10, 1.900.11, 1.900.12, 1.900.13, 1.900.14, 1.900.15, 1.900.16, 1.900.17, 1.900.18, 1.900.19, 1.900.20, 1.900.21, 1.900.22, 1.900.23, 1.900.24, 1.900.25, 1.900.26, 1.900.27, 1.900.28, 1.900.29, 1.900.30, 1.900.31, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.7, 2.0.8, 2.0.9, 2.0.10, 2.0.11, 2.0.12, 2.0.13, 2.0.14, 2.0.15, 2.0.16 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted image, related to the jas_image_ishomosamp function in libjasper/base/jas_image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132</cve>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334493" comment="jasper is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14137" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14137" ref_url="https://www.suse.com/security/cve/CVE-2017-14137" source="SUSE CVE"/>
    <description>
    ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14137/">CVE-2017-14137</cve>
	<bugzilla href="https://bugzilla.suse.com/1057153">SUSE bug 1057153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057157">SUSE bug 1057157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14138" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14138" ref_url="https://www.suse.com/security/cve/CVE-2017-14138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-5 has a memory leak vulnerability in ReadWEBPImage in coders/webp.c because memory is not freed in certain error cases, as demonstrated by VP8 errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14138/">CVE-2017-14138</cve>
	<bugzilla href="https://bugzilla.suse.com/1057153">SUSE bug 1057153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057157">SUSE bug 1057157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14139" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14139" ref_url="https://www.suse.com/security/cve/CVE-2017-14139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMSLImage in coders/msl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14139/">CVE-2017-14139</cve>
	<bugzilla href="https://bugzilla.suse.com/1057163">SUSE bug 1057163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
    <description>
    The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140</cve>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14151" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14151" ref_url="https://www.suse.com/security/cve/CVE-2017-14151" source="SUSE CVE"/>
    <description>
    An off-by-one error was discovered in opj_tcd_code_block_enc_allocate_data in lib/openjp2/tcd.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_mqc_flush in lib/openjp2/mqc.c and opj_t1_encode_cblk in lib/openjp2/t1.c) or possibly remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14151/">CVE-2017-14151</cve>
	<bugzilla href="https://bugzilla.suse.com/1057336">SUSE bug 1057336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14152" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14152" ref_url="https://www.suse.com/security/cve/CVE-2017-14152" source="SUSE CVE"/>
    <description>
    A mishandled zero case was discovered in opj_j2k_set_cinema_parameters in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c and opj_j2k_write_sot in lib/openjp2/j2k.c) or possibly remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14152/">CVE-2017-14152</cve>
	<bugzilla href="https://bugzilla.suse.com/1057335">SUSE bug 1057335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14156" ref_url="https://www.suse.com/security/cve/CVE-2017-14156" source="SUSE CVE"/>
    <description>
    The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14156/">CVE-2017-14156</cve>
	<bugzilla href="https://bugzilla.suse.com/1057347">SUSE bug 1057347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14159" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14159" ref_url="https://www.suse.com/security/cve/CVE-2017-14159" source="SUSE CVE"/>
    <description>
    slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill `cat /pathname`" command, as demonstrated by openldap-initscript.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14159/">CVE-2017-14159</cve>
	<bugzilla href="https://bugzilla.suse.com/1057340">SUSE bug 1057340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334215" comment="openldap2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00084.html" source="SUSE-SU"/>
    <description>
    The bark_noise_hybridmp function in psy.c in Xiph.Org libvorbis 1.3.5 allows remote attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334082" comment="libvorbis is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14164" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2685-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2686-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00032.html" source="SUSE-SU"/>
    <description>
    A size-validation issue was discovered in opj_j2k_write_sot in lib/openjp2/j2k.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service (heap-based buffer overflow affecting opj_write_bytes_LE in lib/openjp2/cio.c) or possibly remote code execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-14152.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164</cve>
	<bugzilla href="https://bugzilla.suse.com/1057511">SUSE bug 1057511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549670" comment="libopenjp2-7-2.1.0-4.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14166" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    libarchive 3.3.2 allows remote attackers to cause a denial of service (xml_data heap-based buffer over-read and application crash) via a crafted xar archive, related to the mishandling of empty strings in the atol8 function in archive_read_support_format_xar.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166</cve>
	<bugzilla href="https://bugzilla.suse.com/1057514">SUSE bug 1057514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14172" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14172" ref_url="https://www.suse.com/security/cve/CVE-2017-14172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In coders/ps.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "extent" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14172/">CVE-2017-14172</cve>
	<bugzilla href="https://bugzilla.suse.com/1057730">SUSE bug 1057730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14173" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14173" ref_url="https://www.suse.com/security/cve/CVE-2017-14173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In the function ReadTXTImage() in coders/txt.c in ImageMagick 7.0.6-10, an integer overflow might occur for the addition operation "GetQuantumRange(depth)+1" when "depth" is large, producing a smaller value than expected. As a result, an infinite loop would occur for a crafted TXT file that claims a very large "max_value" value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14173/">CVE-2017-14173</cve>
	<bugzilla href="https://bugzilla.suse.com/1057729">SUSE bug 1057729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14174" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14174" ref_url="https://www.suse.com/security/cve/CVE-2017-14174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would consume huge CPU resources, since there is no EOF check inside the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14174/">CVE-2017-14174</cve>
	<bugzilla href="https://bugzilla.suse.com/1057723">SUSE bug 1057723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14175" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14175" ref_url="https://www.suse.com/security/cve/CVE-2017-14175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In coders/xbm.c in ImageMagick 7.0.6-1 Q16, a DoS in ReadXBMImage() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted XBM file, which claims large rows and columns fields in the header but does not contain sufficient backing data, is provided, the loop over the rows would consume huge CPU resources, since there is no EOF check inside the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14175/">CVE-2017-14175</cve>
	<bugzilla href="https://bugzilla.suse.com/1056426">SUSE bug 1056426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056429">SUSE bug 1056429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057719">SUSE bug 1057719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14224" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14224" ref_url="https://www.suse.com/security/cve/CVE-2017-14224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in WritePCXImage in coders/pcx.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service or code execution via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14224/">CVE-2017-14224</cve>
	<bugzilla href="https://bugzilla.suse.com/1058009">SUSE bug 1058009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14229</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14229" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14229" ref_url="https://www.suse.com/security/cve/CVE-2017-14229" source="SUSE CVE"/>
    <description>
    There is an infinite loop in the jpc_dec_tileinit function in jpc/jpc_dec.c of Jasper 2.0.13. It will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14229/">CVE-2017-14229</cve>
	<bugzilla href="https://bugzilla.suse.com/1058000">SUSE bug 1058000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14245" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<bugzilla href="https://bugzilla.suse.com/1059912">SUSE bug 1059912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071777">SUSE bug 1071777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550592" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550593" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14246" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<bugzilla href="https://bugzilla.suse.com/1059913">SUSE bug 1059913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071767">SUSE bug 1071767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550592" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550593" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14248" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14248" ref_url="https://www.suse.com/security/cve/CVE-2017-14248" source="SUSE CVE"/>
    <description>
    A heap-based buffer over-read in SampleImage() in MagickCore/resize.c in ImageMagick 7.0.6-8 Q16 allows remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14248/">CVE-2017-14248</cve>
	<bugzilla href="https://bugzilla.suse.com/1058220">SUSE bug 1058220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14249" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14249" ref_url="https://www.suse.com/security/cve/CVE-2017-14249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-8 Q16 mishandles EOF checks in ReadMPCImage in coders/mpc.c, leading to division by zero in GetPixelCacheTileSize in MagickCore/cache.c, allowing remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14249/">CVE-2017-14249</cve>
	<bugzilla href="https://bugzilla.suse.com/1058082">SUSE bug 1058082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14314" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14314" ref_url="https://www.suse.com/security/cve/CVE-2017-14314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the DrawImage function in magick/render.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (DrawDashPolygon heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14314/">CVE-2017-14314</cve>
	<bugzilla href="https://bugzilla.suse.com/1058630">SUSE bug 1058630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00078.html" source="SUSE-SU"/>
    <description>
    A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the function checks to see if the special constant `NUMA_NO_NODE` is specified, it otherwise does not handle the case where `node &gt;= MAX_NUMNODES`. This allows an out-of-bounds access to an internal array.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316</cve>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549634" comment="xen-doc-html-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549635" comment="xen-tools-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549636" comment="xen-tools-domU-4.7.3_04-43.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14317" ref_url="https://www.suse.com/security/cve/CVE-2017-14317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00078.html" source="SUSE-SU"/>
    <description>
    A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on it (including domain creation / destruction, ballooning, device changes, etc.).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14317/">CVE-2017-14317</cve>
	<bugzilla href="https://bugzilla.suse.com/1056281">SUSE bug 1056281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549634" comment="xen-doc-html-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549635" comment="xen-tools-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549636" comment="xen-tools-domU-4.7.3_04-43.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14318" ref_url="https://www.suse.com/security/cve/CVE-2017-14318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00078.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.5.x through 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table is checked to see if a grant mapping to the calling domain exists for the page in question. However, the function does not check to see if the owning domain actually has a grant table or not. Some special domains, such as `DOMID_XEN`, `DOMID_IO` and `DOMID_COW` are created without grant tables. Hence, if __gnttab_cache_flush operates on a page owned by these special domains, it will attempt to dereference a NULL pointer in the domain struct.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14318/">CVE-2017-14318</cve>
	<bugzilla href="https://bugzilla.suse.com/1056280">SUSE bug 1056280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549634" comment="xen-doc-html-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549635" comment="xen-tools-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549636" comment="xen-tools-domU-4.7.3_04-43.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14319" ref_url="https://www.suse.com/security/cve/CVE-2017-14319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2514-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00078.html" source="SUSE-SU"/>
    <description>
    A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neither the presence of the mapping nor page writability were taken into account.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14319/">CVE-2017-14319</cve>
	<bugzilla href="https://bugzilla.suse.com/1056282">SUSE bug 1056282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518095" comment="xen-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549634" comment="xen-doc-html-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518096" comment="xen-libs-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518097" comment="xen-libs-32bit-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549635" comment="xen-tools-4.7.3_04-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549636" comment="xen-tools-domU-4.7.3_04-43.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14324" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14324" ref_url="https://www.suse.com/security/cve/CVE-2017-14324" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMPCImage in coders/mpc.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14324/">CVE-2017-14324</cve>
	<bugzilla href="https://bugzilla.suse.com/1058453">SUSE bug 1058453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14325" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14325" ref_url="https://www.suse.com/security/cve/CVE-2017-14325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function PersistPixelCache in magick/cache.c, which allows attackers to cause a denial of service (memory consumption in ReadMPCImage in coders/mpc.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14325/">CVE-2017-14325</cve>
	<bugzilla href="https://bugzilla.suse.com/1058635">SUSE bug 1058635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14326" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14326" ref_url="https://www.suse.com/security/cve/CVE-2017-14326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14326/">CVE-2017-14326</cve>
	<bugzilla href="https://bugzilla.suse.com/1058640">SUSE bug 1058640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14333" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The process_version_sections function in readelf.c in GNU Binutils 2.29 allows attackers to cause a denial of service (Integer Overflow, and hang because of a time-consuming loop) or possibly have unspecified other impact via a crafted binary file with invalid values of ent.vn_next, during "readelf -a" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333</cve>
	<bugzilla href="https://bugzilla.suse.com/1058480">SUSE bug 1058480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14340" ref_url="https://www.suse.com/security/cve/CVE-2017-14340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
    <description>
    The XFS_IS_REALTIME_INODE macro in fs/xfs/xfs_linux.h in the Linux kernel before 4.13.2 does not verify that a filesystem has a realtime device, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via vectors related to setting an RHINHERIT flag on a directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14340/">CVE-2017-14340</cve>
	<bugzilla href="https://bugzilla.suse.com/1058524">SUSE bug 1058524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14341" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14341" ref_url="https://www.suse.com/security/cve/CVE-2017-14341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-6 has a large loop vulnerability in ReadWPGImage in coders/wpg.c, causing CPU exhaustion via a crafted wpg image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14341/">CVE-2017-14341</cve>
	<bugzilla href="https://bugzilla.suse.com/1058637">SUSE bug 1058637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14342" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14342" ref_url="https://www.suse.com/security/cve/CVE-2017-14342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-6 has a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c via a crafted wpg image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14342/">CVE-2017-14342</cve>
	<bugzilla href="https://bugzilla.suse.com/1058485">SUSE bug 1058485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14343" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14343" ref_url="https://www.suse.com/security/cve/CVE-2017-14343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-6 has a memory leak vulnerability in ReadXCFImage in coders/xcf.c via a crafted xcf image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14343/">CVE-2017-14343</cve>
	<bugzilla href="https://bugzilla.suse.com/1058422">SUSE bug 1058422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082363">SUSE bug 1082363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14400" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14400" ref_url="https://www.suse.com/security/cve/CVE-2017-14400" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, the PersistPixelCache function in magick/cache.c mishandles the pixel cache nexus, which allows remote attackers to cause a denial of service (NULL pointer dereference in the function GetVirtualPixels in MagickCore/cache.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14400/">CVE-2017-14400</cve>
	<bugzilla href="https://bugzilla.suse.com/1058435">SUSE bug 1058435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14461" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14461" ref_url="https://www.suse.com/security/cve/CVE-2017-14461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003969.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1134-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00005.html" source="SUSE-SU"/>
    <description>
    A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14461/">CVE-2017-14461</cve>
	<bugzilla href="https://bugzilla.suse.com/1082826">SUSE bug 1082826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334183" comment="dovecot22 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14482" ref_url="https://www.suse.com/security/cve/CVE-2017-14482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00077.html" source="SUSE-SU"/>
    <description>
    GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14482/">CVE-2017-14482</cve>
	<bugzilla href="https://bugzilla.suse.com/1058425">SUSE bug 1058425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549643" comment="emacs-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532420" comment="emacs-el-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518121" comment="emacs-info-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549644" comment="emacs-nox-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549645" comment="emacs-x11-24.3-25.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549646" comment="etags-24.3-25.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00019.html" source="SUSE-SU"/>
    <description>
    The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel through 4.13.2 allows local users to cause a denial of service (panic) by leveraging incorrect length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<bugzilla href="https://bugzilla.suse.com/1060354">SUSE bug 1060354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143944">SUSE bug 1143944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549669" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594274" comment="dnsmasq-utils-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<bugzilla href="https://bugzilla.suse.com/1060355">SUSE bug 1060355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549669" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594274" comment="dnsmasq-utils-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063832">SUSE bug 1063832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549669" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594274" comment="dnsmasq-utils-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549669" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594274" comment="dnsmasq-utils-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549669" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594274" comment="dnsmasq-utils-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2617-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2619-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<bugzilla href="https://bugzilla.suse.com/1060360">SUSE bug 1060360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060361">SUSE bug 1060361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060362">SUSE bug 1060362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060364">SUSE bug 1060364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549669" comment="dnsmasq-2.78-18.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594274" comment="dnsmasq-utils-2.78-18.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14497" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14497" ref_url="https://www.suse.com/security/cve/CVE-2017-14497" source="SUSE CVE"/>
    <description>
    The tpacket_rcv function in net/packet/af_packet.c in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14497/">CVE-2017-14497</cve>
	<bugzilla href="https://bugzilla.suse.com/1059058">SUSE bug 1059058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw exists in parse_file_info in archive_read_support_format_iso9660.c in libarchive 3.3.2 when extracting a specially crafted iso9660 iso file, related to archive_read_format_iso9660_read_header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501</cve>
	<bugzilla href="https://bugzilla.suse.com/1059139">SUSE bug 1059139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3640-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00017.html" source="SUSE-SU"/>
    <description>
    read_header in archive_read_support_format_rar.c in libarchive 3.3.2 suffers from an off-by-one error for UTF-16 names in RAR archives, leading to an out-of-bounds read in archive_read_format_rar_read_header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502</cve>
	<bugzilla href="https://bugzilla.suse.com/1059134">SUSE bug 1059134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14505" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14505" ref_url="https://www.suse.com/security/cve/CVE-2017-14505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    DrawGetStrokeDashArray in wand/drawing-wand.c in ImageMagick 7.0.7-1 mishandles certain NULL arrays, which allows attackers to perform Denial of Service (NULL pointer dereference and application crash in AcquireQuantumMemory within MagickCore/memory.c) by providing a crafted Image File as input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14505/">CVE-2017-14505</cve>
	<bugzilla href="https://bugzilla.suse.com/1059735">SUSE bug 1059735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14517" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a NULL Pointer Dereference exists in the XRef::parseEntry() function in XRef.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517</cve>
	<bugzilla href="https://bugzilla.suse.com/1059066">SUSE bug 1059066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541472" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14518" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a floating point exception exists in the isImageInterpolationRequired() function in Splash.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518</cve>
	<bugzilla href="https://bugzilla.suse.com/1059101">SUSE bug 1059101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541472" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14520" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14520" ref_url="https://www.suse.com/security/cve/CVE-2017-14520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a floating point exception occurs in Splash::scaleImageYuXd() in Splash.cc, which may lead to a potential attack when handling malicious PDF files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14520/">CVE-2017-14520</cve>
	<bugzilla href="https://bugzilla.suse.com/1059155">SUSE bug 1059155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541472" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14528" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14528" ref_url="https://www.suse.com/security/cve/CVE-2017-14528" source="SUSE CVE"/>
    <description>
    The TIFFSetProfiles function in coders/tiff.c in ImageMagick 7.0.6 has incorrect expectations about whether LibTIFF TIFFGetField return values imply that data validation has occurred, which allows remote attackers to cause a denial of service (use-after-free after an invalid call to TIFFSetField, and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14528/">CVE-2017-14528</cve>
	<bugzilla href="https://bugzilla.suse.com/1059670">SUSE bug 1059670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14529" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The pe_print_idata function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles HintName vector entries, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted PE file, related to the bfd_getl16 function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529</cve>
	<bugzilla href="https://bugzilla.suse.com/1059050">SUSE bug 1059050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14531" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14531" ref_url="https://www.suse.com/security/cve/CVE-2017-14531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-0 has a memory exhaustion issue in ReadSUNImage in coders/sun.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14531/">CVE-2017-14531</cve>
	<bugzilla href="https://bugzilla.suse.com/1057508">SUSE bug 1057508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059666">SUSE bug 1059666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14532" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14532" ref_url="https://www.suse.com/security/cve/CVE-2017-14532" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00049.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-0 has a NULL Pointer Dereference in TIFFIgnoreTags in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14532/">CVE-2017-14532</cve>
	<bugzilla href="https://bugzilla.suse.com/1059663">SUSE bug 1059663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14533" ref_url="https://www.suse.com/security/cve/CVE-2017-14533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.6-6 has a memory leak in ReadMATImage in coders/mat.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14533/">CVE-2017-14533</cve>
	<bugzilla href="https://bugzilla.suse.com/1059751">SUSE bug 1059751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14607" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14607" ref_url="https://www.suse.com/security/cve/CVE-2017-14607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-4 Q16, an out of bounds read flaw related to ReadTIFFImage has been reported in coders/tiff.c. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14607/">CVE-2017-14607</cve>
	<bugzilla href="https://bugzilla.suse.com/1059778">SUSE bug 1059778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14624" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14624" ref_url="https://www.suse.com/security/cve/CVE-2017-14624" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function PostscriptDelegateMessage in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14624/">CVE-2017-14624</cve>
	<bugzilla href="https://bugzilla.suse.com/1059772">SUSE bug 1059772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14625" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14625" ref_url="https://www.suse.com/security/cve/CVE-2017-14625" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_output_create in coders/sixel.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14625/">CVE-2017-14625</cve>
	<bugzilla href="https://bugzilla.suse.com/1059770">SUSE bug 1059770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14626" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14626" ref_url="https://www.suse.com/security/cve/CVE-2017-14626" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL Pointer Dereference vulnerability in the function sixel_decode in coders/sixel.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14626/">CVE-2017-14626</cve>
	<bugzilla href="https://bugzilla.suse.com/1059767">SUSE bug 1059767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14632" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003568.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00015.html" source="SUSE-SU"/>
    <description>
    Xiph.Org libvorbis 1.3.5 allows Remote Code Execution upon freeing uninitialized memory in the function vorbis_analysis_headerout() in info.c when vi-&gt;channels&lt;=0, a similar issue to Mozilla bug 550184.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009533069" comment="libvorbis-doc-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550445" comment="libvorbis0-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550446" comment="libvorbis0-32bit-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550447" comment="libvorbisenc2-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550448" comment="libvorbisenc2-32bit-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550449" comment="libvorbisfile3-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550450" comment="libvorbisfile3-32bit-1.3.3-10.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14633" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003568.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0047-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00015.html" source="SUSE-SU"/>
    <description>
    In Xiph.Org libvorbis 1.3.5, an out-of-bounds array read vulnerability exists in the function mapping0_forward() in mapping0.c, which may lead to DoS when operating on a crafted audio file with vorbis_analysis().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081833">SUSE bug 1081833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009533069" comment="libvorbis-doc-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550445" comment="libvorbis0-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550446" comment="libvorbis0-32bit-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550447" comment="libvorbisenc2-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550448" comment="libvorbisenc2-32bit-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550449" comment="libvorbisfile3-1.3.3-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550450" comment="libvorbisfile3-32bit-1.3.3-10.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14634" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<bugzilla href="https://bugzilla.suse.com/1059911">SUSE bug 1059911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550592" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550593" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14649" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14649" ref_url="https://www.suse.com/security/cve/CVE-2017-14649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ReadOneJNGImage in coders/png.c in GraphicsMagick version 1.3.26 does not properly validate JNG data, leading to a denial of service (assertion failure in magick/pixel_cache.c, and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14649/">CVE-2017-14649</cve>
	<bugzilla href="https://bugzilla.suse.com/1060162">SUSE bug 1060162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14682" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14682" ref_url="https://www.suse.com/security/cve/CVE-2017-14682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    GetNextToken in MagickCore/token.c in ImageMagick 7.0.6 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted SVG document, a different vulnerability than CVE-2017-10928.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14682/">CVE-2017-14682</cve>
	<bugzilla href="https://bugzilla.suse.com/1047356">SUSE bug 1047356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060176">SUSE bug 1060176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14684" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14684" ref_url="https://www.suse.com/security/cve/CVE-2017-14684" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-4 Q16, a memory leak vulnerability was found in the function ReadVIPSImage in coders/vips.c, which allows attackers to cause a denial of service (memory consumption in ResizeMagickMemory in MagickCore/memory.c) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14684/">CVE-2017-14684</cve>
	<bugzilla href="https://bugzilla.suse.com/1060177">SUSE bug 1060177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14729" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, do not ensure a unique PLT entry for a symbol, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729</cve>
	<bugzilla href="https://bugzilla.suse.com/1060621">SUSE bug 1060621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14733" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14733" ref_url="https://www.suse.com/security/cve/CVE-2017-14733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ReadRLEImage in coders/rle.c in GraphicsMagick 1.3.26 mishandles RLE headers that specify too few colors, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14733/">CVE-2017-14733</cve>
	<bugzilla href="https://bugzilla.suse.com/1060577">SUSE bug 1060577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14739" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14739" ref_url="https://www.suse.com/security/cve/CVE-2017-14739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The AcquireResampleFilterThreadSet function in magick/resample-private.h in ImageMagick 7.0.7-4 mishandles failed memory allocation, which allows remote attackers to cause a denial of service (NULL Pointer Dereference in DistortImage in MagickCore/distort.c, and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14739/">CVE-2017-14739</cve>
	<bugzilla href="https://bugzilla.suse.com/1060382">SUSE bug 1060382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14745" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, interpret a -1 value as a sorting count instead of an error flag, which allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745</cve>
	<bugzilla href="https://bugzilla.suse.com/1060599">SUSE bug 1060599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<bugzilla href="https://bugzilla.suse.com/1060427">SUSE bug 1060427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069666">SUSE bug 1069666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549841" comment="libdcerpc-atsvc0-4.2.4-28.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549845" comment="libdcerpc-binding0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549846" comment="libdcerpc-binding0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549847" comment="libdcerpc0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549848" comment="libdcerpc0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549849" comment="libndr-krb5pac0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549850" comment="libndr-krb5pac0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549851" comment="libndr-nbt0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549852" comment="libndr-nbt0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549853" comment="libndr-standard0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549854" comment="libndr-standard0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549855" comment="libndr0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549856" comment="libndr0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549857" comment="libnetapi0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549858" comment="libnetapi0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549859" comment="libsamba-credentials0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549860" comment="libsamba-credentials0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549861" comment="libsamba-errors0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549862" comment="libsamba-errors0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549863" comment="libsamba-hostconfig0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549864" comment="libsamba-hostconfig0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549865" comment="libsamba-passdb0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549866" comment="libsamba-passdb0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549867" comment="libsamba-util0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549868" comment="libsamba-util0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549869" comment="libsamdb0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549870" comment="libsamdb0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549871" comment="libsmbclient0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549872" comment="libsmbclient0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549873" comment="libsmbconf0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549874" comment="libsmbconf0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549875" comment="libsmbldap0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549876" comment="libsmbldap0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549877" comment="libtevent-util0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549878" comment="libtevent-util0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549879" comment="libwbclient0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549880" comment="libwbclient0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549881" comment="samba-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549882" comment="samba-client-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549883" comment="samba-client-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518364" comment="samba-doc-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549884" comment="samba-libs-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549885" comment="samba-libs-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549886" comment="samba-winbind-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549887" comment="samba-winbind-32bit-4.4.2-38.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14798" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003420.html" source="SUSE-SU"/>
    <description>
    A race condition in the postgresql init script could be used by attackers able to access the postgresql account to escalate their privileges to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798</cve>
	<bugzilla href="https://bugzilla.suse.com/1062722">SUSE bug 1062722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334042" comment="postgresql-init is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14857" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14857" ref_url="https://www.suse.com/security/cve/CVE-2017-14857" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, there is an invalid free in the Image class in image.cpp that leads to a Segmentation fault. A crafted input will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14857/">CVE-2017-14857</cve>
	<bugzilla href="https://bugzilla.suse.com/1061013">SUSE bug 1061013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14858" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14858" ref_url="https://www.suse.com/security/cve/CVE-2017-14858" source="SUSE CVE"/>
    <description>
    There is a heap-based buffer overflow in the Exiv2::l2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14858/">CVE-2017-14858</cve>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334027" comment="exiv2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14859" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    An Invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859</cve>
	<bugzilla href="https://bugzilla.suse.com/1061000">SUSE bug 1061000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14860" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14860" ref_url="https://www.suse.com/security/cve/CVE-2017-14860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1961-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00019.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the Exiv2::Jp2Image::readMetadata function of jp2image.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14860/">CVE-2017-14860</cve>
	<bugzilla href="https://bugzilla.suse.com/1061023">SUSE bug 1061023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061025">SUSE bug 1061025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1068871">SUSE bug 1068871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14861" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14861" ref_url="https://www.suse.com/security/cve/CVE-2017-14861" source="SUSE CVE"/>
    <description>
    There is a stack consumption vulnerability in the Exiv2::Internal::stringFormat function of image.cpp in Exiv2 0.26. A Crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14861/">CVE-2017-14861</cve>
	<bugzilla href="https://bugzilla.suse.com/1060997">SUSE bug 1060997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14863" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14863" ref_url="https://www.suse.com/security/cve/CVE-2017-14863" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference was discovered in Exiv2::Image::printIFDStructure in image.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14863/">CVE-2017-14863</cve>
	<bugzilla href="https://bugzilla.suse.com/1061031">SUSE bug 1061031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14865" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14865" ref_url="https://www.suse.com/security/cve/CVE-2017-14865" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00070.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer overflow in the Exiv2::us2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14865/">CVE-2017-14865</cve>
	<bugzilla href="https://bugzilla.suse.com/1061003">SUSE bug 1061003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14866" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14866" ref_url="https://www.suse.com/security/cve/CVE-2017-14866" source="SUSE CVE"/>
    <description>
    There is a heap-based buffer overflow in the Exiv2::s2Data function of types.cpp in Exiv2 0.26. A Crafted input will lead to a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14866/">CVE-2017-14866</cve>
	<bugzilla href="https://bugzilla.suse.com/1060994">SUSE bug 1060994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334027" comment="exiv2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14867" ref_url="https://www.suse.com/security/cve/CVE-2017-14867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2717-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2747-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2614-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00025.html" source="SUSE-SU"/>
    <description>
    Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14867/">CVE-2017-14867</cve>
	<bugzilla href="https://bugzilla.suse.com/1060377">SUSE bug 1060377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060378">SUSE bug 1060378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061041">SUSE bug 1061041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541021" comment="git-core-2.12.3-27.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532508" comment="git-doc-2.12.3-27.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14919</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14919" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14919" ref_url="https://www.suse.com/security/cve/CVE-2017-14919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00113.html" source="SUSE-SU"/>
    <description>
    Node.js before 4.8.5, 6.x before 6.11.5, and 8.x before 8.8.0 allows remote attackers to cause a denial of service (uncaught exception and crash) by leveraging a change in the zlib module 1.2.9 making 8 an invalid value for the windowBits parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14919/">CVE-2017-14919</cve>
	<bugzilla href="https://bugzilla.suse.com/1059050">SUSE bug 1059050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594575" comment="nodejs6-6.12.2-11.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14926" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14926" ref_url="https://www.suse.com/security/cve/CVE-2017-14926" source="SUSE CVE"/>
    <description>
    In Poppler 0.59.0, a NULL Pointer Dereference exists in AnnotRichMedia::Content::Content in Annot.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14926/">CVE-2017-14926</cve>
	<bugzilla href="https://bugzilla.suse.com/1061095">SUSE bug 1061095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14927" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14927" ref_url="https://www.suse.com/security/cve/CVE-2017-14927" source="SUSE CVE"/>
    <description>
    In Poppler 0.59.0, a NULL Pointer Dereference exists in the SplashOutputDev::type3D0() function in SplashOutputDev.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14927/">CVE-2017-14927</cve>
	<bugzilla href="https://bugzilla.suse.com/1061094">SUSE bug 1061094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14928" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14928" ref_url="https://www.suse.com/security/cve/CVE-2017-14928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.59.0, a NULL Pointer Dereference exists in AnnotRichMedia::Configuration::Configuration in Annot.cc via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14928/">CVE-2017-14928</cve>
	<bugzilla href="https://bugzilla.suse.com/1061092">SUSE bug 1061092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14929" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14929" ref_url="https://www.suse.com/security/cve/CVE-2017-14929" source="SUSE CVE"/>
    <description>
    In Poppler 0.59.0, memory corruption occurs in a call to Object::dictLookup() in Object.h after a repeating series of Gfx::display, Gfx::go, Gfx::execOp, Gfx::opFill, Gfx::doPatternFill, Gfx::doTilingPatternFill and Gfx::drawForm calls (aka a Gfx.cc infinite loop), a different vulnerability than CVE-2017-14519.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14929/">CVE-2017-14929</cve>
	<bugzilla href="https://bugzilla.suse.com/1059050">SUSE bug 1059050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061091">SUSE bug 1061091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14952" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14952" ref_url="https://www.suse.com/security/cve/CVE-2017-14952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    Double free in i18n/zonemeta.cpp in International Components for Unicode (ICU) for C/C++ through 59.1 allows remote attackers to execute arbitrary code via a crafted string, aka a "redundant UVector entry clean up function call" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14952/">CVE-2017-14952</cve>
	<bugzilla href="https://bugzilla.suse.com/1067203">SUSE bug 1067203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546245" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546246" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546248" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594765" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594766" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594767" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14954" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14954" ref_url="https://www.suse.com/security/cve/CVE-2017-14954" source="SUSE CVE"/>
    <description>
    The waitid implementation in kernel/exit.c in the Linux kernel through 4.13.4 accesses rusage data structures in unintended cases, which allows local users to obtain sensitive information, and bypass the KASLR protection mechanism, via a crafted system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14954/">CVE-2017-14954</cve>
	<bugzilla href="https://bugzilla.suse.com/1061284">SUSE bug 1061284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14970" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14970" ref_url="https://www.suse.com/security/cve/CVE-2017-14970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3238-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In lib/ofp-util.c in Open vSwitch (OvS) before 2.8.1, there are multiple memory leaks while parsing malformed OpenFlow group mod messages. NOTE: the vendor disputes the relevance of this report, stating "it can only be triggered by an OpenFlow controller, but OpenFlow controllers have much more direct and powerful ways to force Open vSwitch to allocate memory, such as by inserting flows into the flow table."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14970/">CVE-2017-14970</cve>
	<bugzilla href="https://bugzilla.suse.com/1061310">SUSE bug 1061310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550583" comment="openvswitch-2.5.1-25.12.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550584" comment="openvswitch-dpdk-2.5.1-25.12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550585" comment="openvswitch-dpdk-switch-2.5.1-25.12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550586" comment="openvswitch-switch-2.5.1-25.12.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14974" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The *_get_synthetic_symtab functions in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandle the failure of a certain canonicalization step, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to elf32-i386.c and elf64-x86-64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974</cve>
	<bugzilla href="https://bugzilla.suse.com/1061241">SUSE bug 1061241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14975" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14975" ref_url="https://www.suse.com/security/cve/CVE-2017-14975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a NULL pointer dereference vulnerability because a data structure is not initialized, which allows an attacker to launch a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14975/">CVE-2017-14975</cve>
	<bugzilla href="https://bugzilla.suse.com/1061263">SUSE bug 1061263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14976" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14976" ref_url="https://www.suse.com/security/cve/CVE-2017-14976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14976/">CVE-2017-14976</cve>
	<bugzilla href="https://bugzilla.suse.com/1061264">SUSE bug 1061264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14977" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14977" ref_url="https://www.suse.com/security/cve/CVE-2017-14977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004189.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The FoFiTrueType::getCFFBlock function in FoFiTrueType.cc in Poppler 0.59.0 has a NULL pointer dereference vulnerability due to lack of validation of a table pointer, which allows an attacker to launch a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14977/">CVE-2017-14977</cve>
	<bugzilla href="https://bugzilla.suse.com/1061265">SUSE bug 1061265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541472" comment="libpoppler44-0.24.4-14.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14988" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14988" ref_url="https://www.suse.com/security/cve/CVE-2017-14988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005771.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1954-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00063.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file that is accessed with the ImfOpenInputFile function in IlmImf/ImfCRgbaFile.cpp. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14988/">CVE-2017-14988</cve>
	<bugzilla href="https://bugzilla.suse.com/1061305">SUSE bug 1061305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334510" comment="openexr is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14989" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14989" ref_url="https://www.suse.com/security/cve/CVE-2017-14989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    A use-after-free in RenderFreetype in MagickCore/annotate.c in ImageMagick 7.0.7-4 Q16 allows attackers to crash the application via a crafted font file, because the FT_Done_Glyph function (from FreeType 2) is called at an incorrect place in the ImageMagick code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14989/">CVE-2017-14989</cve>
	<bugzilla href="https://bugzilla.suse.com/1061254">SUSE bug 1061254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14994" ref_url="https://www.suse.com/security/cve/CVE-2017-14994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00028.html" source="SUSE-SU"/>
    <description>
    ReadDCMImage in coders/dcm.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted DICOM image, related to the ability of DCM_ReadNonNativeImages to yield an image list with zero frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14994/">CVE-2017-14994</cve>
	<bugzilla href="https://bugzilla.suse.com/1061587">SUSE bug 1061587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15015" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15015" ref_url="https://www.suse.com/security/cve/CVE-2017-15015" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in PDFDelegateMessage in coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-15015/">CVE-2017-15015</cve>
	<bugzilla href="https://bugzilla.suse.com/1082289">SUSE bug 1082289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15016" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15016" ref_url="https://www.suse.com/security/cve/CVE-2017-15016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadEnhMetaFile in coders/emf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15016/">CVE-2017-15016</cve>
	<bugzilla href="https://bugzilla.suse.com/1082291">SUSE bug 1082291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15017" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15017" ref_url="https://www.suse.com/security/cve/CVE-2017-15017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-0 Q16 has a NULL pointer dereference vulnerability in ReadOneMNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15017/">CVE-2017-15017</cve>
	<bugzilla href="https://bugzilla.suse.com/1082283">SUSE bug 1082283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15023" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15023" ref_url="https://www.suse.com/security/cve/CVE-2017-15023" source="SUSE CVE"/>
    <description>
    read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, does not properly validate the format count, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15023/">CVE-2017-15023</cve>
	<bugzilla href="https://bugzilla.suse.com/1061623">SUSE bug 1061623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15032" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15032" ref_url="https://www.suse.com/security/cve/CVE-2017-15032" source="SUSE CVE"/>
    <description>
    ImageMagick version 7.0.7-2 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15032/">CVE-2017-15032</cve>
	<bugzilla href="https://bugzilla.suse.com/1061868">SUSE bug 1061868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15033" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15033" ref_url="https://www.suse.com/security/cve/CVE-2017-15033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2735-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2999-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick version 7.0.7-2 contains a memory leak in ReadYUVImage in coders/yuv.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15033/">CVE-2017-15033</cve>
	<bugzilla href="https://bugzilla.suse.com/1061873">SUSE bug 1061873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549817" comment="libMagickCore-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549818" comment="libMagickWand-6_Q16-1-6.8.8.1-71.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15088" ref_url="https://www.suse.com/security/cve/CVE-2017-15088" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2948-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00020.html" source="SUSE-SU"/>
    <description>
    plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15088/">CVE-2017-15088</cve>
	<bugzilla href="https://bugzilla.suse.com/1065274">SUSE bug 1065274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549809" comment="krb5-1.12.5-40.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549810" comment="krb5-32bit-1.12.5-40.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549811" comment="krb5-client-1.12.5-40.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549812" comment="krb5-doc-1.12.5-40.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549813" comment="krb5-plugin-kdb-ldap-1.12.5-40.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549814" comment="krb5-plugin-preauth-otp-1.12.5-40.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549815" comment="krb5-plugin-preauth-pkinit-1.12.5-40.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549816" comment="krb5-server-1.12.5-40.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15095</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15095" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15095" ref_url="https://www.suse.com/security/cve/CVE-2017-15095" source="SUSE CVE"/>
		<reference ref_id="TID7023098" ref_url="https://www.suse.com/support/kb/doc/?id=7023098" source="SUSE-SU"/>
		<reference ref_id="TID7023117" ref_url="https://www.suse.com/support/kb/doc/?id=7023117" source="SUSE-SU"/>
    <description>
    A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15095/">CVE-2017-15095</cve>
	<bugzilla href="https://bugzilla.suse.com/1192165">SUSE bug 1192165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193944">SUSE bug 1193944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3425-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<bugzilla href="https://bugzilla.suse.com/1067844">SUSE bug 1067844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549940" comment="libecpg6-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549941" comment="libpq5-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549942" comment="libpq5-32bit-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550953" comment="postgresql94-9.4.15-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550954" comment="postgresql94-contrib-9.4.15-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533368" comment="postgresql94-docs-9.4.15-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550955" comment="postgresql94-server-9.4.15-21.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549943" comment="postgresql96-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549944" comment="postgresql96-contrib-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532676" comment="postgresql96-docs-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549945" comment="postgresql96-server-9.6.6-3.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3425-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099</cve>
	<bugzilla href="https://bugzilla.suse.com/1067841">SUSE bug 1067841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549940" comment="libecpg6-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549941" comment="libpq5-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549942" comment="libpq5-32bit-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549943" comment="postgresql96-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549944" comment="postgresql96-contrib-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532676" comment="postgresql96-docs-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549945" comment="postgresql96-server-9.6.6-3.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15101" ref_url="https://www.suse.com/security/cve/CVE-2017-15101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003411.html" source="SUSE-SU"/>
    <description>
    A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of liblouis before 2.5.4. An attacker could cause a denial of service condition or potentially even arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15101/">CVE-2017-15101</cve>
	<bugzilla href="https://bugzilla.suse.com/1067336">SUSE bug 1067336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334092" comment="liblouis is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15107</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006208.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00027.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<bugzilla href="https://bugzilla.suse.com/1076958">SUSE bug 1076958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594990" comment="dnsmasq-utils-2.78-18.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003708.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00028.html" source="SUSE-SU"/>
    <description>
    spice-vdagent up to and including 0.17.0 does not properly escape save directory before passing to shell, allowing local attacker with access to the session the agent runs in to inject arbitrary commands to be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108</cve>
	<bugzilla href="https://bugzilla.suse.com/1070724">SUSE bug 1070724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550606" comment="spice-vdagent-0.16.0-8.5.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15118" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118" source="SUSE CVE"/>
    <description>
    A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118</cve>
	<bugzilla href="https://bugzilla.suse.com/1070147">SUSE bug 1070147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<bugzilla href="https://bugzilla.suse.com/1070144">SUSE bug 1070144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15121" ref_url="https://www.suse.com/security/cve/CVE-2017-15121" source="SUSE CVE"/>
    <description>
    A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15121/">CVE-2017-15121</cve>
	<bugzilla href="https://bugzilla.suse.com/1071726">SUSE bug 1071726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15124" ref_url="https://www.suse.com/security/cve/CVE-2017-15124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    VNC server implementation in Quick Emulator (QEMU) 2.11.0 and older was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15124/">CVE-2017-15124</cve>
	<bugzilla href="https://bugzilla.suse.com/1073489">SUSE bug 1073489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15126" ref_url="https://www.suse.com/security/cve/CVE-2017-15126" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in fs/userfaultfd.c in the Linux kernel before 4.13.6. The issue is related to the handling of fork failure when dealing with event messages. Failure to fork correctly can lead to a situation where a fork event will be removed from an already freed list of events with userfaultfd_ctx_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-15126/">CVE-2017-15126</cve>
	<bugzilla href="https://bugzilla.suse.com/1073108">SUSE bug 1073108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15127" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15127" ref_url="https://www.suse.com/security/cve/CVE-2017-15127" source="SUSE CVE"/>
    <description>
    A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13. A superfluous implicit page unlock for VM_SHARED hugetlbfs mapping could trigger a local denial of service (BUG).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15127/">CVE-2017-15127</cve>
	<bugzilla href="https://bugzilla.suse.com/1073113">SUSE bug 1073113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15128" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15128" ref_url="https://www.suse.com/security/cve/CVE-2017-15128" source="SUSE CVE"/>
    <description>
    A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15128/">CVE-2017-15128</cve>
	<bugzilla href="https://bugzilla.suse.com/1073112">SUSE bug 1073112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15129" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129</cve>
	<bugzilla href="https://bugzilla.suse.com/1074839">SUSE bug 1074839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15130" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2632-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00012.html" source="SUSE-SU"/>
    <description>
    A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130</cve>
	<bugzilla href="https://bugzilla.suse.com/1082828">SUSE bug 1082828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334183" comment="dovecot22 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530236" comment="dovecot22-2.2.31-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530237" comment="dovecot22-backend-mysql-2.2.31-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530238" comment="dovecot22-backend-pgsql-2.2.31-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530239" comment="dovecot22-backend-sqlite-2.2.31-19.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545750" comment="dovecot22-2.2.31-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545751" comment="dovecot22-backend-mysql-2.2.31-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545752" comment="dovecot22-backend-pgsql-2.2.31-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545753" comment="dovecot22-backend-sqlite-2.2.31-19.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594553" comment="dovecot22-2.2.31-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594554" comment="dovecot22-backend-mysql-2.2.31-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594555" comment="dovecot22-backend-pgsql-2.2.31-19.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594556" comment="dovecot22-backend-sqlite-2.2.31-19.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15131" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15131" ref_url="https://www.suse.com/security/cve/CVE-2017-15131" source="SUSE CVE"/>
    <description>
    It was found that system umask policy is not being honored when creating XDG user directories, since Xsession sources xdg-user-dirs.sh before setting umask policy. This only affects xdg-user-dirs before 0.15.5 as shipped with Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-15131/">CVE-2017-15131</cve>
	<bugzilla href="https://bugzilla.suse.com/1075378">SUSE bug 1075378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334354" comment="gnome-session is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338983" comment="xdg-user-dirs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15132" ref_url="https://www.suse.com/security/cve/CVE-2017-15132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0492-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00076.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. An abort of SASL authentication results in a memory leak in dovecot's auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15132/">CVE-2017-15132</cve>
	<bugzilla href="https://bugzilla.suse.com/1075608">SUSE bug 1075608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550717" comment="dovecot22-2.2.31-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550718" comment="dovecot22-backend-mysql-2.2.31-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550719" comment="dovecot22-backend-pgsql-2.2.31-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550720" comment="dovecot22-backend-sqlite-2.2.31-19.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15139</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15139" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15139" ref_url="https://www.suse.com/security/cve/CVE-2017-15139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005229.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in openstack-cinder releases up to and including Queens, allowing newly created volumes in certain storage volume configurations to contain previous data. It specifically affects ScaleIO volumes using thin volumes and zero padding. This could lead to leakage of sensitive information between tenants.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15139/">CVE-2017-15139</cve>
	<bugzilla href="https://bugzilla.suse.com/1105476">SUSE bug 1105476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595457" comment="openstack-cinder-9.1.5~dev6-4.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595458" comment="openstack-cinder-api-9.1.5~dev6-4.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595459" comment="openstack-cinder-backup-9.1.5~dev6-4.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595460" comment="openstack-cinder-doc-9.1.5~dev6-4.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595461" comment="openstack-cinder-scheduler-9.1.5~dev6-4.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595462" comment="openstack-cinder-volume-9.1.5~dev6-4.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595463" comment="openstack-horizon-plugin-designate-ui-3.0.2~dev1-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595464" comment="openstack-neutron-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595465" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595466" comment="openstack-neutron-doc-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595467" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595468" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595469" comment="openstack-neutron-lbaas-9.2.2~dev11-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595470" comment="openstack-neutron-lbaas-agent-9.2.2~dev11-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595471" comment="openstack-neutron-lbaas-doc-9.2.2~dev11-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595472" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595473" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595474" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595475" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595476" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595477" comment="openstack-neutron-server-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595478" comment="python-cinder-9.1.5~dev6-4.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595479" comment="python-horizon-plugin-designate-ui-3.0.2~dev1-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595480" comment="python-neutron-9.4.2~dev21-7.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595481" comment="python-neutron-lbaas-9.2.2~dev11-4.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15191" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00045.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549766" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549767" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549768" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549769" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549770" comment="wireshark-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549771" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15192" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00045.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549766" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549767" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549768" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549769" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549770" comment="wireshark-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549771" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15193" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2730-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00045.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<bugzilla href="https://bugzilla.suse.com/1062645">SUSE bug 1062645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983671">SUSE bug 983671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549766" comment="libwireshark8-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549767" comment="libwiretap6-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549768" comment="libwscodecs1-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549769" comment="libwsutil7-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549770" comment="wireshark-2.2.10-48.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549771" comment="wireshark-gtk-2.2.10-48.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15217" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15217" ref_url="https://www.suse.com/security/cve/CVE-2017-15217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-2 has a memory leak in ReadSGIImage in coders/sgi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15217/">CVE-2017-15217</cve>
	<bugzilla href="https://bugzilla.suse.com/1062750">SUSE bug 1062750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15218" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15218" ref_url="https://www.suse.com/security/cve/CVE-2017-15218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-2 has a memory leak in ReadOneJNGImage in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15218/">CVE-2017-15218</cve>
	<bugzilla href="https://bugzilla.suse.com/1047910">SUSE bug 1047910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062752">SUSE bug 1062752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2899-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0393-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00023.html" source="SUSE-SU"/>
    <description>
    libjpeg-turbo 1.5.2 has a NULL Pointer Dereference in jdpostct.c and jquant1.c via a crafted JPEG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550599" comment="libjpeg-turbo-1.5.3-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550600" comment="libjpeg62-62.2.0-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550601" comment="libjpeg62-32bit-62.2.0-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550602" comment="libjpeg62-turbo-1.5.3-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550603" comment="libjpeg8-8.1.2-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550604" comment="libjpeg8-32bit-8.1.2-31.7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550605" comment="libturbojpeg0-8.1.2-31.7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15238" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15238" ref_url="https://www.suse.com/security/cve/CVE-2017-15238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
    <description>
    ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26 has a use-after-free issue when the height or width is zero, related to ReadJNGImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15238/">CVE-2017-15238</cve>
	<bugzilla href="https://bugzilla.suse.com/1067198">SUSE bug 1067198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00085.html" source="SUSE-SU"/>
    <description>
    Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<bugzilla href="https://bugzilla.suse.com/1062942">SUSE bug 1062942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15274" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2782-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2784-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2787-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2788-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2797-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
    <description>
    security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274</cve>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062471">SUSE bug 1062471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3143-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00095.html" source="SUSE-SU"/>
    <description>
    Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<bugzilla href="https://bugzilla.suse.com/1063008">SUSE bug 1063008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069666">SUSE bug 1069666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549841" comment="libdcerpc-atsvc0-4.2.4-28.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549845" comment="libdcerpc-binding0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549846" comment="libdcerpc-binding0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549847" comment="libdcerpc0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549848" comment="libdcerpc0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549849" comment="libndr-krb5pac0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549850" comment="libndr-krb5pac0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549851" comment="libndr-nbt0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549852" comment="libndr-nbt0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549853" comment="libndr-standard0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549854" comment="libndr-standard0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549855" comment="libndr0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549856" comment="libndr0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549857" comment="libnetapi0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549858" comment="libnetapi0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549859" comment="libsamba-credentials0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549860" comment="libsamba-credentials0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549861" comment="libsamba-errors0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549862" comment="libsamba-errors0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549863" comment="libsamba-hostconfig0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549864" comment="libsamba-hostconfig0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549865" comment="libsamba-passdb0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549866" comment="libsamba-passdb0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549867" comment="libsamba-util0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549868" comment="libsamba-util0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549869" comment="libsamdb0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549870" comment="libsamdb0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549871" comment="libsmbclient0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549872" comment="libsmbclient0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549873" comment="libsmbconf0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549874" comment="libsmbconf0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549875" comment="libsmbldap0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549876" comment="libsmbldap0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549877" comment="libtevent-util0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549878" comment="libtevent-util0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549879" comment="libwbclient0-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549880" comment="libwbclient0-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549881" comment="samba-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549882" comment="samba-client-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549883" comment="samba-client-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518364" comment="samba-doc-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549884" comment="samba-libs-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549885" comment="samba-libs-32bit-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549886" comment="samba-winbind-4.4.2-38.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549887" comment="samba-winbind-32bit-4.4.2-38.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15277" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15277" ref_url="https://www.suse.com/security/cve/CVE-2017-15277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    ReadGIFImage in coders/gif.c in ImageMagick 7.0.6-1 and GraphicsMagick 1.3.26 leaves the palette uninitialized when processing a GIF file that has neither a global nor local palette. If the affected product is used as a library loaded into a process that operates on interesting data, this data sometimes can be leaked via the uninitialized palette.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15277/">CVE-2017-15277</cve>
	<bugzilla href="https://bugzilla.suse.com/1063050">SUSE bug 1063050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15281" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15281" ref_url="https://www.suse.com/security/cve/CVE-2017-15281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003578.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00017.html" source="SUSE-SU"/>
    <description>
    ReadPSDImage in coders/psd.c in ImageMagick 7.0.7-6 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file, related to "Conditional jump or move depends on uninitialised value(s)."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15281/">CVE-2017-15281</cve>
	<bugzilla href="https://bugzilla.suse.com/1063049">SUSE bug 1063049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550439" comment="libMagickCore-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550440" comment="libMagickWand-6_Q16-1-6.8.8.1-71.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15286" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15286" ref_url="https://www.suse.com/security/cve/CVE-2017-15286" source="SUSE CVE"/>
    <description>
    SQLite 3.20.1 has a NULL pointer dereference in tableColumnList in shell.c because it fails to consider certain cases where `sqlite3_step(pStmt)==SQLITE_ROW` is false and a data structure is never initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15286/">CVE-2017-15286</cve>
	<bugzilla href="https://bugzilla.suse.com/1063145">SUSE bug 1063145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00004.html" source="SUSE-SU"/>
    <description>
    The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518378" comment="xen-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549901" comment="xen-doc-html-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518379" comment="xen-libs-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518380" comment="xen-libs-32bit-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549902" comment="xen-tools-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549903" comment="xen-tools-domU-4.7.4_02-43.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15306" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15306" ref_url="https://www.suse.com/security/cve/CVE-2017-15306" source="SUSE CVE"/>
    <description>
    The kvm_vm_ioctl_check_extension function in arch/powerpc/kvm/powerpc.c in the Linux kernel before 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) via a KVM_CHECK_EXTENSION KVM_CAP_PPC_HTM ioctl call to /dev/kvm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15306/">CVE-2017-15306</cve>
	<bugzilla href="https://bugzilla.suse.com/1066707">SUSE bug 1066707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15365" ref_url="https://www.suse.com/security/cve/CVE-2017-15365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
    <description>
    sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15365/">CVE-2017-15365</cve>
	<bugzilla href="https://bugzilla.suse.com/1072167">SUSE bug 1072167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15412" ref_url="https://www.suse.com/security/cve/CVE-2017-15412" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00036.html" source="SUSE-SU"/>
    <description>
    Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15412/">CVE-2017-15412</cve>
	<bugzilla href="https://bugzilla.suse.com/1071691">SUSE bug 1071691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077993">SUSE bug 1077993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550651" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550652" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533151" comment="libxml2-doc-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550653" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550654" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15422" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15422" ref_url="https://www.suse.com/security/cve/CVE-2017-15422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15422/">CVE-2017-15422</cve>
	<bugzilla href="https://bugzilla.suse.com/1071691">SUSE bug 1071691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077999">SUSE bug 1077999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546245" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546246" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546248" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594765" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594766" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594767" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15535</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15535" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15535" ref_url="https://www.suse.com/security/cve/CVE-2017-15535" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3018-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3022-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00050.html" source="SUSE-SU"/>
    <description>
    MongoDB 3.4.x before 3.4.10, and 3.5.x-development, has a disabled-by-default configuration setting, networkMessageCompressors (aka wire protocol compression), which exposes a vulnerability when enabled that could be exploited by a malicious attacker to deny service or modify memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15535/">CVE-2017-15535</cve>
	<bugzilla href="https://bugzilla.suse.com/1065956">SUSE bug 1065956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334386" comment="mongodb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15588" ref_url="https://www.suse.com/security/cve/CVE-2017-15588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15588/">CVE-2017-15588</cve>
	<bugzilla href="https://bugzilla.suse.com/1061082">SUSE bug 1061082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549772" comment="xen-doc-html-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549773" comment="xen-tools-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549774" comment="xen-tools-domU-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15589" ref_url="https://www.suse.com/security/cve/CVE-2017-15589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15589/">CVE-2017-15589</cve>
	<bugzilla href="https://bugzilla.suse.com/1061080">SUSE bug 1061080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549772" comment="xen-doc-html-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549773" comment="xen-tools-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549774" comment="xen-tools-domU-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15590" ref_url="https://www.suse.com/security/cve/CVE-2017-15590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15590/">CVE-2017-15590</cve>
	<bugzilla href="https://bugzilla.suse.com/1061076">SUSE bug 1061076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549772" comment="xen-doc-html-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549773" comment="xen-tools-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549774" comment="xen-tools-domU-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15591" ref_url="https://www.suse.com/security/cve/CVE-2017-15591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.5.x through 4.9.x allowing attackers (who control a stub domain kernel or tool stack) to cause a denial of service (host OS crash) because of a missing comparison (of range start to range end) within the DMOP map/unmap implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15591/">CVE-2017-15591</cve>
	<bugzilla href="https://bugzilla.suse.com/1061077">SUSE bug 1061077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549772" comment="xen-doc-html-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549773" comment="xen-tools-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549774" comment="xen-tools-domU-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15592" ref_url="https://www.suse.com/security/cve/CVE-2017-15592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15592/">CVE-2017-15592</cve>
	<bugzilla href="https://bugzilla.suse.com/1061086">SUSE bug 1061086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549772" comment="xen-doc-html-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549773" comment="xen-tools-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549774" comment="xen-tools-domU-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15593" ref_url="https://www.suse.com/security/cve/CVE-2017-15593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (memory leak) because reference counts are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15593/">CVE-2017-15593</cve>
	<bugzilla href="https://bugzilla.suse.com/1061084">SUSE bug 1061084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549772" comment="xen-doc-html-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549773" comment="xen-tools-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549774" comment="xen-tools-domU-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15594" ref_url="https://www.suse.com/security/cve/CVE-2017-15594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15594/">CVE-2017-15594</cve>
	<bugzilla href="https://bugzilla.suse.com/1061087">SUSE bug 1061087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549772" comment="xen-doc-html-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549773" comment="xen-tools-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549774" comment="xen-tools-domU-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15595" ref_url="https://www.suse.com/security/cve/CVE-2017-15595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15595/">CVE-2017-15595</cve>
	<bugzilla href="https://bugzilla.suse.com/1061081">SUSE bug 1061081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550721" comment="xen-doc-html-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550722" comment="xen-tools-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550723" comment="xen-tools-domU-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15596" ref_url="https://www.suse.com/security/cve/CVE-2017-15596" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15596/">CVE-2017-15596</cve>
	<bugzilla href="https://bugzilla.suse.com/1042882">SUSE bug 1042882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042893">SUSE bug 1042893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042915">SUSE bug 1042915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042931">SUSE bug 1042931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042938">SUSE bug 1042938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047275">SUSE bug 1047275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052686">SUSE bug 1052686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055321">SUSE bug 1055321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15597" ref_url="https://www.suse.com/security/cve/CVE-2017-15597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3194-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a grant of a dying domain, the assumption turns out wrong. A malicious guest administrator can cause hypervisor memory corruption, most likely resulting in host crash and a Denial of Service. Privilege escalation and information leaks cannot be ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15597/">CVE-2017-15597</cve>
	<bugzilla href="https://bugzilla.suse.com/1061075">SUSE bug 1061075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518378" comment="xen-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549901" comment="xen-doc-html-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518379" comment="xen-libs-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518380" comment="xen-libs-32bit-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549902" comment="xen-tools-4.7.4_02-43.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549903" comment="xen-tools-domU-4.7.4_02-43.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15638" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15638" ref_url="https://www.suse.com/security/cve/CVE-2017-15638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2940-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00014.html" source="SUSE-SU"/>
    <description>
    The SuSEfirewall2 package before 3.6.312-2.13.1 in SUSE Linux Enterprise (SLE) Desktop 12 SP2, Server 12 SP2, and Server for Raspberry Pi 12 SP2; before 3.6.312.333-3.10.1 in SLE Desktop 12 SP3 and Server 12 SP3; before 3.6_SVNr208-2.18.3.1 in SLE Server 11 SP4; before 3.6.312-5.9.1 in openSUSE Leap 42.2; and before 3.6.312.333-7.1 in openSUSE Leap 42.3 might allow remote attackers to bypass intended access restrictions on the portmap service by leveraging a missing source net restriction for _rpc_ services.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15638/">CVE-2017-15638</cve>
	<bugzilla href="https://bugzilla.suse.com/1064127">SUSE bug 1064127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518256" comment="SuSEfirewall2-3.6.312-2.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00085.html" source="SUSE-SU"/>
    <description>
    net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649</cve>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064392">SUSE bug 1064392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15652" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15652" ref_url="https://www.suse.com/security/cve/CVE-2017-15652" source="SUSE CVE"/>
    <description>
    Artifex Ghostscript 9.22 is affected by: Obtain Information. The impact is: obtain sensitive information. The component is: affected source code file, affected function, affected executable, affected libga (imagemagick used that). The attack vector is: Someone must open a postscript file though ghostscript. Because of imagemagick also use libga, so it was affected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15652/">CVE-2017-15652</cve>
	<bugzilla href="https://bugzilla.suse.com/1136756">SUSE bug 1136756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550834" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550835" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550836" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550837" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533280" comment="glibc-html-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533281" comment="glibc-info-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550838" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550839" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550840" comment="glibc-profile-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550841" comment="glibc-profile-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550842" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004949.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550834" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550835" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550836" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550837" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533280" comment="glibc-html-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533281" comment="glibc-info-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550838" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550839" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550840" comment="glibc-profile-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550841" comment="glibc-profile-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550842" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15698" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15698" ref_url="https://www.suse.com/security/cve/CVE-2017-15698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005314.html" source="SUSE-SU"/>
    <description>
    When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15698/">CVE-2017-15698</cve>
	<bugzilla href="https://bugzilla.suse.com/1078679">SUSE bug 1078679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334656" comment="libtcnative-1-0 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15706" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15706" ref_url="https://www.suse.com/security/cve/CVE-2017-15706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0852-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00114.html" source="SUSE-SU"/>
    <description>
    As part of the fix for bug 61201, the documentation for Apache Tomcat 9.0.0.M22 to 9.0.1, 8.5.16 to 8.5.23, 8.0.45 to 8.0.47 and 7.0.79 to 7.0.82 included an updated description of the search algorithm used by the CGI Servlet to identify which script to execute. The update was not correct. As a result, some scripts may have failed to execute as expected and other scripts may have been executed unexpectedly. Note that the behaviour of the CGI servlet has remained unchanged in this regard. It is only the documentation of the behaviour that was wrong and has been corrected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15706/">CVE-2017-15706</cve>
	<bugzilla href="https://bugzilla.suse.com/1078677">SUSE bug 1078677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009533263" comment="tomcat-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533264" comment="tomcat-admin-webapps-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533265" comment="tomcat-docs-webapp-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533266" comment="tomcat-el-3_0-api-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533267" comment="tomcat-javadoc-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533268" comment="tomcat-jsp-2_3-api-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533269" comment="tomcat-lib-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533270" comment="tomcat-servlet-3_1-api-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533271" comment="tomcat-webapps-8.0.50-29.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15710" ref_url="https://www.suse.com/security/cve/CVE-2017-15710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00023.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15710/">CVE-2017-15710</cve>
	<bugzilla href="https://bugzilla.suse.com/1086776">SUSE bug 1086776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550965" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550966" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550967" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550968" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550969" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15715" ref_url="https://www.suse.com/security/cve/CVE-2017-15715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00023.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.4.0 to 2.4.29, the expression specified in &lt;FilesMatch&gt; could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15715/">CVE-2017-15715</cve>
	<bugzilla href="https://bugzilla.suse.com/1086774">SUSE bug 1086774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550965" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550966" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550967" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550968" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550969" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550834" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550835" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550836" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550837" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533280" comment="glibc-html-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533281" comment="glibc-info-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550838" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550839" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550840" comment="glibc-profile-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550841" comment="glibc-profile-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550842" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0253-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0276-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00091.html" source="SUSE-SU"/>
    <description>
    The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868</cve>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071471">SUSE bug 1071471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15873" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873</cve>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338833" comment="busybox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15874" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    archival/libarchive/decompress_unlzma.c in BusyBox 1.27.2 has an Integer Underflow that leads to a read access violation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874</cve>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338984" comment="busybox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15896</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15896" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00113.html" source="SUSE-SU"/>
    <description>
    Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896</cve>
	<bugzilla href="https://bugzilla.suse.com/1071905">SUSE bug 1071905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594575" comment="nodejs6-6.12.2-11.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15897</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15897" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15897" ref_url="https://www.suse.com/security/cve/CVE-2017-15897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
    <description>
    Node.js had a bug in versions 8.X and 9.X which caused buffers to not be initialized when the encoding for the fill value did not match the encoding specified. For example, 'Buffer.alloc(0x100, "This is not correctly encoded", "hex");' The buffer implementation was updated such that the buffer will be initialized to all zeros in these cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15897/">CVE-2017-15897</cve>
	<bugzilla href="https://bugzilla.suse.com/1072320">SUSE bug 1072320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15906" ref_url="https://www.suse.com/security/cve/CVE-2017-15906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3243-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00032.html" source="SUSE-SU"/>
    <description>
    The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15906/">CVE-2017-15906</cve>
	<bugzilla href="https://bugzilla.suse.com/1064285">SUSE bug 1064285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065000">SUSE bug 1065000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074115">SUSE bug 1074115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079488">SUSE bug 1079488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090163">SUSE bug 1090163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099316">SUSE bug 1099316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549918" comment="openssh-7.2p2-74.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549919" comment="openssh-askpass-gnome-7.2p2-74.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549920" comment="openssh-fips-7.2p2-74.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549921" comment="openssh-helpers-7.2p2-74.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15908" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0320-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00118.html" source="SUSE-SU"/>
    <description>
    In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908</cve>
	<bugzilla href="https://bugzilla.suse.com/1065276">SUSE bug 1065276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550566" comment="libsystemd0-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550567" comment="libsystemd0-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550568" comment="libudev1-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550569" comment="libudev1-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550570" comment="systemd-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550571" comment="systemd-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518816" comment="systemd-bash-completion-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550572" comment="systemd-sysvinit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550573" comment="udev-228-150.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15930" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15930" ref_url="https://www.suse.com/security/cve/CVE-2017-15930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3020-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    In ReadOneJNGImage in coders/png.c in GraphicsMagick 1.3.26, a Null Pointer Dereference occurs while transferring JPEG scanlines, related to a PixelPacket pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15930/">CVE-2017-15930</cve>
	<bugzilla href="https://bugzilla.suse.com/1066003">SUSE bug 1066003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15938" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, miscalculates DW_FORM_ref_addr die refs in the case of a relocatable object file, which allows remote attackers to cause a denial of service (find_abstract_instance_name invalid memory read, segmentation fault, and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<bugzilla href="https://bugzilla.suse.com/1065693">SUSE bug 1065693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15939" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, mishandles NULL files in a .debug_line file table, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ELF file, related to concat_filename. NOTE: this issue is caused by an incomplete fix for CVE-2017-15023.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<bugzilla href="https://bugzilla.suse.com/1061623">SUSE bug 1061623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065689">SUSE bug 1065689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15951" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.13.10 does not correctly synchronize the actions of updating versus finding a key in the "negative" state to avoid a race condition, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951</cve>
	<bugzilla href="https://bugzilla.suse.com/1062840">SUSE bug 1062840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065615">SUSE bug 1065615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15994" ref_url="https://www.suse.com/security/cve/CVE-2017-15994" source="SUSE CVE"/>
    <description>
    rsync 3.1.3-development before 2017-10-24 mishandles archaic checksums, which makes it easier for remote attackers to bypass intended access restrictions. NOTE: the rsync development branch has significant use beyond the rsync developers, e.g., the code has been copied for use in various GitHub projects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15994/">CVE-2017-15994</cve>
	<bugzilla href="https://bugzilla.suse.com/1065646">SUSE bug 1065646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338986" comment="rsync is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    elfcomm.c in readelf in GNU Binutils 2.29 allows remote attackers to cause a denial of service (excessive memory allocation) or possibly have unspecified other impact via a crafted ELF file that triggers a "buffer overflow on fuzzed archive header," related to an uninitialized variable, an improper conditional jump, and the get_archive_member_name, process_archive_index_and_symbols, and setup_archive functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<bugzilla href="https://bugzilla.suse.com/1065643">SUSE bug 1065643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16012</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16012" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16012" ref_url="https://www.suse.com/security/cve/CVE-2017-16012" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2015-9251.  Reason: This candidate is a duplicate of CVE-2015-9251.  Notes: All CVE users should reference CVE-2015-9251 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16012/">CVE-2017-16012</cve>
	<bugzilla href="https://bugzilla.suse.com/1111660">SUSE bug 1111660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16227" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The aspath_put function in bgpd/bgp_aspath.c in Quagga before 1.2.2 allows remote attackers to cause a denial of service (session drop) via BGP UPDATE messages, because AS_PATH size calculation for long paths counts certain bytes twice and consequently constructs an invalid message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227</cve>
	<bugzilla href="https://bugzilla.suse.com/1065641">SUSE bug 1065641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550710" comment="libfpm_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550711" comment="libospf0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550712" comment="libospfapiclient0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550713" comment="libquagga_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550714" comment="libzebra1-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550715" comment="quagga-1.1.1-17.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16232" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0073-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00041.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232</cve>
	<bugzilla href="https://bugzilla.suse.com/1069213">SUSE bug 1069213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550933" comment="libtiff5-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550934" comment="libtiff5-32bit-4.0.9-44.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550935" comment="tiff-4.0.9-44.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16239</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16239" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16239" ref_url="https://www.suse.com/security/cve/CVE-2017-16239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003412.html" source="SUSE-SU"/>
    <description>
    In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x through 16.0.2, by rebuilding an instance, an authenticated user may be able to circumvent the Filter Scheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using Nova Filter Scheduler are affected. Because of the regression described in Launchpad Bug #1732947, the preferred fix is a 14.x version after 14.0.10, a 15.x version after 15.0.8, or a 16.x version after 16.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16239/">CVE-2017-16239</cve>
	<bugzilla href="https://bugzilla.suse.com/1066198">SUSE bug 1066198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070500">SUSE bug 1070500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594304" comment="openstack-nova-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594305" comment="openstack-nova-api-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594306" comment="openstack-nova-cells-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594307" comment="openstack-nova-cert-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594308" comment="openstack-nova-compute-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594309" comment="openstack-nova-conductor-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594310" comment="openstack-nova-console-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594311" comment="openstack-nova-consoleauth-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594312" comment="openstack-nova-doc-14.0.10~dev13-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594313" comment="openstack-nova-novncproxy-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594314" comment="openstack-nova-placement-api-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594315" comment="openstack-nova-scheduler-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594316" comment="openstack-nova-serialproxy-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594317" comment="openstack-nova-vncproxy-14.0.10~dev13-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594318" comment="python-nova-14.0.10~dev13-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16352" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16352" ref_url="https://www.suse.com/security/cve/CVE-2017-16352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 is vulnerable to a heap-based buffer overflow vulnerability found in the "Display visual image directory" feature of the DescribeImage() function of the magick/describe.c file. One possible way to trigger the vulnerability is to run the identify command on a specially crafted MIFF format file with the verbose flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16352/">CVE-2017-16352</cve>
	<bugzilla href="https://bugzilla.suse.com/1066168">SUSE bug 1066168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16353" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16353" ref_url="https://www.suse.com/security/cve/CVE-2017-16353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    GraphicsMagick 1.3.26 is vulnerable to a memory information disclosure vulnerability found in the DescribeImage function of the magick/describe.c file, because of a heap-based buffer over-read. The portion of the code containing the vulnerability is responsible for printing the IPTC Profile information contained in the image. This vulnerability can be triggered with a specially crafted MIFF file. There is an out-of-bounds buffer dereference because certain increments are never checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16353/">CVE-2017-16353</cve>
	<bugzilla href="https://bugzilla.suse.com/1066170">SUSE bug 1066170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1651</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1651" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1651" ref_url="https://www.suse.com/security/cve/CVE-2017-1651" source="SUSE CVE"/>
    <description>
    IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 133261.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-1651/">CVE-2017-1651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596499" comment="ruby2.1-rubygem-yajl-ruby-1.3.1-4.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16525" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<bugzilla href="https://bugzilla.suse.com/1066618">SUSE bug 1066618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16528" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    sound/core/seq_device.c in the Linux kernel before 4.13.4 allows local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528</cve>
	<bugzilla href="https://bugzilla.suse.com/1066629">SUSE bug 1066629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16532" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16532" ref_url="https://www.suse.com/security/cve/CVE-2017-16532" source="SUSE CVE"/>
    <description>
    The get_endpoints function in drivers/usb/misc/usbtest.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16532/">CVE-2017-16532</cve>
	<bugzilla href="https://bugzilla.suse.com/1066673">SUSE bug 1066673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16536" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16537" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
    <description>
    drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start check and incorrect attach timing (dm04_lme2510_frontend_attach versus dm04_lme2510_tuner).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<bugzilla href="https://bugzilla.suse.com/1066569">SUSE bug 1066569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16541" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<bugzilla href="https://bugzilla.suse.com/1066489">SUSE bug 1066489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16544" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YB6DIPEMLRTDD3RU77DD7UYYKBEEKYDY/" source="SUSE-SU"/>
    <description>
    In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544</cve>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338833" comment="busybox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16545" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16545" ref_url="https://www.suse.com/security/cve/CVE-2017-16545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadWPGImage function in coders/wpg.c in GraphicsMagick 1.3.26 does not properly validate colormapped images, which allows remote attackers to cause a denial of service (ImportIndexQuantumType invalid write and application crash) or possibly have unspecified other impact via a malformed WPG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16545/">CVE-2017-16545</cve>
	<bugzilla href="https://bugzilla.suse.com/1067184">SUSE bug 1067184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16546" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16546" ref_url="https://www.suse.com/security/cve/CVE-2017-16546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3378-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16546/">CVE-2017-16546</cve>
	<bugzilla href="https://bugzilla.suse.com/1067181">SUSE bug 1067181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00044.html" source="SUSE-SU"/>
    <description>
    The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550975" comment="rsync-3.1.0-13.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16611" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611" source="SUSE CVE"/>
    <description>
    In libXfont before 1.5.4 and libXfont2 before 2.0.3, a local attacker can open (but not read) files on the system as root, triggering tape rewinds, watchdogs, or similar mechanisms that can be triggered by opening files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611</cve>
	<bugzilla href="https://bugzilla.suse.com/1050459">SUSE bug 1050459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334512" comment="xorg-x11-libs is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16612" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003648.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0504-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00087.html" source="SUSE-SU"/>
    <description>
    libXcursor before 1.1.15 has various integer overflows that could lead to heap buffer overflows when processing malicious cursors, e.g., with programs like GIMP. It is also possible that an attack vector exists against the related code in cursor/xcursor.c in Wayland through 1.14.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<bugzilla href="https://bugzilla.suse.com/1065386">SUSE bug 1065386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159415">SUSE bug 1159415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549908" comment="libXcursor1-1.1.14-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549909" comment="libXcursor1-32bit-1.1.14-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<bugzilla href="https://bugzilla.suse.com/1067118">SUSE bug 1067118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16645" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645</cve>
	<bugzilla href="https://bugzilla.suse.com/1067132">SUSE bug 1067132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16646" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<bugzilla href="https://bugzilla.suse.com/1067105">SUSE bug 1067105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16647" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16647" ref_url="https://www.suse.com/security/cve/CVE-2017-16647" source="SUSE CVE"/>
    <description>
    drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16647/">CVE-2017-16647</cve>
	<bugzilla href="https://bugzilla.suse.com/1067102">SUSE bug 1067102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16648" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648" source="SUSE CVE"/>
    <description>
    The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648</cve>
	<bugzilla href="https://bugzilla.suse.com/1067087">SUSE bug 1067087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16669" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16669" ref_url="https://www.suse.com/security/cve/CVE-2017-16669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00087.html" source="SUSE-SU"/>
    <description>
    coders/wpg.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to the AcquireCacheNexus function in magick/pixel_cache.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16669/">CVE-2017-16669</cve>
	<bugzilla href="https://bugzilla.suse.com/1067409">SUSE bug 1067409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549938" comment="libMagickCore-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549939" comment="libMagickWand-6_Q16-1-6.8.8.1-71.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16818" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16818" ref_url="https://www.suse.com/security/cve/CVE-2017-16818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00114.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00071.html" source="SUSE-SU"/>
    <description>
    RADOS Gateway in Ceph 12.1.0 through 12.2.1 allows remote authenticated users to cause a denial of service (assertion failure and application exit) by leveraging "full" (not necessarily admin) privileges to post an invalid profile to the admin API, related to rgw/rgw_iam_policy.cc, rgw/rgw_basic_types.h, and rgw/rgw_iam_types.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16818/">CVE-2017-16818</cve>
	<bugzilla href="https://bugzilla.suse.com/1063014">SUSE bug 1063014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069253">SUSE bug 1069253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334046" comment="ceph is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The coff_slurp_line_table function in coffcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<bugzilla href="https://bugzilla.suse.com/1068640">SUSE bug 1068640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The aout_get_external_symbols function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (slurp_symtab invalid free and application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<bugzilla href="https://bugzilla.suse.com/1069202">SUSE bug 1069202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The display_debug_frames function in dwarf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (integer overflow and heap-based buffer over-read, and application crash) or possibly have unspecified other impact via a crafted ELF file, related to print_debug_frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<bugzilla href="https://bugzilla.suse.com/1069176">SUSE bug 1069176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16829" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The _bfd_elf_parse_gnu_properties function in elf-properties.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not prevent negative pointers, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334047" comment="gdb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16830" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The print_gnu_property_note function in readelf.c in GNU Binutils 2.29.1 does not have integer-overflow protection on 32-bit platforms, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<bugzilla href="https://bugzilla.suse.com/1068888">SUSE bug 1068888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate the symbol count, which allows remote attackers to cause a denial of service (integer overflow and application crash, or excessive memory allocation) or possibly have unspecified other impact via a crafted PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<bugzilla href="https://bugzilla.suse.com/1068887">SUSE bug 1068887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The pe_bfd_read_buildid function in peicode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, does not validate size and offset values in the data dictionary, which allows remote attackers to cause a denial of service (segmentation violation and application crash) or possibly have unspecified other impact via a crafted PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<bugzilla href="https://bugzilla.suse.com/1068643">SUSE bug 1068643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16837" ref_url="https://www.suse.com/security/cve/CVE-2017-16837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3100-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Certain function pointers in Trusted Boot (tboot) through 1.9.6 are not validated and can cause arbitrary code execution, which allows local users to overwrite dynamic PCRs of Trusted Platform Module (TPM) by hooking these function pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16837/">CVE-2017-16837</cve>
	<bugzilla href="https://bugzilla.suse.com/1068390">SUSE bug 1068390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889339">SUSE bug 889339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549840" comment="tboot-20160518_1.9.4-7.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003618.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the loadbuf function in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted e-mail message because of a hardcoded realloc size, a different vulnerability than CVE-2014-3618.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<bugzilla href="https://bugzilla.suse.com/1068648">SUSE bug 1068648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550417" comment="procmail-3.22-269.3.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16845" ref_url="https://www.suse.com/security/cve/CVE-2017-16845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16845/">CVE-2017-16845</cve>
	<bugzilla href="https://bugzilla.suse.com/1068613">SUSE bug 1068613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16852" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16852" ref_url="https://www.suse.com/security/cve/CVE-2017-16852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00013.html" source="SUSE-SU"/>
    <description>
    shibsp/metadata/DynamicMetadataProvider.cpp in the Dynamic MetadataProvider plugin in Shibboleth Service Provider before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other checks specific to deployments, aka SSPCPP-763.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16852/">CVE-2017-16852</cve>
	<bugzilla href="https://bugzilla.suse.com/1068689">SUSE bug 1068689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549910" comment="libshibsp-lite6-2.5.5-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549911" comment="libshibsp6-2.5.5-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549912" comment="shibboleth-sp-2.5.5-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16853" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16853" ref_url="https://www.suse.com/security/cve/CVE-2017-16853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00019.html" source="SUSE-SU"/>
    <description>
    The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other checks specific to deployments, aka CPPOST-105.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16853/">CVE-2017-16853</cve>
	<bugzilla href="https://bugzilla.suse.com/1068685">SUSE bug 1068685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549922" comment="libsaml8-2.5.5-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549923" comment="opensaml-bin-2.5.5-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549924" comment="opensaml-schemas-2.5.5-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16879" ref_url="https://www.suse.com/security/cve/CVE-2017-16879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00002.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the _nc_write_entry function in tinfo/write_entry.c in ncurses 6.0 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted terminfo file, as demonstrated by tic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16879/">CVE-2017-16879</cve>
	<bugzilla href="https://bugzilla.suse.com/1069530">SUSE bug 1069530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123132">SUSE bug 1123132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175501">SUSE bug 1175501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334357" comment="ncurses is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16899" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0498-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00081.html" source="SUSE-SU"/>
    <description>
    An array index error in the fig2dev program in Xfig 3.2.6a allows remote attackers to cause a denial-of-service attack or information disclosure with a maliciously crafted Fig format file, related to a negative font value in dev/gentikz.c, and the read_textobject functions in read.c and read1_3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<bugzilla href="https://bugzilla.suse.com/1069257">SUSE bug 1069257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550456" comment="transfig-3.2.5e-2.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The "get_pipe()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<bugzilla href="https://bugzilla.suse.com/1078673">SUSE bug 1078673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<bugzilla href="https://bugzilla.suse.com/1078672">SUSE bug 1078672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16927" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16927" ref_url="https://www.suse.com/security/cve/CVE-2017-16927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005721.html" source="SUSE-SU"/>
    <description>
    The scp_v0s_accept function in sesman/libscp/libscp_v0.c in the session manager in xrdp through 0.9.4 uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16927/">CVE-2017-16927</cve>
	<bugzilla href="https://bugzilla.suse.com/1069591">SUSE bug 1069591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/442182">SUSE bug 442182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334476" comment="xrdp is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551188" comment="xrdp-0.9.0~git.1456906198.f422461-16.9.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595016" comment="xrdp-0.9.0~git.1456906198.f422461-16.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16932" ref_url="https://www.suse.com/security/cve/CVE-2017-16932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
    <description>
    parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16932/">CVE-2017-16932</cve>
	<bugzilla href="https://bugzilla.suse.com/1069689">SUSE bug 1069689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103099">SUSE bug 1103099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334009" comment="libxml2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3305-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3317-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3318-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3319-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3332-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3337-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3338-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0253-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0276-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<bugzilla href="https://bugzilla.suse.com/1069702">SUSE bug 1069702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069708">SUSE bug 1069708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120260">SUSE bug 1120260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549913" comment="kernel-default-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549914" comment="kernel-default-base-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549915" comment="kernel-default-devel-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549916" comment="kernel-default-man-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518392" comment="kernel-devel-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518393" comment="kernel-macros-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518394" comment="kernel-source-4.4.90-92.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549917" comment="kernel-syms-4.4.90-92.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16942" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16942" ref_url="https://www.suse.com/security/cve/CVE-2017-16942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    In libsndfile 1.0.25 (fixed in 1.0.26), a divide-by-zero error exists in the function wav_w64_read_fmt_chunk() in wav_w64.c, which may lead to DoS when playing a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16942/">CVE-2017-16942</cve>
	<bugzilla href="https://bugzilla.suse.com/1069874">SUSE bug 1069874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550592" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550593" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The walk_hugetlb_range function in mm/pagewalk.c in the Linux kernel before 4.14.2 mishandles holes in hugetlb ranges, which allows local users to obtain sensitive information from uninitialized kernel memory via crafted use of the mincore() system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994</cve>
	<bugzilla href="https://bugzilla.suse.com/1069996">SUSE bug 1069996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
    <description>
    elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<bugzilla href="https://bugzilla.suse.com/1073231">SUSE bug 1073231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550834" comment="glibc-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550835" comment="glibc-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550836" comment="glibc-devel-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550837" comment="glibc-devel-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533280" comment="glibc-html-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519059" comment="glibc-i18ndata-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533281" comment="glibc-info-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550838" comment="glibc-locale-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550839" comment="glibc-locale-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550840" comment="glibc-profile-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550841" comment="glibc-profile-32bit-2.22-62.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550842" comment="nscd-2.22-62.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17046" ref_url="https://www.suse.com/security/cve/CVE-2017-17046" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.9.x on the ARM platform allowing guest OS users to obtain sensitive information from DRAM after a reboot, because disjoint blocks, and physical addresses that do not start at zero, are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17046/">CVE-2017-17046</cve>
	<bugzilla href="https://bugzilla.suse.com/1061090">SUSE bug 1061090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17052" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17052" ref_url="https://www.suse.com/security/cve/CVE-2017-17052" source="SUSE CVE"/>
    <description>
    The mm_init function in kernel/fork.c in the Linux kernel before 4.12.10 does not clear the -&gt;exe_file member of a new process's mm_struct, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17052/">CVE-2017-17052</cve>
	<bugzilla href="https://bugzilla.suse.com/1069496">SUSE bug 1069496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070266">SUSE bug 1070266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17083" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00011.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549962" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549963" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549964" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549965" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549966" comment="wireshark-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549967" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17084" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00011.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549962" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549963" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549964" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549965" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549966" comment="wireshark-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549967" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17085" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3202-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00011.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<bugzilla href="https://bugzilla.suse.com/1070727">SUSE bug 1070727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549962" comment="libwireshark8-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549963" comment="libwiretap6-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549964" comment="libwscodecs1-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549965" comment="libwsutil7-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549966" comment="wireshark-2.2.11-48.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549967" comment="wireshark-gtk-2.2.11-48.15.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17087" ref_url="https://www.suse.com/security/cve/CVE-2017-17087" source="SUSE CVE"/>
    <description>
    fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17087/">CVE-2017-17087</cve>
	<bugzilla href="https://bugzilla.suse.com/1065958">SUSE bug 1065958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070955">SUSE bug 1070955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334500" comment="vim is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17095" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095</cve>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17121" ref_url="https://www.suse.com/security/cve/CVE-2017-17121" source="SUSE CVE"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, allows remote attackers to cause a denial of service (memory access violation) or possibly have unspecified other impact via a COFF binary in which a relocation refers to a location after the end of the to-be-relocated section.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17121/">CVE-2017-17121</cve>
	<bugzilla href="https://bugzilla.suse.com/1071544">SUSE bug 1071544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17122" ref_url="https://www.suse.com/security/cve/CVE-2017-17122" source="SUSE CVE"/>
    <description>
    The dump_relocs_in_section function in objdump.c in GNU Binutils 2.29.1 does not check for reloc count integer overflows, which allows remote attackers to cause a denial of service (excessive memory allocation, or heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17122/">CVE-2017-17122</cve>
	<bugzilla href="https://bugzilla.suse.com/1071440">SUSE bug 1071440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17125" ref_url="https://www.suse.com/security/cve/CVE-2017-17125" source="SUSE CVE"/>
    <description>
    nm.c and objdump.c in GNU Binutils 2.29.1 mishandle certain global symbols, which allows remote attackers to cause a denial of service (_bfd_elf_get_symbol_version_string buffer over-read and application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17125/">CVE-2017-17125</cve>
	<bugzilla href="https://bugzilla.suse.com/1071022">SUSE bug 1071022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17126" ref_url="https://www.suse.com/security/cve/CVE-2017-17126" source="SUSE CVE"/>
    <description>
    The load_debug_section function in readelf.c in GNU Binutils 2.29.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via an ELF file that lacks section headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17126/">CVE-2017-17126</cve>
	<bugzilla href="https://bugzilla.suse.com/1071016">SUSE bug 1071016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17381" ref_url="https://www.suse.com/security/cve/CVE-2017-17381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    The Virtio Vring implementation in QEMU allows local OS guest users to cause a denial of service (divide-by-zero error and QEMU process crash) by unsetting vring alignment while updating Virtio rings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17381/">CVE-2017-17381</cve>
	<bugzilla href="https://bugzilla.suse.com/1071228">SUSE bug 1071228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17405" ref_url="https://www.suse.com/security/cve/CVE-2017-17405" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17405/">CVE-2017-17405</cve>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17426" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426" source="SUSE CVE"/>
    <description>
    The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426</cve>
	<bugzilla href="https://bugzilla.suse.com/1071479">SUSE bug 1071479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17433" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17433" ref_url="https://www.suse.com/security/cve/CVE-2017-17433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00044.html" source="SUSE-SU"/>
    <description>
    The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote attackers to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17433/">CVE-2017-17433</cve>
	<bugzilla href="https://bugzilla.suse.com/1071459">SUSE bug 1071459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550975" comment="rsync-3.1.0-13.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17434" ref_url="https://www.suse.com/security/cve/CVE-2017-17434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00044.html" source="SUSE-SU"/>
    <description>
    The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17434/">CVE-2017-17434</cve>
	<bugzilla href="https://bugzilla.suse.com/1071460">SUSE bug 1071460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550975" comment="rsync-3.1.0-13.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448</cve>
	<bugzilla href="https://bugzilla.suse.com/1071693">SUSE bug 1071693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449</cve>
	<bugzilla href="https://bugzilla.suse.com/1071694">SUSE bug 1071694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074033">SUSE bug 1074033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17484" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17484" ref_url="https://www.suse.com/security/cve/CVE-2017-17484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    The ucnv_UTF8FromUTF8 function in ucnv_u8.cpp in International Components for Unicode (ICU) for C/C++ through 60.1 mishandles ucnv_convertEx calls for UTF-8 to UTF-8 conversion, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted string, as demonstrated by ZNC.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17484/">CVE-2017-17484</cve>
	<bugzilla href="https://bugzilla.suse.com/1072193">SUSE bug 1072193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546245" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546246" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546248" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594765" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594766" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594767" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17498" ref_url="https://www.suse.com/security/cve/CVE-2017-17498" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:3357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00073.html" source="SUSE-SU"/>
    <description>
    WritePNMImage in coders/pnm.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (bit_stream.c MagickBitStreamMSBWrite heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17498/">CVE-2017-17498</cve>
	<bugzilla href="https://bugzilla.suse.com/1072103">SUSE bug 1072103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17500" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17500" ref_url="https://www.suse.com/security/cve/CVE-2017-17500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00106.html" source="SUSE-SU"/>
    <description>
    ReadRGBImage in coders/rgb.c in GraphicsMagick 1.3.26 has a magick/import.c ImportRGBQuantumType heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17500/">CVE-2017-17500</cve>
	<bugzilla href="https://bugzilla.suse.com/1077737">SUSE bug 1077737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17501" ref_url="https://www.suse.com/security/cve/CVE-2017-17501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
    <description>
    WriteOnePNGImage in coders/png.c in GraphicsMagick 1.3.26 has a heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17501/">CVE-2017-17501</cve>
	<bugzilla href="https://bugzilla.suse.com/1074023">SUSE bug 1074023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17502" ref_url="https://www.suse.com/security/cve/CVE-2017-17502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
    <description>
    ReadCMYKImage in coders/cmyk.c in GraphicsMagick 1.3.26 has a magick/import.c ImportCMYKQuantumType heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17502/">CVE-2017-17502</cve>
	<bugzilla href="https://bugzilla.suse.com/1073081">SUSE bug 1073081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077737">SUSE bug 1077737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17503" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17503" ref_url="https://www.suse.com/security/cve/CVE-2017-17503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0496-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00079.html" source="SUSE-SU"/>
    <description>
    ReadGRAYImage in coders/gray.c in GraphicsMagick 1.3.26 has a magick/import.c ImportGrayQuantumType heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17503/">CVE-2017-17503</cve>
	<bugzilla href="https://bugzilla.suse.com/1072934">SUSE bug 1072934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073081">SUSE bug 1073081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077737">SUSE bug 1077737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17504" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17504" ref_url="https://www.suse.com/security/cve/CVE-2017-17504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.7-12 has a coders/png.c Magick_png_read_raw_profile heap-based buffer over-read via a crafted file, related to ReadOneMNGImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17504/">CVE-2017-17504</cve>
	<bugzilla href="https://bugzilla.suse.com/1072362">SUSE bug 1072362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17563" ref_url="https://www.suse.com/security/cve/CVE-2017-17563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17563/">CVE-2017-17563</cve>
	<bugzilla href="https://bugzilla.suse.com/1070159">SUSE bug 1070159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550721" comment="xen-doc-html-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550722" comment="xen-tools-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550723" comment="xen-tools-domU-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17564" ref_url="https://www.suse.com/security/cve/CVE-2017-17564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17564/">CVE-2017-17564</cve>
	<bugzilla href="https://bugzilla.suse.com/1070160">SUSE bug 1070160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550721" comment="xen-doc-html-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550722" comment="xen-tools-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550723" comment="xen-tools-domU-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17565" ref_url="https://www.suse.com/security/cve/CVE-2017-17565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17565/">CVE-2017-17565</cve>
	<bugzilla href="https://bugzilla.suse.com/1070163">SUSE bug 1070163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550721" comment="xen-doc-html-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550722" comment="xen-tools-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550723" comment="xen-tools-domU-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17566" ref_url="https://www.suse.com/security/cve/CVE-2017-17566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17566/">CVE-2017-17566</cve>
	<bugzilla href="https://bugzilla.suse.com/1070158">SUSE bug 1070158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550721" comment="xen-doc-html-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550722" comment="xen-tools-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550723" comment="xen-tools-domU-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17680" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17680" ref_url="https://www.suse.com/security/cve/CVE-2017-17680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted xpm image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17680/">CVE-2017-17680</cve>
	<bugzilla href="https://bugzilla.suse.com/1072902">SUSE bug 1072902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17681" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17681" ref_url="https://www.suse.com/security/cve/CVE-2017-17681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, an infinite loop vulnerability was found in the function ReadPSDChannelZip in coders/psd.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted psd image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17681/">CVE-2017-17681</cve>
	<bugzilla href="https://bugzilla.suse.com/1072901">SUSE bug 1072901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17682" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17682" ref_url="https://www.suse.com/security/cve/CVE-2017-17682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a large loop vulnerability was found in the function ExtractPostscript in coders/wpg.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted wpg image file that triggers a ReadWPGImage call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17682/">CVE-2017-17682</cve>
	<bugzilla href="https://bugzilla.suse.com/1072898">SUSE bug 1072898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17688" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17688" ref_url="https://www.suse.com/security/cve/CVE-2017-17688" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00096.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17688/">CVE-2017-17688</cve>
	<bugzilla href="https://bugzilla.suse.com/1093151">SUSE bug 1093151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093727">SUSE bug 1093727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115719">SUSE bug 1115719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334049" comment="mutt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17689" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17689" ref_url="https://www.suse.com/security/cve/CVE-2017-17689" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00096.html" source="SUSE-SU"/>
    <description>
    The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17689/">CVE-2017-17689</cve>
	<bugzilla href="https://bugzilla.suse.com/1093152">SUSE bug 1093152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093727">SUSE bug 1093727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334049" comment="mutt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17712" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0347-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0431-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0433-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    The raw_sendmsg() function in net/ipv4/raw.c in the Linux kernel through 4.14.6 has a race condition in inet-&gt;hdrincl that leads to uninitialized stack pointer usage; this allows a local user to execute code and gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712</cve>
	<bugzilla href="https://bugzilla.suse.com/1073229">SUSE bug 1073229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073230">SUSE bug 1073230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17725" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17725" ref_url="https://www.suse.com/security/cve/CVE-2017-17725" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17725/">CVE-2017-17725</cve>
	<bugzilla href="https://bugzilla.suse.com/1080734">SUSE bug 1080734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184749">SUSE bug 1184749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<bugzilla href="https://bugzilla.suse.com/1073311">SUSE bug 1073311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742</cve>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17790" ref_url="https://www.suse.com/security/cve/CVE-2017-17790" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
    <description>
    The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17790/">CVE-2017-17790</cve>
	<bugzilla href="https://bugzilla.suse.com/1073002">SUSE bug 1073002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078782">SUSE bug 1078782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<bugzilla href="https://bugzilla.suse.com/1073792">SUSE bug 1073792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550392" comment="kernel-default-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550393" comment="kernel-default-base-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550394" comment="kernel-default-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550395" comment="kernel-default-man-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518759" comment="kernel-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518760" comment="kernel-macros-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518761" comment="kernel-source-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550396" comment="kernel-syms-4.4.103-92.56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
    <description>
    The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550392" comment="kernel-default-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550393" comment="kernel-default-base-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550394" comment="kernel-default-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550395" comment="kernel-default-man-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518759" comment="kernel-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518760" comment="kernel-macros-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518761" comment="kernel-source-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550396" comment="kernel-syms-4.4.103-92.56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17807" ref_url="https://www.suse.com/security/cve/CVE-2017-17807" source="SUSE CVE"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add keys to a keyring with only Search permission (not Write permission) to that keyring, related to construct_get_dest_keyring() in security/keys/request_key.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17807/">CVE-2017-17807</cve>
	<bugzilla href="https://bugzilla.suse.com/1073860">SUSE bug 1073860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17833" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2779-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00063.html" source="SUSE-SU"/>
    <description>
    OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099519">SUSE bug 1099519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334515" comment="openslp is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520128" comment="openslp-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520129" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530283" comment="openslp-server-2.0.0-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545818" comment="openslp-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545819" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545820" comment="openslp-server-2.0.0-18.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594597" comment="openslp-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545819" comment="openslp-32bit-2.0.0-18.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594598" comment="openslp-server-2.0.0-18.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17862" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17864" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864</cve>
	<bugzilla href="https://bugzilla.suse.com/1073928">SUSE bug 1073928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17879" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17879" ref_url="https://www.suse.com/security/cve/CVE-2017-17879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a heap-based buffer over-read in ReadOneMNGImage in coders/png.c, related to length calculation and caused by an off-by-one error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-17879/">CVE-2017-17879</cve>
	<bugzilla href="https://bugzilla.suse.com/1074125">SUSE bug 1074125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074175">SUSE bug 1074175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17880" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17880" ref_url="https://www.suse.com/security/cve/CVE-2017-17880" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-16 Q16 x86_64 2017-12-21, there is a stack-based buffer over-read in WriteWEBPImage in coders/webp.c, related to a WEBP_DECODER_ABI_VERSION check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17880/">CVE-2017-17880</cve>
	<bugzilla href="https://bugzilla.suse.com/1074124">SUSE bug 1074124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074299">SUSE bug 1074299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17881" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17881" ref_url="https://www.suse.com/security/cve/CVE-2017-17881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17881/">CVE-2017-17881</cve>
	<bugzilla href="https://bugzilla.suse.com/1074123">SUSE bug 1074123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17882" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17882" ref_url="https://www.suse.com/security/cve/CVE-2017-17882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted XPM image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17882/">CVE-2017-17882</cve>
	<bugzilla href="https://bugzilla.suse.com/1074122">SUSE bug 1074122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17883" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17883" ref_url="https://www.suse.com/security/cve/CVE-2017-17883" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPGXImage in coders/pgx.c, which allows attackers to cause a denial of service via a crafted PGX image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17883/">CVE-2017-17883</cve>
	<bugzilla href="https://bugzilla.suse.com/1074121">SUSE bug 1074121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17884" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17884" ref_url="https://www.suse.com/security/cve/CVE-2017-17884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function WriteOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted PNG image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17884/">CVE-2017-17884</cve>
	<bugzilla href="https://bugzilla.suse.com/1074120">SUSE bug 1074120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17885" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17885" ref_url="https://www.suse.com/security/cve/CVE-2017-17885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadPICTImage in coders/pict.c, which allows attackers to cause a denial of service via a crafted PICT image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17885/">CVE-2017-17885</cve>
	<bugzilla href="https://bugzilla.suse.com/1074119">SUSE bug 1074119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17887" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17887" ref_url="https://www.suse.com/security/cve/CVE-2017-17887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function GetImagePixelCache in magick/cache.c, which allows attackers to cause a denial of service via a crafted MNG image file that is processed by ReadOneMNGImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17887/">CVE-2017-17887</cve>
	<bugzilla href="https://bugzilla.suse.com/1074117">SUSE bug 1074117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17914" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17914" ref_url="https://www.suse.com/security/cve/CVE-2017-17914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-16 Q16, a vulnerability was found in the function ReadOnePNGImage in coders/png.c, which allows attackers to cause a denial of service (ReadOneMNGImage large loop) via a crafted mng image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17914/">CVE-2017-17914</cve>
	<bugzilla href="https://bugzilla.suse.com/1074185">SUSE bug 1074185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17916</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17916" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17916" ref_url="https://www.suse.com/security/cve/CVE-2017-17916" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** SQL injection vulnerability in the 'find_by' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17916/">CVE-2017-17916</cve>
	<bugzilla href="https://bugzilla.suse.com/1074346">SUSE bug 1074346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334392" comment="rubygem-rails-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17917</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17917" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17917" ref_url="https://www.suse.com/security/cve/CVE-2017-17917" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** SQL injection vulnerability in the 'where' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17917/">CVE-2017-17917</cve>
	<bugzilla href="https://bugzilla.suse.com/1074347">SUSE bug 1074347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334392" comment="rubygem-rails-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17919</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17919" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17919" ref_url="https://www.suse.com/security/cve/CVE-2017-17919" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** SQL injection vulnerability in the 'order' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'id desc' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17919/">CVE-2017-17919</cve>
	<bugzilla href="https://bugzilla.suse.com/1074348">SUSE bug 1074348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334392" comment="rubygem-rails-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17920</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17920" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17920" ref_url="https://www.suse.com/security/cve/CVE-2017-17920" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17920/">CVE-2017-17920</cve>
	<bugzilla href="https://bugzilla.suse.com/1074349">SUSE bug 1074349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334392" comment="rubygem-rails-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17934" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17934" ref_url="https://www.suse.com/security/cve/CVE-2017-17934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-17 Q16 x86_64 has memory leaks in coders/msl.c, related to MSLPopImage and ProcessMSLScript, and associated with mishandling of MSLPushImage calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17934/">CVE-2017-17934</cve>
	<bugzilla href="https://bugzilla.suse.com/1074170">SUSE bug 1074170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17935" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17935" ref_url="https://www.suse.com/security/cve/CVE-2017-17935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
    <description>
    The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17935/">CVE-2017-17935</cve>
	<bugzilla href="https://bugzilla.suse.com/1074171">SUSE bug 1074171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550430" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550431" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550432" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550433" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550434" comment="wireshark-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550435" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17942" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17942" ref_url="https://www.suse.com/security/cve/CVE-2017-17942" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00078.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, there is a heap-based buffer over-read in the function PackBitsEncode in tif_packbits.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17942/">CVE-2017-17942</cve>
	<bugzilla href="https://bugzilla.suse.com/1074186">SUSE bug 1074186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150480">SUSE bug 1150480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983440">SUSE bug 983440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17969" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00040.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the NCompress::NShrink::CDecoder::CodeReal method in 7-Zip before 18.00 and p7zip allows remote attackers to cause a denial of service (out-of-bounds write) or potentially execute arbitrary code via a crafted ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969</cve>
	<bugzilla href="https://bugzilla.suse.com/1077725">SUSE bug 1077725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550716" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17973" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17973" ref_url="https://www.suse.com/security/cve/CVE-2017-17973" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00025.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17973/">CVE-2017-17973</cve>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the usbtv_probe function in drivers/media/usb/usbtv/usbtv-core.c in the Linux kernel through 4.14.10 allows attackers to cause a denial of service (system crash) or possibly have unspecified other impact by triggering failure of audio registration, because a kfree of the usbtv data structure occurs during a usbtv_video_free call, but the usbtv_video_fail label's code attempts to both access and free this data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975</cve>
	<bugzilla href="https://bugzilla.suse.com/1074426">SUSE bug 1074426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17997" ref_url="https://www.suse.com/security/cve/CVE-2017-17997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00034.html" source="SUSE-SU"/>
    <description>
    In Wireshark before 2.2.12, the MRDISC dissector misuses a NULL pointer and crashes. This was addressed in epan/dissectors/packet-mrdisc.c by validating an IPv4 address. This vulnerability is similar to CVE-2017-9343.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17997/">CVE-2017-17997</cve>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18008" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18008" ref_url="https://www.suse.com/security/cve/CVE-2017-18008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there is a Memory Leak in ReadPWPImage in coders/pwp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18008/">CVE-2017-18008</cve>
	<bugzilla href="https://bugzilla.suse.com/1074309">SUSE bug 1074309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18013" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, there is a Null-Pointer Dereference in the tif_print.c TIFFPrintDirectory function, as demonstrated by a tiffinfo crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18017" ref_url="https://www.suse.com/security/cve/CVE-2017-18017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    The tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c in the Linux kernel before 4.11, and 4.9.x before 4.9.36, allows remote attackers to cause a denial of service (use-after-free and memory corruption) or possibly have unspecified other impact by leveraging the presence of xt_TCPMSS in an iptables action.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18017/">CVE-2017-18017</cve>
	<bugzilla href="https://bugzilla.suse.com/1074488">SUSE bug 1074488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080255">SUSE bug 1080255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18022" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18022" ref_url="https://www.suse.com/security/cve/CVE-2017-18022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-12 Q16, there are memory leaks in MontageImageCommand in MagickWand/montage.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18022/">CVE-2017-18022</cve>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18027" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18027" ref_url="https://www.suse.com/security/cve/CVE-2017-18027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18027/">CVE-2017-18027</cve>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18028" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18028" ref_url="https://www.suse.com/security/cve/CVE-2017-18028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0460-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18028/">CVE-2017-18028</cve>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085236">SUSE bug 1085236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18029" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18029" ref_url="https://www.suse.com/security/cve/CVE-2017-18029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.6-10 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18029/">CVE-2017-18029</cve>
	<bugzilla href="https://bugzilla.suse.com/1076021">SUSE bug 1076021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076051">SUSE bug 1076051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18030" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18030" ref_url="https://www.suse.com/security/cve/CVE-2017-18030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
    <description>
    The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18030/">CVE-2017-18030</cve>
	<bugzilla href="https://bugzilla.suse.com/1076179">SUSE bug 1076179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076180">SUSE bug 1076180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550721" comment="xen-doc-html-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550722" comment="xen-tools-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550723" comment="xen-tools-domU-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18043" ref_url="https://www.suse.com/security/cve/CVE-2017-18043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the macro ROUND_UP (n, d) in Quick Emulator (Qemu) allows a user to cause a denial of service (Qemu process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18043/">CVE-2017-18043</cve>
	<bugzilla href="https://bugzilla.suse.com/1076775">SUSE bug 1076775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html" source="SUSE-SU"/>
    <description>
    systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078</cve>
	<bugzilla href="https://bugzilla.suse.com/1077925">SUSE bug 1077925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550737" comment="libsystemd0-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550738" comment="libsystemd0-32bit-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550739" comment="libudev1-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550740" comment="libudev1-32bit-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550741" comment="systemd-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550742" comment="systemd-32bit-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518969" comment="systemd-bash-completion-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550743" comment="systemd-sysvinit-228-150.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550744" comment="udev-228-150.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18174" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18174" ref_url="https://www.suse.com/security/cve/CVE-2017-18174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18174/">CVE-2017-18174</cve>
	<bugzilla href="https://bugzilla.suse.com/1080533">SUSE bug 1080533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18183" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18183" ref_url="https://www.suse.com/security/cve/CVE-2017-18183" source="SUSE CVE"/>
    <description>
    An issue was discovered in QPDF before 7.0.0. There is an infinite loop in the QPDFWriter::enqueueObject() function in libqpdf/QPDFWriter.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18183/">CVE-2017-18183</cve>
	<bugzilla href="https://bugzilla.suse.com/1080935">SUSE bug 1080935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18184" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18184" ref_url="https://www.suse.com/security/cve/CVE-2017-18184" source="SUSE CVE"/>
    <description>
    An issue was discovered in QPDF before 7.0.0. There is a stack-based out-of-bounds read in the function iterate_rc4 in QPDF_encryption.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18184/">CVE-2017-18184</cve>
	<bugzilla href="https://bugzilla.suse.com/1080952">SUSE bug 1080952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18186" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18186" ref_url="https://www.suse.com/security/cve/CVE-2017-18186" source="SUSE CVE"/>
    <description>
    An issue was discovered in QPDF before 7.0.0. There is an infinite loop due to looping xref tables in QPDF.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18186/">CVE-2017-18186</cve>
	<bugzilla href="https://bugzilla.suse.com/1080925">SUSE bug 1080925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18190" ref_url="https://www.suse.com/security/cve/CVE-2017-18190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00026.html" source="SUSE-SU"/>
    <description>
    A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18190/">CVE-2017-18190</cve>
	<bugzilla href="https://bugzilla.suse.com/1081557">SUSE bug 1081557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550751" comment="cups-1.7.5-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550752" comment="cups-client-1.7.5-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550753" comment="cups-libs-1.7.5-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546056" comment="cups-libs-32bit-1.7.5-20.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18191</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18191" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18191" ref_url="https://www.suse.com/security/cve/CVE-2017-18191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004091.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenStack Nova 15.x through 15.1.0 and 16.x through 16.1.1. By detaching and reattaching an encrypted volume, an attacker may access the underlying raw volume and corrupt the LUKS header, resulting in a denial of service attack on the compute host. (The same code error also results in data loss, but that is not a vulnerability because the user loses their own data.) All Nova setups supporting encrypted volumes are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-18191/">CVE-2017-18191</cve>
	<bugzilla href="https://bugzilla.suse.com/1081685">SUSE bug 1081685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594768" comment="openstack-nova-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594769" comment="openstack-nova-api-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594770" comment="openstack-nova-cells-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594771" comment="openstack-nova-cert-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594772" comment="openstack-nova-compute-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594773" comment="openstack-nova-conductor-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594774" comment="openstack-nova-console-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594775" comment="openstack-nova-consoleauth-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594776" comment="openstack-nova-doc-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594777" comment="openstack-nova-novncproxy-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594778" comment="openstack-nova-placement-api-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594779" comment="openstack-nova-scheduler-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594780" comment="openstack-nova-serialproxy-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594781" comment="openstack-nova-vncproxy-14.0.11~dev13-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594782" comment="python-nova-14.0.11~dev13-4.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18200" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18200" ref_url="https://www.suse.com/security/cve/CVE-2017-18200" source="SUSE CVE"/>
    <description>
    The f2fs implementation in the Linux kernel before 4.14 mishandles reference counts associated with f2fs_wait_discard_bios calls, which allows local users to cause a denial of service (BUG), as demonstrated by fstrim.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18200/">CVE-2017-18200</cve>
	<bugzilla href="https://bugzilla.suse.com/1082754">SUSE bug 1082754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18201" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00040.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201</cve>
	<bugzilla href="https://bugzilla.suse.com/1082877">SUSE bug 1082877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550780" comment="libcdio14-0.90-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550781" comment="libcdio14-32bit-0.90-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18204" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
    <description>
    The ocfs2_setattr function in fs/ocfs2/file.c in the Linux kernel before 4.14.2 allows local users to cause a denial of service (deadlock) via DIO requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<bugzilla href="https://bugzilla.suse.com/1083244">SUSE bug 1083244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18205" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18205" ref_url="https://www.suse.com/security/cve/CVE-2017-18205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no argument if HOME is not set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18205/">CVE-2017-18205</cve>
	<bugzilla href="https://bugzilla.suse.com/1082998">SUSE bug 1082998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334085" comment="zsh is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18206" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18206" ref_url="https://www.suse.com/security/cve/CVE-2017-18206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18206/">CVE-2017-18206</cve>
	<bugzilla href="https://bugzilla.suse.com/1083002">SUSE bug 1083002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334085" comment="zsh is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    The madvise_willneed function in mm/madvise.c in the Linux kernel before 4.14.4 allows local users to cause a denial of service (infinite loop) by triggering use of MADVISE_WILLNEED for a DAX mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<bugzilla href="https://bugzilla.suse.com/1083494">SUSE bug 1083494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18209" ref_url="https://www.suse.com/security/cve/CVE-2017-18209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    In the GetOpenCLCachedFilesDirectory function in magick/opencl.c in ImageMagick 7.0.7, a NULL pointer dereference vulnerability occurs because a memory allocation result is not checked, related to GetOpenCLCacheDirectory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18209/">CVE-2017-18209</cve>
	<bugzilla href="https://bugzilla.suse.com/1083628">SUSE bug 1083628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18210" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18210" ref_url="https://www.suse.com/security/cve/CVE-2017-18210" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7, a NULL pointer dereference vulnerability was found in the function BenchmarkOpenCLDevices in MagickCore/opencl.c because a memory allocation result is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18210/">CVE-2017-18210</cve>
	<bugzilla href="https://bugzilla.suse.com/1083632">SUSE bug 1083632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18211" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18211" ref_url="https://www.suse.com/security/cve/CVE-2017-18211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7, a NULL pointer dereference vulnerability was found in the function saveBinaryCLProgram in magick/opencl.c because a program-lookup result is not checked, related to CacheOpenCLKernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18211/">CVE-2017-18211</cve>
	<bugzilla href="https://bugzilla.suse.com/1083634">SUSE bug 1083634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18218" ref_url="https://www.suse.com/security/cve/CVE-2017-18218" source="SUSE CVE"/>
    <description>
    In drivers/net/ethernet/hisilicon/hns/hns_enet.c in the Linux kernel before 4.13, local users can cause a denial of service (use-after-free and BUG) or possibly have unspecified other impact by leveraging differences in skb handling between hns_nic_net_xmit_hw and hns_nic_net_xmit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-18218/">CVE-2017-18218</cve>
	<bugzilla href="https://bugzilla.suse.com/1084055">SUSE bug 1084055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18219" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18219" ref_url="https://www.suse.com/security/cve/CVE-2017-18219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability was found in the function ReadOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted file that triggers an attempt at a large png_pixels array allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18219/">CVE-2017-18219</cve>
	<bugzilla href="https://bugzilla.suse.com/1084060">SUSE bug 1084060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18220" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18220" ref_url="https://www.suse.com/security/cve/CVE-2017-18220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
    <description>
    The ReadOneJNGImage and ReadJNGImage functions in coders/png.c in GraphicsMagick 1.3.26 allow remote attackers to cause a denial of service (magick/blob.c CloseBlob use-after-free) or possibly have unspecified other impact via a crafted file, a related issue to CVE-2017-11403.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18220/">CVE-2017-18220</cve>
	<bugzilla href="https://bugzilla.suse.com/1084062">SUSE bug 1084062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18222</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18222" ref_url="https://www.suse.com/security/cve/CVE-2017-18222" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.12, Hisilicon Network Subsystem (HNS) does not consider the ETH_SS_PRIV_FLAGS case when retrieving sset_count data, which allows local users to cause a denial of service (buffer overflow and memory corruption) or possibly have unspecified other impact, as demonstrated by incompatibility between hns_get_sset_count and ethtool_get_strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18222/">CVE-2017-18222</cve>
	<bugzilla href="https://bugzilla.suse.com/1084529">SUSE bug 1084529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18224" ref_url="https://www.suse.com/security/cve/CVE-2017-18224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.15, fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allows local users to cause a denial of service (BUG) by modifying a certain e_cpos field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18224/">CVE-2017-18224</cve>
	<bugzilla href="https://bugzilla.suse.com/1084831">SUSE bug 1084831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18229" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18229" ref_url="https://www.suse.com/security/cve/CVE-2017-18229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GraphicsMagick 1.3.26. An allocation failure vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allows attackers to cause a denial of service via a crafted file, because file size is not properly used to restrict scanline, strip, and tile allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18229/">CVE-2017-18229</cve>
	<bugzilla href="https://bugzilla.suse.com/1076182">SUSE bug 1076182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085236">SUSE bug 1085236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18230" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18230" ref_url="https://www.suse.com/security/cve/CVE-2017-18230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003865.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0733-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00065.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GraphicsMagick 1.3.26. A NULL pointer dereference vulnerability was found in the function ReadCINEONImage in coders/cineon.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18230/">CVE-2017-18230</cve>
	<bugzilla href="https://bugzilla.suse.com/1085233">SUSE bug 1085233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18231" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18231" ref_url="https://www.suse.com/security/cve/CVE-2017-18231" source="SUSE CVE"/>
    <description>
    An issue was discovered in GraphicsMagick 1.3.26. A NULL pointer dereference vulnerability was found in the function ReadEnhMetaFile in coders/emf.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18231/">CVE-2017-18231</cve>
	<bugzilla href="https://bugzilla.suse.com/1085232">SUSE bug 1085232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18233" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18233" ref_url="https://www.suse.com/security/cve/CVE-2017-18233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00041.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .avi file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18233/">CVE-2017-18233</cve>
	<bugzilla href="https://bugzilla.suse.com/1085584">SUSE bug 1085584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334563" comment="exempi is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18234" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18234" ref_url="https://www.suse.com/security/cve/CVE-2017-18234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.3. It allows remote attackers to cause a denial of service (invalid memcpy with resultant use-after-free) or possibly have unspecified other impact via a .pdf file containing JPEG data, related to XMPFiles/source/FormatSupport/ReconcileTIFF.cpp, XMPFiles/source/FormatSupport/TIFF_MemoryReader.cpp, and XMPFiles/source/FormatSupport/TIFF_Support.hpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18234/">CVE-2017-18234</cve>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103718">SUSE bug 1103718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334563" comment="exempi is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18235" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18235" ref_url="https://www.suse.com/security/cve/CVE-2017-18235" source="SUSE CVE"/>
    <description>
    An issue was discovered in Exempi before 2.4.3. The VPXChunk class in XMPFiles/source/FormatSupport/WEBP_Support.cpp does not ensure nonzero widths and heights, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted .webp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18235/">CVE-2017-18235</cve>
	<bugzilla href="https://bugzilla.suse.com/1085587">SUSE bug 1085587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334563" comment="exempi is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18236" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18236" ref_url="https://www.suse.com/security/cve/CVE-2017-18236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00041.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.4. The ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via a crafted .asf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18236/">CVE-2017-18236</cve>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085589">SUSE bug 1085589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334563" comment="exempi is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18237" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18237" ref_url="https://www.suse.com/security/cve/CVE-2017-18237" source="SUSE CVE"/>
    <description>
    An issue was discovered in Exempi before 2.4.3. The PostScript_Support::ConvertToDate function in XMPFiles/source/FormatSupport/PostScript_Support.cpp allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted .ps file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18237/">CVE-2017-18237</cve>
	<bugzilla href="https://bugzilla.suse.com/1085590">SUSE bug 1085590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334563" comment="exempi is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18238" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18238" ref_url="https://www.suse.com/security/cve/CVE-2017-18238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00041.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi before 2.4.4. The TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .qt file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18238/">CVE-2017-18238</cve>
	<bugzilla href="https://bugzilla.suse.com/1085583">SUSE bug 1085583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334563" comment="exempi is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18241" ref_url="https://www.suse.com/security/cve/CVE-2017-18241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
    <description>
    fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18241/">CVE-2017-18241</cve>
	<bugzilla href="https://bugzilla.suse.com/1086400">SUSE bug 1086400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18249" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
    <description>
    The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249</cve>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18250" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18250" ref_url="https://www.suse.com/security/cve/CVE-2017-18250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LogOpenCLBuildFailure in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18250/">CVE-2017-18250</cve>
	<bugzilla href="https://bugzilla.suse.com/1087039">SUSE bug 1087039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18251" ref_url="https://www.suse.com/security/cve/CVE-2017-18251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function ReadPCDImage in coders/pcd.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18251/">CVE-2017-18251</cve>
	<bugzilla href="https://bugzilla.suse.com/1087037">SUSE bug 1087037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18252" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18252" ref_url="https://www.suse.com/security/cve/CVE-2017-18252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18252/">CVE-2017-18252</cve>
	<bugzilla href="https://bugzilla.suse.com/1087033">SUSE bug 1087033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18253" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18253" ref_url="https://www.suse.com/security/cve/CVE-2017-18253" source="SUSE CVE"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LoadOpenCLDevices in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-18253/">CVE-2017-18253</cve>
	<bugzilla href="https://bugzilla.suse.com/1087030">SUSE bug 1087030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18254" ref_url="https://www.suse.com/security/cve/CVE-2017-18254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18254/">CVE-2017-18254</cve>
	<bugzilla href="https://bugzilla.suse.com/1087027">SUSE bug 1087027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18255" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
    <description>
    The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18257" ref_url="https://www.suse.com/security/cve/CVE-2017-18257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
    <description>
    The __get_data_block function in fs/f2fs/data.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow and loop) via crafted use of the open and fallocate system calls with an FS_IOC_FIEMAP ioctl.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18257/">CVE-2017-18257</cve>
	<bugzilla href="https://bugzilla.suse.com/1088241">SUSE bug 1088241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00026.html" source="SUSE-SU"/>
    <description>
    The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334490" comment="libxml2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18261" ref_url="https://www.suse.com/security/cve/CVE-2017-18261" source="SUSE CVE"/>
    <description>
    The arch_timer_reg_read_stable macro in arch/arm64/include/asm/arch_timer.h in the Linux kernel before 4.13 allows local users to cause a denial of service (infinite recursion) by writing to a file under /sys/kernel/debug in certain circumstances, as demonstrated by a scenario involving debugfs, ftrace, PREEMPT_TRACER, and FUNCTION_GRAPH_TRACER.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18261/">CVE-2017-18261</cve>
	<bugzilla href="https://bugzilla.suse.com/1090225">SUSE bug 1090225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18267" ref_url="https://www.suse.com/security/cve/CVE-2017-18267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7QPSEQIBQO7BALZOE3TN7IO7IMHK3Y/" source="SUSE-SU"/>
    <description>
    The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler through 0.64.0 allows remote attackers to cause a denial of service (infinite recursion) via a crafted PDF file, as demonstrated by pdftops.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18267/">CVE-2017-18267</cve>
	<bugzilla href="https://bugzilla.suse.com/1092945">SUSE bug 1092945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334072" comment="poppler is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00000.html" source="SUSE-SU"/>
    <description>
    An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<bugzilla href="https://bugzilla.suse.com/1094150">SUSE bug 1094150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519646" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519647" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519648" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519649" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519651" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519652" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530086" comment="glibc-profile-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530087" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519653" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550383" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550384" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550385" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550386" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550387" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550388" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550389" comment="glibc-profile-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550390" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550391" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594389" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550384" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594390" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550386" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594391" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550388" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594392" comment="glibc-profile-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550390" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594393" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18342</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342" source="SUSE CVE"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342</cve>
	<bugzilla href="https://bugzilla.suse.com/1099308">SUSE bug 1099308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164453">SUSE bug 1164453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334518" comment="python-PyYAML is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
    <description>
    The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent-&gt;sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102851">SUSE bug 1102851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103203">SUSE bug 1103203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103580">SUSE bug 1103580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536553" comment="kgraft-patch-4_4_103-92_53-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536552" comment="kgraft-patch-4_4_103-92_56-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536551" comment="kgraft-patch-4_4_114-92_64-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536550" comment="kgraft-patch-4_4_114-92_67-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536549" comment="kgraft-patch-4_4_74-92_38-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536548" comment="kgraft-patch-4_4_90-92_45-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536547" comment="kgraft-patch-4_4_90-92_50-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18509" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18509" ref_url="https://www.suse.com/security/cve/CVE-2017-18509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18509/">CVE-2017-18509</cve>
	<bugzilla href="https://bugzilla.suse.com/1145477">SUSE bug 1145477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<bugzilla href="https://bugzilla.suse.com/1146163">SUSE bug 1146163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<bugzilla href="https://bugzilla.suse.com/1149555">SUSE bug 1149555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18635</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18635" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18635" ref_url="https://www.suse.com/security/cve/CVE-2017-18635" source="SUSE CVE"/>
    <description>
    An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18635/">CVE-2017-18635</cve>
	<bugzilla href="https://bugzilla.suse.com/1152255">SUSE bug 1152255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339376" comment="novnc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18922" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0960-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0978-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18926" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007785.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUV22LIOLBYBTTH7G7HNENHDQDYBB4WP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1959-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXCAHUNNGDFKLSCGKPLLGBYG4BM2FW4J/" source="SUSE-SU"/>
    <description>
    raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926</cve>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178784">SUSE bug 1178784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178903">SUSE bug 1178903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183914">SUSE bug 1183914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531577" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551930" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596079" comment="libraptor2-0-2.0.15-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201720006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-20006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-20006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-20006" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-20006" ref_url="https://www.suse.com/security/cve/CVE-2017-20006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009355.html" source="SUSE-SU"/>
    <description>
    UnRAR 5.6.1.2 and 5.6.1.3 has a heap-based buffer overflow in Unpack::CopyString (called from Unpack::Unpack5 and CmdExtract::ExtractCurrentFile).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-20006/">CVE-2017-20006</cve>
	<bugzilla href="https://bugzilla.suse.com/1187974">SUSE bug 1187974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631579" comment="unrar-5.6.1-4.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2354" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2355" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2356" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2362" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2363" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2364" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2366" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. iCloud before 6.1.1 is affected. iTunes before 12.5.5 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2371" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. The issue involves the "WebKit" component, which allows remote attackers to launch popups via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2373" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<bugzilla href="https://bugzilla.suse.com/1024749">SUSE bug 1024749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2496" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2510" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that improperly interacts with pageshow events.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2518" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2518" ref_url="https://www.suse.com/security/cve/CVE-2017-2518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "SQLite" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted SQL statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2518/">CVE-2017-2518</cve>
	<bugzilla href="https://bugzilla.suse.com/1155787">SUSE bug 1155787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194085">SUSE bug 1194085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522390" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522391" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522392" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548838" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548839" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548840" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595281" comment="libsqlite3-0-3.8.10.2-9.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548839" comment="libsqlite3-0-32bit-3.8.10.2-9.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595282" comment="sqlite3-3.8.10.2-9.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2538" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538</cve>
	<bugzilla href="https://bugzilla.suse.com/1045460">SUSE bug 1045460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549781" comment="libjavascriptcoregtk-4_0-18-2.18.0-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549782" comment="libwebkit2gtk-4_0-37-2.18.0-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549783" comment="typelib-1_0-JavaScriptCore-4_0-2.18.0-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549784" comment="typelib-1_0-WebKit2-4_0-2.18.0-2.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549785" comment="webkit2gtk-4_0-injected-bundles-2.18.0-2.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2539" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2581" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2581" ref_url="https://www.suse.com/security/cve/CVE-2017-2581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1698-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00105.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in netpbm before 10.61. A maliciously crafted file could cause the application to crash or possibly allow code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2581/">CVE-2017-2581</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550352" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550353" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550354" comment="netpbm-10.66.3-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2583" ref_url="https://www.suse.com/security/cve/CVE-2017-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a "MOV SS, NULL selector" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2583/">CVE-2017-2583</cve>
	<bugzilla href="https://bugzilla.suse.com/1020602">SUSE bug 1020602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2584" ref_url="https://www.suse.com/security/cve/CVE-2017-2584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2584/">CVE-2017-2584</cve>
	<bugzilla href="https://bugzilla.suse.com/1019851">SUSE bug 1019851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2586" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2586" ref_url="https://www.suse.com/security/cve/CVE-2017-2586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1698-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00105.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2586/">CVE-2017-2586</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024292">SUSE bug 1024292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550352" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550353" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550354" comment="netpbm-10.66.3-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2587" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2587" ref_url="https://www.suse.com/security/cve/CVE-2017-2587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002953.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1698-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00105.html" source="SUSE-SU"/>
    <description>
    A memory allocation vulnerability was found in netpbm before 10.61. A maliciously crafted SVG file could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2587/">CVE-2017-2587</cve>
	<bugzilla href="https://bugzilla.suse.com/1024287">SUSE bug 1024287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024294">SUSE bug 1024294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550352" comment="libnetpbm11-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550353" comment="libnetpbm11-32bit-10.66.3-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550354" comment="netpbm-10.66.3-7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2592</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2592" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2592" ref_url="https://www.suse.com/security/cve/CVE-2017-2592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004896.html" source="SUSE-SU"/>
    <description>
    python-oslo-middleware before versions 3.8.1, 3.19.1, 3.23.1 is vulnerable to an information disclosure. Software using the CatchError class could include sensitive values in a traceback's error message. System users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2592/">CVE-2017-2592</cve>
	<bugzilla href="https://bugzilla.suse.com/1022043">SUSE bug 1022043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022152">SUSE bug 1022152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594680" comment="python-oslo.cache-1.14.1-3.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594681" comment="python-oslo.concurrency-3.14.1-3.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594682" comment="python-oslo.db-4.13.6-3.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594683" comment="python-oslo.log-3.16.1-3.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594684" comment="python-oslo.messaging-5.10.2-3.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594685" comment="python-oslo.middleware-3.19.1-4.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594686" comment="python-oslo.serialization-2.13.2-3.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594687" comment="python-oslo.service-1.16.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594688" comment="python-oslo.utils-3.16.1-3.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594689" comment="python-oslo.versionedobjects-1.17.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594690" comment="python-oslo.vmware-2.14.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594691" comment="python-oslotest-2.10.1-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2596" ref_url="https://www.suse.com/security/cve/CVE-2017-2596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel through 4.9.8 improperly emulates the VMXON instruction, which allows KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2596/">CVE-2017-2596</cve>
	<bugzilla href="https://bugzilla.suse.com/1022785">SUSE bug 1022785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2615" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550005" comment="xen-doc-html-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550006" comment="xen-tools-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550007" comment="xen-tools-domU-4.7.1_06-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0554-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0866-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00002.html" source="SUSE-SU"/>
    <description>
    A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123789">SUSE bug 1123789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549993" comment="libblkid1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549994" comment="libblkid1-32bit-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549995" comment="libfdisk1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549996" comment="libmount1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549997" comment="libmount1-32bit-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549998" comment="libsmartcols1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549999" comment="libuuid1-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550000" comment="libuuid1-32bit-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550001" comment="python-libmount-2.28-44.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550002" comment="util-linux-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518461" comment="util-linux-lang-2.28-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550003" comment="util-linux-systemd-2.28-44.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550004" comment="uuidd-2.28-44.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333935" comment="coreutils is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0944-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00009.html" source="SUSE-SU"/>
    <description>
    Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<bugzilla href="https://bugzilla.suse.com/1027147">SUSE bug 1027147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036283">SUSE bug 1036283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054017">SUSE bug 1054017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009562140" comment="libdcerpc-atsvc0-4.2.4-28.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562141" comment="libdcerpc-binding0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562142" comment="libdcerpc-binding0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562143" comment="libdcerpc0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562144" comment="libdcerpc0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562145" comment="libndr-krb5pac0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562146" comment="libndr-krb5pac0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562147" comment="libndr-nbt0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562148" comment="libndr-nbt0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562149" comment="libndr-standard0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562150" comment="libndr-standard0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562151" comment="libndr0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562152" comment="libndr0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562153" comment="libnetapi0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562154" comment="libnetapi0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562155" comment="libsamba-credentials0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562156" comment="libsamba-credentials0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562157" comment="libsamba-errors0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562158" comment="libsamba-errors0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562159" comment="libsamba-hostconfig0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562160" comment="libsamba-hostconfig0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562161" comment="libsamba-passdb0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562162" comment="libsamba-passdb0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562163" comment="libsamba-util0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562164" comment="libsamba-util0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562165" comment="libsamdb0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562166" comment="libsamdb0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562167" comment="libsmbclient0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562168" comment="libsmbclient0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562169" comment="libsmbconf0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562170" comment="libsmbconf0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562171" comment="libsmbldap0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562172" comment="libsmbldap0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562173" comment="libtevent-util0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562174" comment="libtevent-util0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562175" comment="libwbclient0-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562176" comment="libwbclient0-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562177" comment="samba-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562178" comment="samba-client-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562179" comment="samba-client-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562086" comment="samba-doc-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562180" comment="samba-libs-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562181" comment="samba-libs-32bit-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562182" comment="samba-winbind-4.4.2-38.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562183" comment="samba-winbind-32bit-4.4.2-38.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518464" comment="xen-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550005" comment="xen-doc-html-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518465" comment="xen-libs-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518466" comment="xen-libs-32bit-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550006" comment="xen-tools-4.7.1_06-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550007" comment="xen-tools-domU-4.7.1_06-31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2624" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1610-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00070.html" source="SUSE-SU"/>
    <description>
    It was found that xorg-x11-server before 1.19.0 including uses memcmp() to check the received MIT cookie against a series of valid cookies. If the cookie is correct, it is allowed to attach to the Xorg session. Since most memcmp() implementations return after an invalid byte is seen, this causes a time difference between a valid and invalid byte, which could allow an efficient brute force attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<bugzilla href="https://bugzilla.suse.com/1025029">SUSE bug 1025029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035283">SUSE bug 1035283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549375" comment="xorg-x11-server-7.6_1.18.3-71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549376" comment="xorg-x11-server-extra-7.6_1.18.3-71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003696.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1802-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00031.html" source="SUSE-SU"/>
    <description>
    It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<bugzilla href="https://bugzilla.suse.com/1025046">SUSE bug 1025046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123802">SUSE bug 1123802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/815650">SUSE bug 815650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549464" comment="libXdmcp6-1.1.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549465" comment="libXdmcp6-32bit-1.1.1-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334055" comment="xorg-x11 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003695.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1801-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00030.html" source="SUSE-SU"/>
    <description>
    It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<bugzilla href="https://bugzilla.suse.com/1025068">SUSE bug 1025068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025639">SUSE bug 1025639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048274">SUSE bug 1048274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123800">SUSE bug 1123800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549455" comment="libICE6-1.0.8-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549456" comment="libICE6-32bit-1.0.8-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334055" comment="xorg-x11 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2628" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2628" ref_url="https://www.suse.com/security/cve/CVE-2017-2628" source="SUSE CVE"/>
    <description>
    curl, as shipped in Red Hat Enterprise Linux 6 before version 7.19.7-53, did not correctly backport the fix for CVE-2015-3148 because it did not reflect the fact that the HAVE_GSSAPI define was meanwhile substituted by USE_HTTP_NEGOTIATE. This issue was introduced in RHEL 6.7 and affects RHEL 6 curl only.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2628/">CVE-2017-2628</cve>
	<bugzilla href="https://bugzilla.suse.com/1092962">SUSE bug 1092962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2629" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2629" ref_url="https://www.suse.com/security/cve/CVE-2017-2629" source="SUSE CVE"/>
    <description>
    curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2629/">CVE-2017-2629</cve>
	<bugzilla href="https://bugzilla.suse.com/1025379">SUSE bug 1025379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042181">SUSE bug 1042181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2630" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630" source="SUSE CVE"/>
    <description>
    A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630</cve>
	<bugzilla href="https://bugzilla.suse.com/1025396">SUSE bug 1025396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2633" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00022.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026636">SUSE bug 1026636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2634" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2634" ref_url="https://www.suse.com/security/cve/CVE-2017-2634" source="SUSE CVE"/>
    <description>
    It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2634/">CVE-2017-2634</cve>
	<bugzilla href="https://bugzilla.suse.com/1026830">SUSE bug 1026830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2635" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635" source="SUSE CVE"/>
    <description>
    A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635</cve>
	<bugzilla href="https://bugzilla.suse.com/1027075">SUSE bug 1027075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333954" comment="libvirt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2636" ref_url="https://www.suse.com/security/cve/CVE-2017-2636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0866-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2636/">CVE-2017-2636</cve>
	<bugzilla href="https://bugzilla.suse.com/1027565">SUSE bug 1027565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027575">SUSE bug 1027575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028372">SUSE bug 1028372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550103" comment="kernel-default-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550104" comment="kernel-default-base-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550105" comment="kernel-default-devel-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550106" comment="kernel-default-man-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518541" comment="kernel-devel-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518542" comment="kernel-macros-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518543" comment="kernel-source-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550107" comment="kernel-syms-4.4.49-92.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2647" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647</cve>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2669" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2669" ref_url="https://www.suse.com/security/cve/CVE-2017-2669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002859.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1807-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2669/">CVE-2017-2669</cve>
	<bugzilla href="https://bugzilla.suse.com/1032248">SUSE bug 1032248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532899" comment="dovecot-2.2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550205" comment="dovecot22-2.2.29.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550206" comment="dovecot22-backend-mysql-2.2.29.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550207" comment="dovecot22-backend-pgsql-2.2.29.1-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550208" comment="dovecot22-backend-sqlite-2.2.29.1-11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2810</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2810" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2810" ref_url="https://www.suse.com/security/cve/CVE-2017-2810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1689-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00098.html" source="SUSE-SU"/>
    <description>
    An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2810/">CVE-2017-2810</cve>
	<bugzilla href="https://bugzilla.suse.com/1044329">SUSE bug 1044329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525122" comment="python-tablib-0.9.11-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2814" ref_url="https://www.suse.com/security/cve/CVE-2017-2814" source="SUSE CVE"/>
    <description>
    An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted pdf can cause an image resizing after allocation has already occurred, resulting in heap corruption which can lead to code execution. An attacker controlled PDF file can be used to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2814/">CVE-2017-2814</cve>
	<bugzilla href="https://bugzilla.suse.com/1047909">SUSE bug 1047909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2818" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2818" ref_url="https://www.suse.com/security/cve/CVE-2017-2818" source="SUSE CVE"/>
    <description>
    An exploitable heap overflow vulnerability exists in the image rendering functionality of Poppler 0.53.0. A specifically crafted PDF can cause an overly large number of color components during image rendering, resulting in heap corruption. An attacker controlled PDF file can be used to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2818/">CVE-2017-2818</cve>
	<bugzilla href="https://bugzilla.suse.com/1047950">SUSE bug 1047950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2820" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2820" ref_url="https://www.suse.com/security/cve/CVE-2017-2820" source="SUSE CVE"/>
    <description>
    An exploitable integer overflow vulnerability exists in the JPEG 2000 image parsing functionality of freedesktop.org Poppler 0.53.0. A specially crafted PDF file can lead to an integer overflow causing out of bounds memory overwrite on the heap resulting in potential arbitrary code execution. To trigger this vulnerability, a victim must open the malicious PDF in an application using this library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2820/">CVE-2017-2820</cve>
	<bugzilla href="https://bugzilla.suse.com/1047949">SUSE bug 1047949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334072" comment="poppler is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549603" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549604" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549605" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549606" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549607" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<bugzilla href="https://bugzilla.suse.com/1048289">SUSE bug 1048289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048544">SUSE bug 1048544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549603" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549604" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549605" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549606" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549607" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2204-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00042.html" source="SUSE-SU"/>
    <description>
    An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<bugzilla href="https://bugzilla.suse.com/1052916">SUSE bug 1052916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549535" comment="libsoup-2_4-1-2.54.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549536" comment="libsoup-2_4-1-32bit-2.54.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518003" comment="libsoup-lang-2.54.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549537" comment="typelib-1_0-Soup-2_4-2.54.1-5.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551267" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551268" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551269" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595173" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551268" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595174" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2888" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2888" ref_url="https://www.suse.com/security/cve/CVE-2017-2888" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2895-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00113.html" source="SUSE-SU"/>
    <description>
    An exploitable integer overflow vulnerability exists when creating a new RGB Surface in SDL 2.0.5. A specially crafted file can cause an integer overflow resulting in too little memory being allocated which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2888/">CVE-2017-2888</cve>
	<bugzilla href="https://bugzilla.suse.com/1062777">SUSE bug 1062777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062784">SUSE bug 1062784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334058" comment="SDL is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002674.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0620-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00012.html" source="SUSE-SU"/>
    <description>
    Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -&gt; 9.9.9-S7, 9.9.3 -&gt; 9.9.9-P5, 9.9.10b1, 9.10.0 -&gt; 9.10.4-P5, 9.10.5b1, 9.11.0 -&gt; 9.11.0-P2, 9.11.1b1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550013" comment="bind-9.9.9P1-56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550014" comment="bind-chrootenv-9.9.9P1-56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532737" comment="bind-doc-9.9.9P1-56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550015" comment="bind-libs-9.9.9P1-56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547858" comment="bind-libs-32bit-9.9.9P1-56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550016" comment="bind-utils-9.9.9P1-56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -&gt; 9.8.8-P1, 9.9.0 -&gt; 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.0 -&gt; 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0 -&gt; 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, 9.9.3-S1 -&gt; 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550136" comment="bind-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550137" comment="bind-chrootenv-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532836" comment="bind-doc-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550138" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547968" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550139" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
    <description>
    Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. Affects BIND 9.9.9-P6, 9.9.10b1-&gt;9.9.10rc1, 9.10.4-P6, 9.10.5b1-&gt;9.10.5rc1, 9.11.0-P3, 9.11.1b1-&gt;9.11.1rc1, and 9.9.9-S8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033467">SUSE bug 1033467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034162">SUSE bug 1034162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550136" comment="bind-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550137" comment="bind-chrootenv-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532836" comment="bind-doc-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550138" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547968" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550139" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3138" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00022.html" source="SUSE-SU"/>
    <description>
    named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has created a situation under which some versions of named can be caused to exit with a REQUIRE assertion failure if they are sent a null command string. Affects BIND 9.9.9-&gt;9.9.9-P7, 9.9.10b1-&gt;9.9.10rc2, 9.10.4-&gt;9.10.4-P7, 9.10.5b1-&gt;9.10.5rc2, 9.11.0-&gt;9.11.0-P4, 9.11.1b1-&gt;9.11.1rc2, 9.9.9-S1-&gt;9.9.9-S9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033461">SUSE bug 1033461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033468">SUSE bug 1033468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550136" comment="bind-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550137" comment="bind-chrootenv-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532836" comment="bind-doc-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550138" comment="bind-libs-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547968" comment="bind-libs-32bit-9.9.9P1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550139" comment="bind-utils-9.9.9P1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3140" ref_url="https://www.suse.com/security/cve/CVE-2017-3140" source="SUSE CVE"/>
    <description>
    If named is configured to use Response Policy Zones (RPZ) an error processing some rule types can lead to a condition where BIND will endlessly loop while handling a query. Affects BIND 9.9.10, 9.10.5, 9.11.0-&gt;9.11.1, 9.9.10-S1, 9.10.5-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3140/">CVE-2017-3140</cve>
	<bugzilla href="https://bugzilla.suse.com/1044225">SUSE bug 1044225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044226">SUSE bug 1044226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3141" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3141" ref_url="https://www.suse.com/security/cve/CVE-2017-3141" source="SUSE CVE"/>
    <description>
    The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2-&gt;9.2.9, 9.3.2-P1-&gt;9.3.6, 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10, 9.10.0-&gt;9.10.5, 9.11.0-&gt;9.11.1, 9.9.3-S1-&gt;9.9.10-S1, 9.10.5-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3141/">CVE-2017-3141</cve>
	<bugzilla href="https://bugzilla.suse.com/1044225">SUSE bug 1044225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044226">SUSE bug 1044226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="TID7021041" ref_url="https://www.suse.com/support/kb/doc/?id=7021041" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00007.html" source="SUSE-SU"/>
    <description>
    An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10-P1, 9.10.0-&gt;9.10.5-P1, 9.11.0-&gt;9.11.1-P1, 9.9.3-S1-&gt;9.9.10-S2, 9.10.5-S1-&gt;9.10.5-S2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549405" comment="bind-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549406" comment="bind-chrootenv-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532221" comment="bind-doc-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549407" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547561" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549408" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1736-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="TID7021041" ref_url="https://www.suse.com/support/kb/doc/?id=7021041" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00007.html" source="SUSE-SU"/>
    <description>
    An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0-&gt;9.8.8, 9.9.0-&gt;9.9.10-P1, 9.10.0-&gt;9.10.5-P1, 9.11.0-&gt;9.11.1-P1, 9.9.3-S1-&gt;9.9.10-S2, 9.10.5-S1-&gt;9.10.5-S2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<bugzilla href="https://bugzilla.suse.com/1024130">SUSE bug 1024130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046554">SUSE bug 1046554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046555">SUSE bug 1046555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549405" comment="bind-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549406" comment="bind-chrootenv-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532221" comment="bind-doc-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549407" comment="bind-libs-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547561" comment="bind-libs-32bit-9.9.9P1-62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549408" comment="bind-utils-9.9.9P1-62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0537-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00101.html" source="SUSE-SU"/>
    <description>
    A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older versions may also be affected but are well beyond their end-of-life (EOL). Releases prior to 4.1.0 have not been tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076119">SUSE bug 1076119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550733" comment="dhcp-4.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550734" comment="dhcp-client-4.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550735" comment="dhcp-relay-4.3.3-10.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550736" comment="dhcp-server-4.3.3-10.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00105.html" source="SUSE-SU"/>
    <description>
    BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<bugzilla href="https://bugzilla.suse.com/1076118">SUSE bug 1076118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101131">SUSE bug 1101131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550579" comment="bind-9.9.9P1-63.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550580" comment="bind-chrootenv-9.9.9P1-63.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533101" comment="bind-doc-9.9.9P1-63.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550581" comment="bind-libs-9.9.9P1-63.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548322" comment="bind-libs-32bit-9.9.9P1-63.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550582" comment="bind-utils-9.9.9P1-63.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3167" ref_url="https://www.suse.com/security/cve/CVE-2017-3167" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1803-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00032.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3167/">CVE-2017-3167</cve>
	<bugzilla href="https://bugzilla.suse.com/1045065">SUSE bug 1045065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549397" comment="apache2-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532211" comment="apache2-doc-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549398" comment="apache2-example-pages-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549399" comment="apache2-prefork-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549400" comment="apache2-utils-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549401" comment="apache2-worker-2.4.23-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3169" ref_url="https://www.suse.com/security/cve/CVE-2017-3169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1803-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00032.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3169/">CVE-2017-3169</cve>
	<bugzilla href="https://bugzilla.suse.com/1045062">SUSE bug 1045062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549397" comment="apache2-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532211" comment="apache2-doc-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549398" comment="apache2-example-pages-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549399" comment="apache2-prefork-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549400" comment="apache2-utils-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549401" comment="apache2-worker-2.4.23-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3225" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3225" ref_url="https://www.suse.com/security/cve/CVE-2017-3225" source="SUSE CVE"/>
    <description>
    Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3225/">CVE-2017-3225</cve>
	<bugzilla href="https://bugzilla.suse.com/1058437">SUSE bug 1058437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334115" comment="u-boot is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3226" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3226" ref_url="https://www.suse.com/security/cve/CVE-2017-3226" source="SUSE CVE"/>
    <description>
    Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables from disk as the encrypted disk image is processed. An attacker with physical access to the device can manipulate the encrypted environment data to include a crafted two-byte sequence which triggers an error in environment variable parsing. This error condition is improperly handled by Das U-Boot, resulting in an immediate process termination with a debugging message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3226/">CVE-2017-3226</cve>
	<bugzilla href="https://bugzilla.suse.com/1058438">SUSE bug 1058438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334115" comment="u-boot is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020882">SUSE bug 1020882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020891">SUSE bug 1020891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020877">SUSE bug 1020877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3251" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3251" ref_url="https://www.suse.com/security/cve/CVE-2017-3251" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.9 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3251/">CVE-2017-3251</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020888">SUSE bug 1020888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.8 (Integrity impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3256" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3256" ref_url="https://www.suse.com/security/cve/CVE-2017-3256" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3256/">CVE-2017-3256</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020883">SUSE bug 1020883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3257" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.6.34 and earlier5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020878">SUSE bug 1020878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020875">SUSE bug 1020875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3259" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3259" ref_url="https://www.suse.com/security/cve/CVE-2017-3259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 3.7 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3259/">CVE-2017-3259</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020885">SUSE bug 1020885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549986" comment="java-1_7_0-openjdk-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549987" comment="java-1_7_0-openjdk-demo-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549988" comment="java-1_7_0-openjdk-devel-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549989" comment="java-1_7_0-openjdk-headless-1.7.0.131-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3273" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3273" ref_url="https://www.suse.com/security/cve/CVE-2017-3273" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3273/">CVE-2017-3273</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020876">SUSE bug 1020876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<bugzilla href="https://bugzilla.suse.com/1020905">SUSE bug 1020905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547814" comment="java-1_8_0-ibm-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547815" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547816" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.0-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549756" comment="java-1_8_0-openjdk-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549757" comment="java-1_8_0-openjdk-demo-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549758" comment="java-1_8_0-openjdk-devel-1.8.0.121-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549759" comment="java-1_8_0-openjdk-headless-1.8.0.121-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020884">SUSE bug 1020884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<bugzilla href="https://bugzilla.suse.com/1022428">SUSE bug 1022428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550229" comment="libmysqlclient18-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548048" comment="libmysqlclient18-32bit-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550230" comment="mariadb-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550231" comment="mariadb-client-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550232" comment="mariadb-errormessages-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550233" comment="mariadb-tools-10.0.30-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3305" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3305" ref_url="https://www.suse.com/security/cve/CVE-2017-3305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.5.55 and earlier and 5.6.35 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue allows man-in-the-middle attackers to hijack the authentication of users by leveraging incorrect ordering of security parameter verification in a client, aka, "The Riddle".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3305/">CVE-2017-3305</cve>
	<bugzilla href="https://bugzilla.suse.com/1029396">SUSE bug 1029396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037590">SUSE bug 1037590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924663">SUSE bug 924663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549504" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547567" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549505" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549506" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549507" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549508" comment="mariadb-tools-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549504" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547567" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549505" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549506" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549507" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549508" comment="mariadb-tools-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020873">SUSE bug 1020873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/998309">SUSE bug 998309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1311-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00001.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020890">SUSE bug 1020890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034911">SUSE bug 1034911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550229" comment="libmysqlclient18-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548048" comment="libmysqlclient18-32bit-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550230" comment="mariadb-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550231" comment="mariadb-client-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550232" comment="mariadb-errormessages-10.0.30-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550233" comment="mariadb-tools-10.0.30-25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020894">SUSE bug 1020894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0411-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0486-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0618-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00003.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020896">SUSE bug 1020896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549926" comment="libmysqlclient18-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547795" comment="libmysqlclient18-32bit-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549927" comment="mariadb-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549928" comment="mariadb-client-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549929" comment="mariadb-errormessages-10.0.29-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549930" comment="mariadb-tools-10.0.29-22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3319" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3319" ref_url="https://www.suse.com/security/cve/CVE-2017-3319" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: X Plugin). Supported versions that are affected are 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS v3.0 Base Score 3.1 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3319/">CVE-2017-3319</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020898">SUSE bug 1020898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3320" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3320" ref_url="https://www.suse.com/security/cve/CVE-2017-3320" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS v3.0 Base Score 2.4 (Confidentiality impacts).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3320/">CVE-2017-3320</cve>
	<bugzilla href="https://bugzilla.suse.com/1020868">SUSE bug 1020868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020901">SUSE bug 1020901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3331</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3331" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3331" ref_url="https://www.suse.com/security/cve/CVE-2017-3331" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). The supported version that is affected is 5.7.11 to 5.7.17. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3331/">CVE-2017-3331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3450</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3450" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3450" ref_url="https://www.suse.com/security/cve/CVE-2017-3450" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3450/">CVE-2017-3450</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3452</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3452" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3452" ref_url="https://www.suse.com/security/cve/CVE-2017-3452" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.35 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3452/">CVE-2017-3452</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549504" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547567" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549505" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549506" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549507" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549508" comment="mariadb-tools-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3455</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3455" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3455" ref_url="https://www.suse.com/security/cve/CVE-2017-3455" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3455/">CVE-2017-3455</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549504" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547567" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549505" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549506" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549507" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549508" comment="mariadb-tools-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3457</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3457" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3457" ref_url="https://www.suse.com/security/cve/CVE-2017-3457" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3457/">CVE-2017-3457</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3458</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3458" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3458" ref_url="https://www.suse.com/security/cve/CVE-2017-3458" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3458/">CVE-2017-3458</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3459</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3459" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3459" ref_url="https://www.suse.com/security/cve/CVE-2017-3459" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3459/">CVE-2017-3459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3460</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3460" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3460" ref_url="https://www.suse.com/security/cve/CVE-2017-3460" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Audit Plug-in). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3460/">CVE-2017-3460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048715">SUSE bug 1048715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549504" comment="libmysqlclient18-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547567" comment="libmysqlclient18-32bit-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549505" comment="mariadb-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549506" comment="mariadb-client-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549507" comment="mariadb-errormessages-10.0.31-29.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549508" comment="mariadb-tools-10.0.31-29.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3465</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3465" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3465" ref_url="https://www.suse.com/security/cve/CVE-2017-3465" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.7.17 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3465/">CVE-2017-3465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3467</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3467" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3467" ref_url="https://www.suse.com/security/cve/CVE-2017-3467" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: C API). Supported versions that are affected are 5.7.17 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3467/">CVE-2017-3467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550301" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550302" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550303" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550304" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550301" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550302" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550303" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550304" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3512" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550301" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550302" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550303" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550304" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3514" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550301" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550302" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550303" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550304" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550301" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550302" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550303" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550304" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3529</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3529" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3529" ref_url="https://www.suse.com/security/cve/CVE-2017-3529" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: UDF). Supported versions that are affected are 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3529/">CVE-2017-3529</cve>
	<bugzilla href="https://bugzilla.suse.com/1049393">SUSE bug 1049393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550301" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550302" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550303" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550304" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<bugzilla href="https://bugzilla.suse.com/1005522">SUSE bug 1005522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550301" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550302" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550303" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550304" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1429-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<bugzilla href="https://bugzilla.suse.com/1034849">SUSE bug 1034849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550287" comment="java-1_7_0-openjdk-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550288" comment="java-1_7_0-openjdk-demo-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550289" comment="java-1_7_0-openjdk-devel-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550290" comment="java-1_7_0-openjdk-headless-1.7.0.141-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545406" comment="java-1_7_1-ibm-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534521" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545407" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009534524" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.5-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548074" comment="java-1_8_0-ibm-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548075" comment="java-1_8_0-ibm-alsa-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548076" comment="java-1_8_0-ibm-plugin-1.8.0_sr4.5-29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550301" comment="java-1_8_0-openjdk-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550302" comment="java-1_8_0-openjdk-demo-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550303" comment="java-1_8_0-openjdk-devel-1.8.0.131-26.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550304" comment="java-1_8_0-openjdk-headless-1.8.0.131-26.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3599</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3599" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3599" ref_url="https://www.suse.com/security/cve/CVE-2017-3599" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00015.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). NOTE: the previous information is from the April 2017 CPU. Oracle has not commented on third-party claims that this issue is an integer overflow in sql/auth/sql_authentication.cc which allows remote attackers to cause a denial of service via a crafted authentication packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3599/">CVE-2017-3599</cve>
	<bugzilla href="https://bugzilla.suse.com/1034850">SUSE bug 1034850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3633</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3633" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3633" ref_url="https://www.suse.com/security/cve/CVE-2017-3633" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Memcached to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-3633/">CVE-2017-3633</cve>
	<bugzilla href="https://bugzilla.suse.com/1049394">SUSE bug 1049394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3634</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3634" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3634" ref_url="https://www.suse.com/security/cve/CVE-2017-3634" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3634/">CVE-2017-3634</cve>
	<bugzilla href="https://bugzilla.suse.com/1049396">SUSE bug 1049396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<bugzilla href="https://bugzilla.suse.com/1049399">SUSE bug 1049399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550956" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550957" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550958" comment="mariadb-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550959" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550960" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550961" comment="mariadb-tools-10.0.32-29.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3637</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3637" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3637" ref_url="https://www.suse.com/security/cve/CVE-2017-3637" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: X Plugin). Supported versions that are affected are 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3637/">CVE-2017-3637</cve>
	<bugzilla href="https://bugzilla.suse.com/1049400">SUSE bug 1049400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3638</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3638" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3638" ref_url="https://www.suse.com/security/cve/CVE-2017-3638" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3638/">CVE-2017-3638</cve>
	<bugzilla href="https://bugzilla.suse.com/1049401">SUSE bug 1049401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3639</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3639" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3639" ref_url="https://www.suse.com/security/cve/CVE-2017-3639" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3639/">CVE-2017-3639</cve>
	<bugzilla href="https://bugzilla.suse.com/1049402">SUSE bug 1049402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3640</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3640" ref_url="https://www.suse.com/security/cve/CVE-2017-3640" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3640/">CVE-2017-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/1049403">SUSE bug 1049403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<bugzilla href="https://bugzilla.suse.com/1049404">SUSE bug 1049404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550956" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550957" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550958" comment="mariadb-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550959" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550960" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550961" comment="mariadb-tools-10.0.32-29.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3642</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3642" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3642" ref_url="https://www.suse.com/security/cve/CVE-2017-3642" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3642/">CVE-2017-3642</cve>
	<bugzilla href="https://bugzilla.suse.com/1049405">SUSE bug 1049405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3643</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3643" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3643" ref_url="https://www.suse.com/security/cve/CVE-2017-3643" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3643/">CVE-2017-3643</cve>
	<bugzilla href="https://bugzilla.suse.com/1049406">SUSE bug 1049406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3644</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3644" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3644" ref_url="https://www.suse.com/security/cve/CVE-2017-3644" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3644/">CVE-2017-3644</cve>
	<bugzilla href="https://bugzilla.suse.com/1049407">SUSE bug 1049407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3645</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3645" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3645" ref_url="https://www.suse.com/security/cve/CVE-2017-3645" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3645/">CVE-2017-3645</cve>
	<bugzilla href="https://bugzilla.suse.com/1049408">SUSE bug 1049408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3646</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3646" ref_url="https://www.suse.com/security/cve/CVE-2017-3646" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: X Plugin). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3646/">CVE-2017-3646</cve>
	<bugzilla href="https://bugzilla.suse.com/1049409">SUSE bug 1049409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3647</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3647" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3647" ref_url="https://www.suse.com/security/cve/CVE-2017-3647" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3647/">CVE-2017-3647</cve>
	<bugzilla href="https://bugzilla.suse.com/1049410">SUSE bug 1049410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3648</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3648" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3648" ref_url="https://www.suse.com/security/cve/CVE-2017-3648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3648/">CVE-2017-3648</cve>
	<bugzilla href="https://bugzilla.suse.com/1049411">SUSE bug 1049411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3649</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3649" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3649" ref_url="https://www.suse.com/security/cve/CVE-2017-3649" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3649/">CVE-2017-3649</cve>
	<bugzilla href="https://bugzilla.suse.com/1049412">SUSE bug 1049412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3650</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3650" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3650" ref_url="https://www.suse.com/security/cve/CVE-2017-3650" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: C API). Supported versions that are affected are 5.7.18 and earlier. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3650/">CVE-2017-3650</cve>
	<bugzilla href="https://bugzilla.suse.com/1049414">SUSE bug 1049414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3651</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3651" ref_url="https://www.suse.com/security/cve/CVE-2017-3651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3651/">CVE-2017-3651</cve>
	<bugzilla href="https://bugzilla.suse.com/1049415">SUSE bug 1049415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3652</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3652" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3652" ref_url="https://www.suse.com/security/cve/CVE-2017-3652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3652/">CVE-2017-3652</cve>
	<bugzilla href="https://bugzilla.suse.com/1049416">SUSE bug 1049416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334203" comment="mariadb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0088-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<bugzilla href="https://bugzilla.suse.com/1049417">SUSE bug 1049417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054591">SUSE bug 1054591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076506">SUSE bug 1076506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550956" comment="libmysqlclient18-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550957" comment="libmysqlclient18-32bit-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550958" comment="mariadb-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550959" comment="mariadb-client-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550960" comment="mariadb-errormessages-10.0.32-29.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550961" comment="mariadb-tools-10.0.32-29.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3730" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3730" ref_url="https://www.suse.com/security/cve/CVE-2017-3730" source="SUSE CVE"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
    <description>
    In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3730/">CVE-2017-3730</cve>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022084">SUSE bug 1022084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0487-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064118">SUSE bug 1064118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541126" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549976" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549977" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549978" comment="libopenssl1_0_0-hmac-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549979" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549980" comment="openssl-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532709" comment="openssl-doc-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0481-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0527-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0941-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2011-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022086">SUSE bug 1022086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049418">SUSE bug 1049418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049421">SUSE bug 1049421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541126" comment="libopenssl-devel-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549976" comment="libopenssl1_0_0-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549977" comment="libopenssl1_0_0-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549978" comment="libopenssl1_0_0-hmac-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549979" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549980" comment="openssl-1.0.2j-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532709" comment="openssl-doc-1.0.2j-59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3733" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3733" ref_url="https://www.suse.com/security/cve/CVE-2017-3733" source="SUSE CVE"/>
    <description>
    During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3733/">CVE-2017-3733</cve>
	<bugzilla href="https://bugzilla.suse.com/1025661">SUSE bug 1025661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064200">SUSE bug 1064200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2968-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2981-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7022367" ref_url="https://www.suse.com/support/kb/doc/?id=7022367" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3192-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00113.html" source="SUSE-SU"/>
    <description>
    While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594575" comment="nodejs6-6.12.2-11.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541071" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549895" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549896" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549897" comment="libopenssl1_0_0-hmac-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549898" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549899" comment="openssl-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532635" comment="openssl-doc-1.0.2j-60.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7022367" ref_url="https://www.suse.com/support/kb/doc/?id=7022367" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3192-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00113.html" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541071" comment="libopenssl-devel-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549895" comment="libopenssl1_0_0-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549896" comment="libopenssl1_0_0-32bit-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549897" comment="libopenssl1_0_0-hmac-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549898" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549899" comment="openssl-1.0.2j-60.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532635" comment="openssl-doc-1.0.2j-60.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594575" comment="nodejs6-6.12.2-11.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="TID7022464" ref_url="https://www.suse.com/support/kb/doc/?id=7022464" source="SUSE-SU"/>
		<reference ref_id="TID7022626" ref_url="https://www.suse.com/support/kb/doc/?id=7022626" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00069.html" source="SUSE-SU"/>
    <description>
    OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737</cve>
	<bugzilla href="https://bugzilla.suse.com/1071905">SUSE bug 1071905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072322">SUSE bug 1072322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541101" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549931" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549932" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549933" comment="libopenssl1_0_0-hmac-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549934" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549935" comment="openssl-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532667" comment="openssl-doc-1.0.2j-60.20.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7022464" ref_url="https://www.suse.com/support/kb/doc/?id=7022464" source="SUSE-SU"/>
		<reference ref_id="TID7022627" ref_url="https://www.suse.com/support/kb/doc/?id=7022627" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0029-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0315-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00113.html" source="SUSE-SU"/>
    <description>
    There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097757">SUSE bug 1097757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594575" comment="nodejs6-6.12.2-11.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541101" comment="libopenssl-devel-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549931" comment="libopenssl1_0_0-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549932" comment="libopenssl1_0_0-32bit-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549933" comment="libopenssl1_0_0-hmac-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549934" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549935" comment="openssl-1.0.2j-60.20.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532667" comment="openssl-doc-1.0.2j-60.20.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20174965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-4965</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-4965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4965" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-4965" ref_url="https://www.suse.com/security/cve/CVE-2017-4965" source="SUSE CVE"/>
    <description>
    An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-4965/">CVE-2017-4965</cve>
	<bugzilla href="https://bugzilla.suse.com/1037777">SUSE bug 1037777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20174967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-4967</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-4967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4967" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-4967" ref_url="https://www.suse.com/security/cve/CVE-2017-4967" source="SUSE CVE"/>
    <description>
    An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. Several forms in the RabbitMQ management UI are vulnerable to XSS attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-4967/">CVE-2017-4967</cve>
	<bugzilla href="https://bugzilla.suse.com/1037777">SUSE bug 1037777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1390-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00079.html" source="SUSE-SU"/>
    <description>
    The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<bugzilla href="https://bugzilla.suse.com/1028848">SUSE bug 1028848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028875">SUSE bug 1028875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550224" comment="libxslt-tools-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550225" comment="libxslt1-1.1.28-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548046" comment="libxslt1-32bit-1.1.28-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5031" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5031" ref_url="https://www.suse.com/security/cve/CVE-2017-5031" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0740-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00016.html" source="SUSE-SU"/>
    <description>
    A use after free in ANGLE in Google Chrome prior to 57.0.2987.98 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5031/">CVE-2017-5031</cve>
	<bugzilla href="https://bugzilla.suse.com/1028848">SUSE bug 1028848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028875">SUSE bug 1028875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5123" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5123" ref_url="https://www.suse.com/security/cve/CVE-2017-5123" source="SUSE CVE"/>
    <description>
    Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5123/">CVE-2017-5123</cve>
	<bugzilla href="https://bugzilla.suse.com/1062473">SUSE bug 1062473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122971">SUSE bug 1122971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5130" ref_url="https://www.suse.com/security/cve/CVE-2017-5130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0418-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00036.html" source="SUSE-SU"/>
    <description>
    An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5130/">CVE-2017-5130</cve>
	<bugzilla href="https://bugzilla.suse.com/1064066">SUSE bug 1064066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064089">SUSE bug 1064089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078806">SUSE bug 1078806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123129">SUSE bug 1123129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550651" comment="libxml2-2-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550652" comment="libxml2-2-32bit-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533151" comment="libxml2-doc-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550653" comment="libxml2-tools-2.9.4-46.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550654" comment="python-libxml2-2.9.4-46.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0428-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The base64decode function in base64.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via split encoded Apple Property List data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209</cve>
	<bugzilla href="https://bugzilla.suse.com/1019531">SUSE bug 1019531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021610">SUSE bug 1021610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550242" comment="libplist3-1.12-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5225" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0512-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00091.html" source="SUSE-SU"/>
    <description>
    LibTIFF version 4.0.7 is vulnerable to a heap buffer overflow in the tools/tiffcp resulting in DoS or code execution via a crafted BitsPerSample value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<bugzilla href="https://bugzilla.suse.com/1019611">SUSE bug 1019611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549981" comment="libtiff5-4.0.7-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547806" comment="libtiff5-32bit-4.0.7-40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549982" comment="tiff-4.0.7-40.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5334" ref_url="https://www.suse.com/security/cve/CVE-2017-5334" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an X.509 certificate with a Proxy Certificate Information extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5334/">CVE-2017-5334</cve>
	<bugzilla href="https://bugzilla.suse.com/1018831">SUSE bug 1018831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5335" ref_url="https://www.suse.com/security/cve/CVE-2017-5335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
    <description>
    The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5335/">CVE-2017-5335</cve>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549762" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549763" comment="libgnutls-openssl27-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549764" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547668" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5336" ref_url="https://www.suse.com/security/cve/CVE-2017-5336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5336/">CVE-2017-5336</cve>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549762" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549763" comment="libgnutls-openssl27-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549764" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547668" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5337" ref_url="https://www.suse.com/security/cve/CVE-2017-5337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5337/">CVE-2017-5337</cve>
	<bugzilla href="https://bugzilla.suse.com/1018832">SUSE bug 1018832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021057">SUSE bug 1021057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549762" comment="gnutls-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549763" comment="libgnutls-openssl27-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549764" comment="libgnutls28-3.2.15-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547668" comment="libgnutls28-32bit-3.2.15-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The OTV parser in tcpdump before 4.9.0 has a buffer overflow in print-otv.c:otv_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    In tcpdump before 4.9.0, a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5357" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5357" ref_url="https://www.suse.com/security/cve/CVE-2017-5357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006936.html" source="SUSE-SU"/>
    <description>
    regex.c in GNU ed before 1.14.1 allows attackers to cause a denial of service (crash) via a malformed command, which triggers an invalid free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5357/">CVE-2017-5357</cve>
	<bugzilla href="https://bugzilla.suse.com/1019807">SUSE bug 1019807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148899">SUSE bug 1148899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196769">SUSE bug 1196769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334671" comment="ed is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 50.1 and Firefox ESR 45.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<bugzilla href="https://bugzilla.suse.com/1021824">SUSE bug 1021824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5374" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5374" ref_url="https://www.suse.com/security/cve/CVE-2017-5374" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 50.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5374/">CVE-2017-5374</cve>
	<bugzilla href="https://bugzilla.suse.com/1021841">SUSE bug 1021841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<bugzilla href="https://bugzilla.suse.com/1021814">SUSE bug 1021814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<bugzilla href="https://bugzilla.suse.com/1021817">SUSE bug 1021817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5377" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5377" ref_url="https://www.suse.com/security/cve/CVE-2017-5377" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A memory corruption vulnerability in Skia that can occur when using transforms to make gradients, resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5377/">CVE-2017-5377</cve>
	<bugzilla href="https://bugzilla.suse.com/1021826">SUSE bug 1021826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<bugzilla href="https://bugzilla.suse.com/1021818">SUSE bug 1021818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5379" ref_url="https://www.suse.com/security/cve/CVE-2017-5379" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in Web Animations when interacting with cycle collection found through fuzzing. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5379/">CVE-2017-5379</cve>
	<bugzilla href="https://bugzilla.suse.com/1021827">SUSE bug 1021827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<bugzilla href="https://bugzilla.suse.com/1021819">SUSE bug 1021819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5381" ref_url="https://www.suse.com/security/cve/CVE-2017-5381" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The "export" function in the Certificate Viewer can force local filesystem navigation when the "common name" in a certificate contains slashes, allowing certificate content to be saved in unsafe locations with an arbitrary filename. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5381/">CVE-2017-5381</cve>
	<bugzilla href="https://bugzilla.suse.com/1021830">SUSE bug 1021830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5382" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5382" ref_url="https://www.suse.com/security/cve/CVE-2017-5382" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Feed preview for RSS feeds can be used to capture errors and exceptions generated by privileged content, allowing for the exposure of internal information not meant to be seen by web content. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5382/">CVE-2017-5382</cve>
	<bugzilla href="https://bugzilla.suse.com/1021831">SUSE bug 1021831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<bugzilla href="https://bugzilla.suse.com/1021822">SUSE bug 1021822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5384" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5384" ref_url="https://www.suse.com/security/cve/CVE-2017-5384" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5384/">CVE-2017-5384</cve>
	<bugzilla href="https://bugzilla.suse.com/1021832">SUSE bug 1021832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5385" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5385" ref_url="https://www.suse.com/security/cve/CVE-2017-5385" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Data sent with in multipart channels, such as the multipart/x-mixed-replace MIME type, will ignore the referrer-policy response header, leading to potential information disclosure for sites using this header. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5385/">CVE-2017-5385</cve>
	<bugzilla href="https://bugzilla.suse.com/1021833">SUSE bug 1021833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR &lt; 45.7 and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<bugzilla href="https://bugzilla.suse.com/1021823">SUSE bug 1021823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5387" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5387" ref_url="https://www.suse.com/security/cve/CVE-2017-5387" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The existence of a specifically requested local file can be found due to the double firing of the "onerror" when the "source" attribute on a "&lt;track&gt;" tag refers to a file that does not exist if the source page is loaded locally. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5387/">CVE-2017-5387</cve>
	<bugzilla href="https://bugzilla.suse.com/1021839">SUSE bug 1021839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5388" ref_url="https://www.suse.com/security/cve/CVE-2017-5388" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A STUN server in conjunction with a large number of "webkitRTCPeerConnection" objects can be used to send large STUN packets in a short period of time due to a lack of rate limiting being applied on e10s systems, allowing for a denial of service attack. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5388/">CVE-2017-5388</cve>
	<bugzilla href="https://bugzilla.suse.com/1021840">SUSE bug 1021840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5389" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5389" ref_url="https://www.suse.com/security/cve/CVE-2017-5389" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5389/">CVE-2017-5389</cve>
	<bugzilla href="https://bugzilla.suse.com/1021828">SUSE bug 1021828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<bugzilla href="https://bugzilla.suse.com/1021820">SUSE bug 1021820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5391" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5391" ref_url="https://www.suse.com/security/cve/CVE-2017-5391" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Special "about:" pages used by web content, such as RSS feeds, can load privileged "about:" pages in an iframe. If a content-injection bug were found in one of those pages this could allow for potential privilege escalation. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5391/">CVE-2017-5391</cve>
	<bugzilla href="https://bugzilla.suse.com/1021835">SUSE bug 1021835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5392" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5392" ref_url="https://www.suse.com/security/cve/CVE-2017-5392" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Weak proxy objects have weak references on multiple threads when they should only have them on one, resulting in incorrect memory usage and corruption, which leads to potentially exploitable crashes. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5392/">CVE-2017-5392</cve>
	<bugzilla href="https://bugzilla.suse.com/1021836">SUSE bug 1021836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5393" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5393" ref_url="https://www.suse.com/security/cve/CVE-2017-5393" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    The "mozAddonManager" allows for the installation of extensions from the CDN for addons.mozilla.org, a publicly accessible site. This could allow malicious extensions to install additional extensions from the CDN in combination with an XSS attack on Mozilla AMO sites. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5393/">CVE-2017-5393</cve>
	<bugzilla href="https://bugzilla.suse.com/1021837">SUSE bug 1021837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5394" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5394" ref_url="https://www.suse.com/security/cve/CVE-2017-5394" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A location bar spoofing attack where the location bar of loaded page will be shown over the content of another tab due to a series of JavaScript events combined with fullscreen mode. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5394/">CVE-2017-5394</cve>
	<bugzilla href="https://bugzilla.suse.com/1021834">SUSE bug 1021834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5395" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5395" ref_url="https://www.suse.com/security/cve/CVE-2017-5395" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    Malicious sites can display a spoofed location bar on a subsequently loaded page when the existing location bar on the new page is scrolled out of view if navigations between pages can be timed correctly. Note: This issue only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5395/">CVE-2017-5395</cve>
	<bugzilla href="https://bugzilla.suse.com/1021838">SUSE bug 1021838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0354-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0357-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<bugzilla href="https://bugzilla.suse.com/1021821">SUSE bug 1021821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021991">SUSE bug 1021991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549973" comment="MozillaFirefox-45.7.0esr-99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549974" comment="MozillaFirefox-translations-45.7.0esr-99.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5397" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5397" ref_url="https://www.suse.com/security/cve/CVE-2017-5397" source="SUSE CVE"/>
    <description>
    The cache directory on the local file system is set to be world writable. Firefox defaults to extracting libraries from this cache. This allows for the possibility of an installed malicious application or tools with write access to the file system to replace files used by Firefox with their own versions. This vulnerability affects Firefox &lt; 51.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5397/">CVE-2017-5397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5409" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5409" ref_url="https://www.suse.com/security/cve/CVE-2017-5409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
    <description>
    The Mozilla Windows updater can be called by a non-privileged user to delete an arbitrary local file by passing a special path to the callback parameter through the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR &lt; 45.8 and Firefox &lt; 52.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5409/">CVE-2017-5409</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0714-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0687-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0690-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox &lt; 52, Firefox ESR &lt; 45.8, Thunderbird &lt; 52, and Thunderbird &lt; 45.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<bugzilla href="https://bugzilla.suse.com/1028391">SUSE bug 1028391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028393">SUSE bug 1028393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550034" comment="MozillaFirefox-45.8.0esr-102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550035" comment="MozillaFirefox-translations-45.8.0esr-102.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5428" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5428" ref_url="https://www.suse.com/security/cve/CVE-2017-5428" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0765-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00021.html" source="SUSE-SU"/>
    <description>
    An integer overflow in "createImageBitmap()" was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the "createImageBitmap" API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user's computer. This vulnerability affects Firefox ESR &lt; 52.0.1 and Firefox &lt; 52.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5428/">CVE-2017-5428</cve>
	<bugzilla href="https://bugzilla.suse.com/1029822">SUSE bug 1029822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5430" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00026.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035204">SUSE bug 1035204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550183" comment="libgraphite2-3-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548017" comment="libgraphite2-3-32bit-1.3.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5437" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-10195, CVE-2016-10196, CVE-2016-10197.  Reason: This candidate is a duplicate of CVE-2016-10195, CVE-2016-10196, and CVE-2016-10197.  Notes: All CVE users should reference CVE-2016-10195, CVE-2016-10196, and/or CVE-2016-10197 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550209" comment="MozillaFirefox-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550210" comment="MozillaFirefox-translations-45.9.0esr-105.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability while parsing "application/http-index-format" format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A vulnerability while parsing "application/http-index-format" format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read when an HTTP/2 connection to a servers sends "DATA" frames with incorrect data content. This leads to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write in "ClearKeyDecryptor" while decrypting some Clearkey-encrypted media content. The "ClearKeyDecryptor" code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5455" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
    <description>
    The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR &lt; 52.1 and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5456" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
    <description>
    A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR &lt; 52.1 and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.21.4, 3.22.x through 3.28.x before 3.28.4, 3.29.x before 3.29.5, and 3.30.x before 3.30.1 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by leveraging incorrect base64 operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5462" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox ESR 52.1 has been updated with NSS version 3.28.4. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    During DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read while processing SVG content in "ConvolvePixel". This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    If a page is loaded from an original site through a hyperlink and contains a redirect to a "data:text/html" URL, triggering a reload will run the reloaded "data:text/html" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    A potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1196-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1268-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00048.html" source="SUSE-SU"/>
    <description>
    Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035209">SUSE bug 1035209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550211" comment="java-1_8_0-openjdk-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550212" comment="java-1_8_0-openjdk-demo-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550213" comment="java-1_8_0-openjdk-devel-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550214" comment="java-1_8_0-openjdk-headless-1.8.0.121-23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550215" comment="libfreebl3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545385" comment="libfreebl3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550216" comment="libfreebl3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545387" comment="libfreebl3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550217" comment="libsoftokn3-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545389" comment="libsoftokn3-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550218" comment="libsoftokn3-hmac-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545391" comment="libsoftokn3-hmac-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550219" comment="mozilla-nspr-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545393" comment="mozilla-nspr-32bit-4.13.1-18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550220" comment="mozilla-nss-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545395" comment="mozilla-nss-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550221" comment="mozilla-nss-certs-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545397" comment="mozilla-nss-certs-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550222" comment="mozilla-nss-sysinit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545399" comment="mozilla-nss-sysinit-32bit-3.29.5-57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550223" comment="mozilla-nss-tools-3.29.5-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 53 and Firefox ESR 52.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating CSS layout when attempting to use a node in the tree that no longer exists. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The Q.933 parser in tcpdump before 4.9.0 has a buffer overflow in print-fr.c:q933_print(), a different vulnerability than CVE-2016-8575.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The SNMP parser in tcpdump before 4.9.0 has a buffer overflow in print-snmp.c:asn1_parse().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ATM parser in tcpdump before 4.9.0 has a buffer overflow in print-atm.c:sig_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in addrtoname.c:lookup_nsap().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00018.html" source="SUSE-SU"/>
    <description>
    The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550175" comment="libpcap1-1.8.1-9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550176" comment="tcpdump-4.9.0-13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5495" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1201-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00020.html" source="SUSE-SU"/>
    <description>
    All versions of Quagga, 0.93 through 1.1.0, are vulnerable to an unbounded memory allocation in the telnet 'vty' CLI, leading to a Denial-of-Service of Quagga daemons, or even the entire host. When Quagga daemons are configured with their telnet CLI enabled, anyone who can connect to the TCP ports can trigger this vulnerability, prior to authentication. Most distributions restrict the Quagga telnet interface to local access only by default. The Quagga telnet interface 'vty' input buffer grows automatically, without bound, so long as a newline is not entered. This allows an attacker to cause the Quagga daemon to allocate unbounded memory by sending very long strings without a newline. Eventually the daemon is terminated by the system, or the system itself runs out of memory. This is fixed in Quagga 1.1.1 and Free Range Routing (FRR) Protocol Suite 2017-01-10.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495</cve>
	<bugzilla href="https://bugzilla.suse.com/1021669">SUSE bug 1021669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549579" comment="libfpm_pb0-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549580" comment="libospf0-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549581" comment="libospfapiclient0-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549582" comment="libquagga_pb0-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549583" comment="libzebra1-1.1.1-17.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549584" comment="quagga-1.1.1-17.3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5498" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    libjasper/include/jasper/jas_math.h in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<bugzilla href="https://bugzilla.suse.com/1020353">SUSE bug 1020353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550117" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547958" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5506" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5506" ref_url="https://www.suse.com/security/cve/CVE-2017-5506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in magick/profile.c in ImageMagick allows remote attackers to have unspecified impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5506/">CVE-2017-5506</cve>
	<bugzilla href="https://bugzilla.suse.com/1020436">SUSE bug 1020436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5507" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5507" ref_url="https://www.suse.com/security/cve/CVE-2017-5507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Memory leak in coders/mpc.c in ImageMagick before 6.9.7-4 and 7.x before 7.0.4-4 allows remote attackers to cause a denial of service (memory consumption) via vectors involving a pixel cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5507/">CVE-2017-5507</cve>
	<bugzilla href="https://bugzilla.suse.com/1020439">SUSE bug 1020439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5508" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5508" ref_url="https://www.suse.com/security/cve/CVE-2017-5508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the PushQuantumPixel function in ImageMagick before 6.9.7-3 and 7.x before 7.0.4-3 allows remote attackers to cause a denial of service (application crash) via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5508/">CVE-2017-5508</cve>
	<bugzilla href="https://bugzilla.suse.com/1020441">SUSE bug 1020441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5509" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5509" ref_url="https://www.suse.com/security/cve/CVE-2017-5509" source="SUSE CVE"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5509/">CVE-2017-5509</cve>
	<bugzilla href="https://bugzilla.suse.com/1020445">SUSE bug 1020445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5510" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5510" ref_url="https://www.suse.com/security/cve/CVE-2017-5510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5510/">CVE-2017-5510</cve>
	<bugzilla href="https://bugzilla.suse.com/1020446">SUSE bug 1020446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5511" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5511" ref_url="https://www.suse.com/security/cve/CVE-2017-5511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0391-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0399-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0587-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00000.html" source="SUSE-SU"/>
    <description>
    coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5511/">CVE-2017-5511</cve>
	<bugzilla href="https://bugzilla.suse.com/1020448">SUSE bug 1020448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549991" comment="libMagickCore-6_Q16-1-6.8.8.1-59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549992" comment="libMagickWand-6_Q16-1-6.8.8.1-59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5525" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Memory leak in hw/audio/ac97.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<bugzilla href="https://bugzilla.suse.com/1020491">SUSE bug 1020491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2751-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00000.html" source="SUSE-SU"/>
    <description>
    Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<bugzilla href="https://bugzilla.suse.com/1020589">SUSE bug 1020589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518245" comment="xen-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549772" comment="xen-doc-html-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518246" comment="xen-libs-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518247" comment="xen-libs-32bit-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549773" comment="xen-tools-4.7.3_06-43.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549774" comment="xen-tools-domU-4.7.3_06-43.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5545" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0428-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545</cve>
	<bugzilla href="https://bugzilla.suse.com/1021610">SUSE bug 1021610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550242" comment="libplist3-1.12-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5548" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5548" ref_url="https://www.suse.com/security/cve/CVE-2017-5548" source="SUSE CVE"/>
    <description>
    drivers/net/ieee802154/atusb.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5548/">CVE-2017-5548</cve>
	<bugzilla href="https://bugzilla.suse.com/1021255">SUSE bug 1021255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5550" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5550" ref_url="https://www.suse.com/security/cve/CVE-2017-5550" source="SUSE CVE"/>
    <description>
    Off-by-one error in the pipe_advance function in lib/iov_iter.c in the Linux kernel before 4.9.5 allows local users to obtain sensitive information from uninitialized heap-memory locations in opportunistic circumstances by reading from a pipe after an incorrect buffer-release decision.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5550/">CVE-2017-5550</cve>
	<bugzilla href="https://bugzilla.suse.com/1021257">SUSE bug 1021257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-01/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00022.html" source="SUSE-SU"/>
    <description>
    The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551</cve>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5552" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virgl_resource_attach_backing function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<bugzilla href="https://bugzilla.suse.com/1021195">SUSE bug 1021195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5576" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5576" ref_url="https://www.suse.com/security/cve/CVE-2017-5576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5576/">CVE-2017-5576</cve>
	<bugzilla href="https://bugzilla.suse.com/1021294">SUSE bug 1021294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5577" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5577" ref_url="https://www.suse.com/security/cve/CVE-2017-5577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00021.html" source="SUSE-SU"/>
    <description>
    The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5577/">CVE-2017-5577</cve>
	<bugzilla href="https://bugzilla.suse.com/1021294">SUSE bug 1021294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5578" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virtio_gpu_resource_attach_backing function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<bugzilla href="https://bugzilla.suse.com/1021481">SUSE bug 1021481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5579" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022627">SUSE bug 1022627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5580" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5580" ref_url="https://www.suse.com/security/cve/CVE-2017-5580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5580/">CVE-2017-5580</cve>
	<bugzilla href="https://bugzilla.suse.com/1021627">SUSE bug 1021627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00010.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the ASTERIX dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-asterix.c by changing a data type to avoid an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5597" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0364-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00010.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.3 and 2.0.0 to 2.0.9, the DHCPv6 dissector could go into a large loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dhcpv6.c by changing a data type to avoid an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<bugzilla href="https://bugzilla.suse.com/1021739">SUSE bug 1021739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5601" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5601" ref_url="https://www.suse.com/security/cve/CVE-2017-5601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0944-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GOSOUIKGPKMNRIKY4M2SLF54G6W2YC4/" source="SUSE-SU"/>
    <description>
    An error in the lha_read_file_header_1() function (archive_read_support_format_lha.c) in libarchive 3.2.2 allows remote attackers to trigger an out-of-bounds read memory access and subsequently cause a crash via a specially crafted archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5601/">CVE-2017-5601</cve>
	<bugzilla href="https://bugzilla.suse.com/1022528">SUSE bug 1022528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189528">SUSE bug 1189528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5618" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5618" ref_url="https://www.suse.com/security/cve/CVE-2017-5618" source="SUSE CVE"/>
    <description>
    GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5618/">CVE-2017-5618</cve>
	<bugzilla href="https://bugzilla.suse.com/1021743">SUSE bug 1021743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334061" comment="screen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5637</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5637" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5637" ref_url="https://www.suse.com/security/cve/CVE-2017-5637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
    <description>
    Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5637/">CVE-2017-5637</cve>
	<bugzilla href="https://bugzilla.suse.com/1040519">SUSE bug 1040519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009340773" comment="zookeeper is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5645" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5645" ref_url="https://www.suse.com/security/cve/CVE-2017-5645" source="SUSE CVE"/>
    <description>
    In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5645/">CVE-2017-5645</cve>
	<bugzilla href="https://bugzilla.suse.com/1034569">SUSE bug 1034569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334062" comment="log4j is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00037.html" source="SUSE-SU"/>
    <description>
    A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647</cve>
	<bugzilla href="https://bugzilla.suse.com/1033448">SUSE bug 1033448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532890" comment="tomcat-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532891" comment="tomcat-admin-webapps-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532892" comment="tomcat-docs-webapp-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532893" comment="tomcat-el-3_0-api-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532894" comment="tomcat-javadoc-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532895" comment="tomcat-jsp-2_3-api-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532896" comment="tomcat-lib-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532897" comment="tomcat-servlet-3_1-api-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532898" comment="tomcat-webapps-8.0.43-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00037.html" source="SUSE-SU"/>
    <description>
    While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648</cve>
	<bugzilla href="https://bugzilla.suse.com/1033447">SUSE bug 1033447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532890" comment="tomcat-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532891" comment="tomcat-admin-webapps-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532892" comment="tomcat-docs-webapp-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532893" comment="tomcat-el-3_0-api-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532894" comment="tomcat-javadoc-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532895" comment="tomcat-jsp-2_3-api-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532896" comment="tomcat-lib-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532897" comment="tomcat-servlet-3_1-api-8.0.43-23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532898" comment="tomcat-webapps-8.0.43-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5650" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5650" ref_url="https://www.suse.com/security/cve/CVE-2017-5650" source="SUSE CVE"/>
    <description>
    In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5650/">CVE-2017-5650</cve>
	<bugzilla href="https://bugzilla.suse.com/1033446">SUSE bug 1033446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5651" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5651" ref_url="https://www.suse.com/security/cve/CVE-2017-5651" source="SUSE CVE"/>
    <description>
    In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5651/">CVE-2017-5651</cve>
	<bugzilla href="https://bugzilla.suse.com/1033444">SUSE bug 1033444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004231.html" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00033.html" source="SUSE-SU"/>
    <description>
    The error page mechanism of the Java Servlet Specification requires that, when an error occurs and an error page is configured for the error that occurred, the original request and response are forwarded to the error page. This means that the request is presented to the error page with the original HTTP method. If the error page is a static file, expected behaviour is to serve content of the file as if processing a GET request, regardless of the actual HTTP method. The Default Servlet in Apache Tomcat 9.0.0.M1 to 9.0.0.M20, 8.5.0 to 8.5.14, 8.0.0.RC1 to 8.0.43 and 7.0.0 to 7.0.77 did not do this. Depending on the original request this could lead to unexpected and undesirable results for static error pages including, if the DefaultServlet is configured to permit writes, the replacement or removal of the custom error page. Notes for other user provided error pages: (1) Unless explicitly coded otherwise, JSPs ignore the HTTP method. JSPs used as error pages must must ensure that they handle any error dispatch as a GET request, regardless of the actual method. (2) By default, the response generated by a Servlet does depend on the HTTP method. Custom Servlets used as error pages must ensure that they handle any error dispatch as a GET request, regardless of the actual method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664</cve>
	<bugzilla href="https://bugzilla.suse.com/1042910">SUSE bug 1042910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532585" comment="tomcat-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532586" comment="tomcat-admin-webapps-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532587" comment="tomcat-docs-webapp-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532588" comment="tomcat-el-3_0-api-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532589" comment="tomcat-javadoc-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532590" comment="tomcat-jsp-2_3-api-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532591" comment="tomcat-lib-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532592" comment="tomcat-servlet-3_1-api-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532593" comment="tomcat-webapps-8.0.43-29.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5667" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<bugzilla href="https://bugzilla.suse.com/1022541">SUSE bug 1022541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669</cve>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102390">SUSE bug 1102390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0009-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1571-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2631-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7022982" ref_url="https://www.suse.com/support/kb/doc/?id=7022982" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU--1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0013-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0030-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0187-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0745-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1631-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00080.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074919">SUSE bug 1074919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075007">SUSE bug 1075007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076115">SUSE bug 1076115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076372">SUSE bug 1076372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078353">SUSE bug 1078353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126516">SUSE bug 1126516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173489">SUSE bug 1173489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530215" comment="libvirt-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530216" comment="libvirt-client-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530217" comment="libvirt-daemon-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530218" comment="libvirt-daemon-config-network-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530219" comment="libvirt-daemon-config-nwfilter-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530220" comment="libvirt-daemon-driver-interface-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530221" comment="libvirt-daemon-driver-libxl-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530222" comment="libvirt-daemon-driver-lxc-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530223" comment="libvirt-daemon-driver-network-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530224" comment="libvirt-daemon-driver-nodedev-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530225" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530226" comment="libvirt-daemon-driver-qemu-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530227" comment="libvirt-daemon-driver-secret-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530228" comment="libvirt-daemon-driver-storage-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530229" comment="libvirt-daemon-hooks-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530230" comment="libvirt-daemon-lxc-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530231" comment="libvirt-daemon-qemu-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530232" comment="libvirt-daemon-xen-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530233" comment="libvirt-doc-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530234" comment="libvirt-lock-sanlock-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530235" comment="libvirt-nss-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550517" comment="libvirt-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550518" comment="libvirt-client-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550519" comment="libvirt-daemon-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550520" comment="libvirt-daemon-config-network-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550521" comment="libvirt-daemon-config-nwfilter-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550522" comment="libvirt-daemon-driver-interface-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530221" comment="libvirt-daemon-driver-libxl-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550523" comment="libvirt-daemon-driver-lxc-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550524" comment="libvirt-daemon-driver-network-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550525" comment="libvirt-daemon-driver-nodedev-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550526" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550527" comment="libvirt-daemon-driver-qemu-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550528" comment="libvirt-daemon-driver-secret-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550529" comment="libvirt-daemon-driver-storage-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550530" comment="libvirt-daemon-hooks-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550531" comment="libvirt-daemon-lxc-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550532" comment="libvirt-daemon-qemu-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530232" comment="libvirt-daemon-xen-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550533" comment="libvirt-doc-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550534" comment="libvirt-lock-sanlock-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550535" comment="libvirt-nss-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519660" comment="kernel-firmware-20170530-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594534" comment="libvirt-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594535" comment="libvirt-client-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594536" comment="libvirt-daemon-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594537" comment="libvirt-daemon-config-network-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594538" comment="libvirt-daemon-config-nwfilter-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594539" comment="libvirt-daemon-driver-interface-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530221" comment="libvirt-daemon-driver-libxl-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594540" comment="libvirt-daemon-driver-lxc-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594541" comment="libvirt-daemon-driver-network-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594542" comment="libvirt-daemon-driver-nodedev-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594543" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594544" comment="libvirt-daemon-driver-qemu-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594545" comment="libvirt-daemon-driver-secret-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594546" comment="libvirt-daemon-driver-storage-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594547" comment="libvirt-daemon-hooks-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594548" comment="libvirt-daemon-lxc-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594549" comment="libvirt-daemon-qemu-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530232" comment="libvirt-daemon-xen-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594550" comment="libvirt-doc-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594551" comment="libvirt-lock-sanlock-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594552" comment="libvirt-nss-2.0.0-27.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519661" comment="ucode-amd-20170530-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550801" comment="crash-7.1.5-15.3.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550802" comment="crash-kmp-default-7.1.5_k4.4.114_92.67-15.3.45 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519174" comment="kernel-firmware-20170530-21.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550914" comment="libvirt-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550915" comment="libvirt-client-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550916" comment="libvirt-daemon-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550917" comment="libvirt-daemon-config-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550918" comment="libvirt-daemon-config-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550919" comment="libvirt-daemon-driver-interface-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519135" comment="libvirt-daemon-driver-libxl-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550920" comment="libvirt-daemon-driver-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550921" comment="libvirt-daemon-driver-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550922" comment="libvirt-daemon-driver-nodedev-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550923" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550924" comment="libvirt-daemon-driver-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550925" comment="libvirt-daemon-driver-secret-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550926" comment="libvirt-daemon-driver-storage-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550927" comment="libvirt-daemon-hooks-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550928" comment="libvirt-daemon-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550929" comment="libvirt-daemon-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519145" comment="libvirt-daemon-xen-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550930" comment="libvirt-doc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550931" comment="libvirt-lock-sanlock-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550932" comment="libvirt-nss-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519175" comment="ucode-amd-20170530-21.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519024" comment="ucode-intel-20180312-13.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550943" comment="xen-doc-html-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550944" comment="xen-tools-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550945" comment="xen-tools-domU-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID000019229" ref_url="https://www.suse.com/support/kb/doc/?id=000019229" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7023075" ref_url="https://www.suse.com/support/kb/doc/?id=7023075" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IDOTKMILRKOFD2ODQXJF3OOEYZ3EMR5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MOJKTUHVZFZADZQ6EYELCLEJ5BD766Q/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550791" comment="kernel-default-4.4.103-92.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550792" comment="kernel-default-base-4.4.103-92.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550793" comment="kernel-default-devel-4.4.103-92.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550794" comment="kernel-default-man-4.4.103-92.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550795" comment="kernel-devel-4.4.103-92.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550796" comment="kernel-macros-4.4.103-92.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550797" comment="kernel-source-4.4.103-92.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550798" comment="kernel-syms-4.4.103-92.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550943" comment="xen-doc-html-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550944" comment="xen-tools-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550945" comment="xen-tools-domU-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075008">SUSE bug 1075008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550392" comment="kernel-default-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550393" comment="kernel-default-base-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550394" comment="kernel-default-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550395" comment="kernel-default-man-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518759" comment="kernel-devel-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518760" comment="kernel-macros-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518761" comment="kernel-source-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550396" comment="kernel-syms-4.4.103-92.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550943" comment="xen-doc-html-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550944" comment="xen-tools-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550945" comment="xen-tools-domU-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5834" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service (out-of-bounds heap read and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834</cve>
	<bugzilla href="https://bugzilla.suse.com/1023848">SUSE bug 1023848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550242" comment="libplist3-1.12-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5835" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835</cve>
	<bugzilla href="https://bugzilla.suse.com/1023822">SUSE bug 1023822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550242" comment="libplist3-1.12-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5836" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0528-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836</cve>
	<bugzilla href="https://bugzilla.suse.com/1023807">SUSE bug 1023807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023848">SUSE bug 1023848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550242" comment="libplist3-1.12-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0574-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1079-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00095.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted video file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550140" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550144" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550145" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550141" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550146" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550147" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550148" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550149" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550150" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550142" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550151" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550152" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550153" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550154" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550155" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550156" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550157" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550158" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550159" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550160" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5838" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002792.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0580-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1031-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00058.html" source="SUSE-SU"/>
    <description>
    The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024051">SUSE bug 1024051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550128" comment="gstreamer-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518564" comment="gstreamer-lang-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550129" comment="gstreamer-utils-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550130" comment="libgstreamer-1_0-0-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550131" comment="libgstreamer-1_0-0-32bit-1.8.3-9.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550132" comment="typelib-1_0-Gst-1_0-1.8.3-9.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0574-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00095.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 does not properly limit recursion, which allows remote attackers to cause a denial of service (stack overflow and crash) via vectors involving nested WAVEFORMATEX.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024047">SUSE bug 1024047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550144" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550145" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550146" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550147" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550148" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550149" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550150" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550151" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550152" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550153" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550154" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550155" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550156" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550157" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550158" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550159" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550160" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving the current stts index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024034">SUSE bug 1024034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550143" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving ncdt tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024030">SUSE bug 1024030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550143" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0574-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00095.html" source="SUSE-SU"/>
    <description>
    The html_context_handle_element function in gst/subparse/samiparse.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted SMI file, as demonstrated by OneNote_Manager.smi.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024041">SUSE bug 1024041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550144" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550145" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550146" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550147" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550148" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550149" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550150" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550151" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550152" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550153" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550154" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550155" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550156" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550157" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550158" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550159" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550160" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00059.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) gst_mini_object_unref, (2) gst_tag_list_unref, and (3) gst_mxf_demux_update_essence_tracks functions in GStreamer before 1.10.3 allow remote attackers to cause a denial of service (crash) via vectors involving stream tags, as demonstrated by 02785736.mxf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024044">SUSE bug 1024044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550118" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518552" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550119" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550120" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550121" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550122" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550123" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550124" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550125" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550126" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550127" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541177" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0574-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00117.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1079-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1106-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00095.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted ASF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550140" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550144" comment="gstreamer-plugins-base-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518582" comment="gstreamer-plugins-base-lang-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550145" comment="libgstallocators-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550141" comment="libgstapp-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550146" comment="libgstapp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550147" comment="libgstapp-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550148" comment="libgstaudio-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550149" comment="libgstaudio-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550150" comment="libgstfft-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550142" comment="libgstinterfaces-0_10-0-32bit-0.10.36-17.13 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550151" comment="libgstpbutils-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550152" comment="libgstpbutils-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550153" comment="libgstriff-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550154" comment="libgstrtp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550155" comment="libgstrtsp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550156" comment="libgstsdp-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550157" comment="libgsttag-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550158" comment="libgsttag-1_0-0-32bit-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550159" comment="libgstvideo-1_0-0-1.8.3-12.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550160" comment="libgstvideo-1_0-0-32bit-1.8.3-12.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1066-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1076-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00081.html" source="SUSE-SU"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a ncdt sub-tag that "goes behind" the surrounding tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550143" comment="gstreamer-plugins-good-1.8.3-12.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518580" comment="gstreamer-plugins-good-lang-1.8.3-12.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1032-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00059.html" source="SUSE-SU"/>
    <description>
    The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024068">SUSE bug 1024068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550118" comment="gstreamer-plugins-bad-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518552" comment="gstreamer-plugins-bad-lang-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550119" comment="libgstadaptivedemux-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550120" comment="libgstbadaudio-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550121" comment="libgstbadbase-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550122" comment="libgstbadvideo-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550123" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550124" comment="libgstcodecparsers-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550125" comment="libgstgl-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550126" comment="libgstmpegts-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550127" comment="libgstphotography-1_0-0-1.8.3-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541177" comment="libgsturidownloader-1_0-0-1.8.3-17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5849" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5849" ref_url="https://www.suse.com/security/cve/CVE-2017-5849" source="SUSE CVE"/>
    <description>
    tiffttopnm in netpbm 10.47.63 does not properly use the libtiff TIFFRGBAImageGet function, which allows remote attackers to cause a denial of service (out-of-bounds read and write) via a crafted tiff image file, related to transposing width and height values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5849/">CVE-2017-5849</cve>
	<bugzilla href="https://bugzilla.suse.com/1022790">SUSE bug 1022790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022791">SUSE bug 1022791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334519" comment="netpbm is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5856" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024186">SUSE bug 1024186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5857" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virgl_cmd_resource_unref function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_UNREF commands sent without detaching the backing storage beforehand.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<bugzilla href="https://bugzilla.suse.com/1023073">SUSE bug 1023073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5884" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009456.html" source="SUSE-SU"/>
    <description>
    gtk-vnc before 0.7.0 does not properly check boundaries of subrectangle-containing tiles, which allows remote servers to execute arbitrary code via the src x, y coordinates in a crafted (1) rre, (2) hextile, or (3) copyrect tile.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884</cve>
	<bugzilla href="https://bugzilla.suse.com/1024266">SUSE bug 1024266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334521" comment="gtk-vnc is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334522" comment="gtk-vnc2 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009628130" comment="libgtk-vnc-1_0-0-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628131" comment="libgtk-vnc-2_0-0-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628132" comment="libgvnc-1_0-0-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628133" comment="python-gtk-vnc-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628134" comment="typelib-1_0-GVnc-1_0-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628135" comment="typelib-1_0-GtkVnc-2_0-0.6.0-11.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5885" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009456.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) vnc_connection_server_message and (2) vnc_color_map_set functions in gtk-vnc before 0.7.0 allow remote servers to cause a denial of service (crash) or possibly execute arbitrary code via vectors involving SetColorMapEntries, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885</cve>
	<bugzilla href="https://bugzilla.suse.com/1024268">SUSE bug 1024268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334521" comment="gtk-vnc is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334522" comment="gtk-vnc2 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009628130" comment="libgtk-vnc-1_0-0-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628131" comment="libgtk-vnc-2_0-0-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628132" comment="libgvnc-1_0-0-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628133" comment="python-gtk-vnc-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628134" comment="typelib-1_0-GVnc-1_0-0.6.0-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628135" comment="typelib-1_0-GtkVnc-2_0-0.6.0-11.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5897" ref_url="https://www.suse.com/security/cve/CVE-2017-5897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5897/">CVE-2017-5897</cve>
	<bugzilla href="https://bugzilla.suse.com/1023762">SUSE bug 1023762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5898" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1312-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00058.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550021" comment="qemu-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532745" comment="qemu-arm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550022" comment="qemu-block-curl-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550023" comment="qemu-block-rbd-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550024" comment="qemu-block-ssh-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550025" comment="qemu-guest-agent-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518479" comment="qemu-ipxe-1.0.0-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550026" comment="qemu-kvm-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550027" comment="qemu-lang-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550028" comment="qemu-ppc-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550029" comment="qemu-s390-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518481" comment="qemu-seabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518482" comment="qemu-sgabios-8-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550030" comment="qemu-tools-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518484" comment="qemu-vgabios-1.9.1-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518485" comment="qemu-x86-2.6.2-41.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5931" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931" source="SUSE CVE"/>
    <description>
    Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code on the host via a crafted virtio-crypto request, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931</cve>
	<bugzilla href="https://bugzilla.suse.com/1024114">SUSE bug 1024114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5932" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5932" ref_url="https://www.suse.com/security/cve/CVE-2017-5932" source="SUSE CVE"/>
    <description>
    The path autocompletion feature in Bash 4.4 allows local users to gain privileges via a crafted filename starting with a " (double quote) character and a command substitution metacharacter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5932/">CVE-2017-5932</cve>
	<bugzilla href="https://bugzilla.suse.com/1024171">SUSE bug 1024171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334330" comment="bash is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5937" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    The util_format_is_pure_uint function in vrend_renderer.c in Virgil 3d project (aka virglrenderer) 0.6.0 and earlier allows local guest OS users to cause a denial of service (NULL pointer dereference) via a crafted VIRGL_CCMD_CLEAR command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937</cve>
	<bugzilla href="https://bugzilla.suse.com/1024232">SUSE bug 1024232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041089">SUSE bug 1041089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5951" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The mem_get_bits_rectangle function in base/gdevmem.c in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<bugzilla href="https://bugzilla.suse.com/1032114">SUSE bug 1032114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550292" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550293" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0511-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-02/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1811-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00039.html" source="SUSE-SU"/>
    <description>
    vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123143">SUSE bug 1123143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173534">SUSE bug 1173534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549402" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549403" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517666" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5956" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5956" ref_url="https://www.suse.com/security/cve/CVE-2017-5956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    The vrend_draw_vbo function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors involving vertext_buffer_index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5956/">CVE-2017-5956</cve>
	<bugzilla href="https://bugzilla.suse.com/1024992">SUSE bug 1024992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5957" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the vrend_decode_set_framebuffer_state function in vrend_decode.c in virglrenderer before 926b9b3460a48f6454d8bbe9e44313d86a65447f, as used in Quick Emulator (QEMU), allows a local guest users to cause a denial of service (application crash) via the "nr_cbufs" argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957</cve>
	<bugzilla href="https://bugzilla.suse.com/1024993">SUSE bug 1024993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1746-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00000.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document.  NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549371" comment="libxml2-2-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549372" comment="libxml2-2-32bit-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532185" comment="libxml2-doc-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549373" comment="libxml2-tools-2.9.4-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549374" comment="python-libxml2-2.9.4-42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5970" ref_url="https://www.suse.com/security/cve/CVE-2017-5970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0763-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0767-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0768-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0769-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0772-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0776-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0779-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5970/">CVE-2017-5970</cve>
	<bugzilla href="https://bugzilla.suse.com/1024938">SUSE bug 1024938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025013">SUSE bug 1025013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5973" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025188">SUSE bug 1025188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5986" ref_url="https://www.suse.com/security/cve/CVE-2017-5986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00037.html" source="SUSE-SU"/>
    <description>
    Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5986/">CVE-2017-5986</cve>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550008" comment="kernel-default-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550009" comment="kernel-default-base-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550010" comment="kernel-default-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550011" comment="kernel-default-man-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518470" comment="kernel-devel-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518471" comment="kernel-macros-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518472" comment="kernel-source-4.4.49-92.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550012" comment="kernel-syms-4.4.49-92.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5987" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local OS guest privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors involving the transfer mode register during multi block transfer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<bugzilla href="https://bugzilla.suse.com/1025311">SUSE bug 1025311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5993" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993</cve>
	<bugzilla href="https://bugzilla.suse.com/1025505">SUSE bug 1025505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994</cve>
	<bugzilla href="https://bugzilla.suse.com/1025507">SUSE bug 1025507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6000" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6000" ref_url="https://www.suse.com/security/cve/CVE-2017-6000" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6000/">CVE-2017-6000</cve>
	<bugzilla href="https://bugzilla.suse.com/1025594">SUSE bug 1025594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6001" ref_url="https://www.suse.com/security/cve/CVE-2017-6001" source="SUSE CVE"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6001/">CVE-2017-6001</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025626">SUSE bug 1025626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004</cve>
	<bugzilla href="https://bugzilla.suse.com/1025709">SUSE bug 1025709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191803">SUSE bug 1191803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193384">SUSE bug 1193384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6014" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6014" ref_url="https://www.suse.com/security/cve/CVE-2017-6014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6014/">CVE-2017-6014</cve>
	<bugzilla href="https://bugzilla.suse.com/1025913">SUSE bug 1025913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6058" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058" source="SUSE CVE"/>
    <description>
    Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058</cve>
	<bugzilla href="https://bugzilla.suse.com/1025837">SUSE bug 1025837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="TID7018645" ref_url="https://www.suse.com/support/kb/doc/?id=7018645" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074</cve>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6181" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6181" ref_url="https://www.suse.com/security/cve/CVE-2017-6181" source="SUSE CVE"/>
    <description>
    The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6181/">CVE-2017-6181</cve>
	<bugzilla href="https://bugzilla.suse.com/1033625">SUSE bug 1033625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6196" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6196" ref_url="https://www.suse.com/security/cve/CVE-2017-6196" source="SUSE CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the gx_image_enum_begin function in base/gxipixel.c in Ghostscript before ecceafe3abba2714ef9b432035fe0739d9b1a283 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6196/">CVE-2017-6196</cve>
	<bugzilla href="https://bugzilla.suse.com/1027039">SUSE bug 1027039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6209" ref_url="https://www.suse.com/security/cve/CVE-2017-6209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6209/">CVE-2017-6209</cve>
	<bugzilla href="https://bugzilla.suse.com/1026723">SUSE bug 1026723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6210" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6210" ref_url="https://www.suse.com/security/cve/CVE-2017-6210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6210/">CVE-2017-6210</cve>
	<bugzilla href="https://bugzilla.suse.com/1026725">SUSE bug 1026725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6214" ref_url="https://www.suse.com/security/cve/CVE-2017-6214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6214/">CVE-2017-6214</cve>
	<bugzilla href="https://bugzilla.suse.com/1026722">SUSE bug 1026722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6311" ref_url="https://www.suse.com/security/cve/CVE-2017-6311" source="SUSE CVE"/>
    <description>
    gdk-pixbuf-thumbnailer.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to printing an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6311/">CVE-2017-6311</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027027">SUSE bug 1027027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333994" comment="gdk-pixbuf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6312" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer overflow in io-ico.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted image entry offset in an ICO file, which triggers an out-of-bounds read, related to compiler optimizations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027026">SUSE bug 1027026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549603" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549604" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549605" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549606" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549607" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6313" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the load_resources function in io-icns.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (out-of-bounds read and program crash) via a crafted image entry size in an ICO file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549603" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549604" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549605" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549606" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549607" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6314" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6314" ref_url="https://www.suse.com/security/cve/CVE-2017-6314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00021.html" source="SUSE-SU"/>
    <description>
    The make_available_at_least function in io-tiff.c in gdk-pixbuf allows context-dependent attackers to cause a denial of service (infinite loop) via a large TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6314/">CVE-2017-6314</cve>
	<bugzilla href="https://bugzilla.suse.com/1027024">SUSE bug 1027024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027025">SUSE bug 1027025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518058" comment="gdk-pixbuf-lang-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549603" comment="gdk-pixbuf-query-loaders-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549604" comment="gdk-pixbuf-query-loaders-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549605" comment="libgdk_pixbuf-2_0-0-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549606" comment="libgdk_pixbuf-2_0-0-32bit-2.34.0-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549607" comment="typelib-1_0-GdkPixbuf-2_0-2.34.0-19.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6317" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6317" ref_url="https://www.suse.com/security/cve/CVE-2017-6317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the add_shader_program function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via vectors involving the sprog variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6317/">CVE-2017-6317</cve>
	<bugzilla href="https://bugzilla.suse.com/1026922">SUSE bug 1026922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6318" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0649-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00016.html" source="SUSE-SU"/>
    <description>
    saned in sane-backends 1.0.25 allows remote attackers to obtain sensitive memory information via a crafted SANE_NET_CONTROL_OPTION packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<bugzilla href="https://bugzilla.suse.com/1027197">SUSE bug 1027197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550036" comment="sane-backends-1.0.24-3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551826" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595990" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6345" ref_url="https://www.suse.com/security/cve/CVE-2017-6345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6345/">CVE-2017-6345</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027190">SUSE bug 1027190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6346" ref_url="https://www.suse.com/security/cve/CVE-2017-6346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6346/">CVE-2017-6346</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027189">SUSE bug 1027189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064392">SUSE bug 1064392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6347" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6347" ref_url="https://www.suse.com/security/cve/CVE-2017-6347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6347/">CVE-2017-6347</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
    <description>
    The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348</cve>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1811-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00039.html" source="SUSE-SU"/>
    <description>
    An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349</cve>
	<bugzilla href="https://bugzilla.suse.com/1027057">SUSE bug 1027057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549402" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549403" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517666" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1811-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00039.html" source="SUSE-SU"/>
    <description>
    An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350</cve>
	<bugzilla href="https://bugzilla.suse.com/1027053">SUSE bug 1027053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549402" comment="gvim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549403" comment="vim-7.4.326-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517666" comment="vim-data-7.4.326-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353</cve>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6355" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6355" ref_url="https://www.suse.com/security/cve/CVE-2017-6355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the vrend_create_shader function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (process crash) via crafted pkt_length and offlen values, which trigger an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6355/">CVE-2017-6355</cve>
	<bugzilla href="https://bugzilla.suse.com/1027108">SUSE bug 1027108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6362" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0151-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00054.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the gdImagePngPtr function in libgd2 before 2.2.5 allows remote attackers to cause a denial of service via vectors related to a palette with no colors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362</cve>
	<bugzilla href="https://bugzilla.suse.com/1056993">SUSE bug 1056993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550380" comment="gd-2.1.0-24.3.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0902-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00119.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_OBJECT_VERTEX_ELEMENTS commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386</cve>
	<bugzilla href="https://bugzilla.suse.com/1027376">SUSE bug 1027376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550056" comment="libvirglrenderer0-0.5.0-11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6414" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vcard_apdu_new function in card_7816.c in libcacard before 2.5.3 allows local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<bugzilla href="https://bugzilla.suse.com/1027514">SUSE bug 1027514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6418" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    libclamav/message.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<bugzilla href="https://bugzilla.suse.com/1052466">SUSE bug 1052466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6419" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
    <description>
    mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550823" comment="clamav-0.99.4-33.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6420" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00078.html" source="SUSE-SU"/>
    <description>
    The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<bugzilla href="https://bugzilla.suse.com/1052448">SUSE bug 1052448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550506" comment="clamav-0.99.3-33.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    The parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory corruption) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435</cve>
	<bugzilla href="https://bugzilla.suse.com/1029639">SUSE bug 1029639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549559" comment="libplist3-1.12-20.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6436" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    The parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436</cve>
	<bugzilla href="https://bugzilla.suse.com/1029751">SUSE bug 1029751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549559" comment="libplist3-1.12-20.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6437" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    The base64encode function in base64.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds read) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437</cve>
	<bugzilla href="https://bugzilla.suse.com/1029707">SUSE bug 1029707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549559" comment="libplist3-1.12-20.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6438" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_unicode_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds write) and possibly code execution via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438</cve>
	<bugzilla href="https://bugzilla.suse.com/1029706">SUSE bug 1029706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549559" comment="libplist3-1.12-20.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6439" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2208-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00082.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_string_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (out-of-bounds write) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439</cve>
	<bugzilla href="https://bugzilla.suse.com/1029638">SUSE bug 1029638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549559" comment="libplist3-1.12-20.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6440" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    The parse_data_node function in bplist.c in libimobiledevice libplist 1.12 allows local users to cause a denial of service (memory allocation error) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440</cve>
	<bugzilla href="https://bugzilla.suse.com/1029631">SUSE bug 1029631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029706">SUSE bug 1029706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550242" comment="libplist3-1.12-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6451" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    The mx4200_send function in the legacy MX4200 refclock in NTP before 4.2.8p10 and 4.3.x before 4.3.94 does not properly handle the return value of the snprintf function, which allows local users to execute arbitrary code via unspecified vectors, which trigger an out-of-bounds memory write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550166" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550167" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6458" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550166" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550167" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6460" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the reslist function in ntpq in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote servers have unspecified impact via a long flagstr variable in a restriction list response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550166" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550167" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the legacy Datum Programmable Time Server (DPTS) refclock driver in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows local users to have unspecified impact via a crafted /dev/datum device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550166" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550167" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote authenticated users to cause a denial of service (daemon crash) via an invalid setting in a :config directive, related to the unpeer option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550166" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550167" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002813.html" source="SUSE-SU"/>
    <description>
    NTP before 4.2.8p10 and 4.3.x before 4.3.94 allows remote attackers to cause a denial of service (ntpd crash) via a malformed mode configuration directive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<bugzilla href="https://bugzilla.suse.com/1030050">SUSE bug 1030050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038049">SUSE bug 1038049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550166" comment="ntp-4.2.8p10-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550167" comment="ntp-doc-4.2.8p10-60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6497" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6497" ref_url="https://www.suse.com/security/cve/CVE-2017-6497" source="SUSE CVE"/>
    <description>
    An issue was discovered in ImageMagick 6.9.7. A specially crafted psd file could lead to a NULL pointer dereference (thus, a DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6497/">CVE-2017-6497</cve>
	<bugzilla href="https://bugzilla.suse.com/1028087">SUSE bug 1028087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6498" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6498" ref_url="https://www.suse.com/security/cve/CVE-2017-6498" source="SUSE CVE"/>
    <description>
    An issue was discovered in ImageMagick 6.9.7. Incorrect TGA files could trigger assertion failures, thus leading to DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6498/">CVE-2017-6498</cve>
	<bugzilla href="https://bugzilla.suse.com/1028085">SUSE bug 1028085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6499" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6499" ref_url="https://www.suse.com/security/cve/CVE-2017-6499" source="SUSE CVE"/>
    <description>
    An issue was discovered in Magick++ in ImageMagick 6.9.7. A specially crafted file creating a nested exception could lead to a memory leak (thus, a DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6499/">CVE-2017-6499</cve>
	<bugzilla href="https://bugzilla.suse.com/1028083">SUSE bug 1028083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6501" ref_url="https://www.suse.com/security/cve/CVE-2017-6501" source="SUSE CVE"/>
    <description>
    An issue was discovered in ImageMagick 6.9.7. A specially crafted xcf file could lead to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6501/">CVE-2017-6501</cve>
	<bugzilla href="https://bugzilla.suse.com/1028071">SUSE bug 1028071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6502" ref_url="https://www.suse.com/security/cve/CVE-2017-6502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 6.9.7. A specially crafted webp file could lead to a file-descriptor leak in libmagickcore (thus, a DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6502/">CVE-2017-6502</cve>
	<bugzilla href="https://bugzilla.suse.com/1028075">SUSE bug 1028075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518569" comment="xen-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550133" comment="xen-doc-html-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518570" comment="xen-libs-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518571" comment="xen-libs-32bit-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550134" comment="xen-tools-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550135" comment="xen-tools-domU-4.7.2_02-36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00011.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<bugzilla href="https://bugzilla.suse.com/1029696">SUSE bug 1029696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550184" comment="apache2-mod_apparmor-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517324" comment="apparmor-docs-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550185" comment="apparmor-parser-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517326" comment="apparmor-profiles-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517327" comment="apparmor-utils-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550186" comment="libapparmor1-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548021" comment="libapparmor1-32bit-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550187" comment="pam_apparmor-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548023" comment="pam_apparmor-32bit-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550188" comment="perl-apparmor-2.8.2-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334066" comment="apparmor is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0890-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-03/msg00113.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<bugzilla href="https://bugzilla.suse.com/1028301">SUSE bug 1028301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159418">SUSE bug 1159418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550055" comment="wget-1.14-20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<bugzilla href="https://bugzilla.suse.com/1042218">SUSE bug 1042218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047178">SUSE bug 1047178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549842" comment="perl-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549843" comment="perl-32bit-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549844" comment="perl-base-5.18.2-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518322" comment="perl-doc-5.18.2-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6519" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6519" ref_url="https://www.suse.com/security/cve/CVE-2017-6519" source="SUSE CVE"/>
    <description>
    avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive  information from the responding device via port-5353 UDP packets.  NOTE: this may overlap CVE-2015-2809.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6519/">CVE-2017-6519</cve>
	<bugzilla href="https://bugzilla.suse.com/1037001">SUSE bug 1037001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338989" comment="avahi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6590" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6590" ref_url="https://www.suse.com/security/cve/CVE-2017-6590" source="SUSE CVE"/>
    <description>
    An issue was discovered in network-manager-applet (aka network-manager-gnome) in Ubuntu 12.04 LTS, 14.04 LTS, 16.04 LTS, and 16.10. A local attacker could use this issue at the default Ubuntu login screen to access local files and execute arbitrary commands as the lightdm user. The exploitation requires physical access to the locked computer and the Wi-Fi must be turned on. An access point that lets you use a certificate to login is required as well, but it's easy to create one. Then, it's possible to open a nautilus window and browse directories. One also can open some applications such as Firefox, which is useful for downloading malicious binaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6590/">CVE-2017-6590</cve>
	<bugzilla href="https://bugzilla.suse.com/1028792">SUSE bug 1028792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334524" comment="NetworkManager-gnome is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the MSADPCM::initializeCoefficients function in MSADPCM.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<bugzilla href="https://bugzilla.suse.com/1026979">SUSE bug 1026979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the readValue function in FileHandle.cpp in audiofile (aka libaudiofile and Audio File Library) 0.3.6 allows remote attackers to have unspecified impact via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<bugzilla href="https://bugzilla.suse.com/1026980">SUSE bug 1026980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    The decodeSample function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<bugzilla href="https://bugzilla.suse.com/1026981">SUSE bug 1026981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the alaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<bugzilla href="https://bugzilla.suse.com/1026982">SUSE bug 1026982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 and 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<bugzilla href="https://bugzilla.suse.com/1026983">SUSE bug 1026983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the decodeBlock in MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0, 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<bugzilla href="https://bugzilla.suse.com/1026984">SUSE bug 1026984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    The runPull function in libaudiofile/modules/BlockCodec.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<bugzilla href="https://bugzilla.suse.com/1026985">SUSE bug 1026985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ulaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0, 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<bugzilla href="https://bugzilla.suse.com/1026986">SUSE bug 1026986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    The reset1 function in libaudiofile/modules/BlockCodec.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<bugzilla href="https://bugzilla.suse.com/1026988">SUSE bug 1026988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Expand3To4Module::run function in libaudiofile/modules/SimpleModule.h in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<bugzilla href="https://bugzilla.suse.com/1026987">SUSE bug 1026987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via vectors related to a large number of coefficients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Integer overflow in sfcommands/sfconvert.c in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1038-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00064.html" source="SUSE-SU"/>
    <description>
    Integer overflow in modules/MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<bugzilla href="https://bugzilla.suse.com/1026978">SUSE bug 1026978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550112" comment="audiofile-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550113" comment="libaudiofile1-0.3.6-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547955" comment="libaudiofile1-32bit-0.3.6-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6850" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002789.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1034-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00061.html" source="SUSE-SU"/>
    <description>
    The jp2_cdef_destroy function in jp2_cod.c in JasPer before 2.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<bugzilla href="https://bugzilla.suse.com/1021868">SUSE bug 1021868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550117" comment="libjasper1-1.900.14-194.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547958" comment="libjasper1-32bit-1.900.14-194.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6874" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6874" ref_url="https://www.suse.com/security/cve/CVE-2017-6874" source="SUSE CVE"/>
    <description>
    Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get_ucounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6874/">CVE-2017-6874</cve>
	<bugzilla href="https://bugzilla.suse.com/1029314">SUSE bug 1029314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6888" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6888" ref_url="https://www.suse.com/security/cve/CVE-2017-6888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1120-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00069.html" source="SUSE-SU"/>
    <description>
    An error in the "read_metadata_vorbiscomment_()" function (src/libFLAC/stream_decoder.c) in FLAC version 1.3.2 can be exploited to cause a memory leak via a specially crafted FLAC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6888/">CVE-2017-6888</cve>
	<bugzilla href="https://bugzilla.suse.com/1091045">SUSE bug 1091045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334525" comment="flac is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6892" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0388-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00018.html" source="SUSE-SU"/>
    <description>
    In libsndfile version 1.0.28, an error in the "aiff_read_chanmap()" function (aiff.c) can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892</cve>
	<bugzilla href="https://bugzilla.suse.com/1043978">SUSE bug 1043978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550592" comment="libsndfile1-1.0.25-36.7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550593" comment="libsndfile1-32bit-1.0.25-36.7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951</cve>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    readelf in GNU Binutils 2.28 writes to illegal addresses while processing corrupt input files containing symbol-difference relocations, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<bugzilla href="https://bugzilla.suse.com/1029909">SUSE bug 1029909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    readelf in GNU Binutils 2.28 has a use-after-free (specifically read-after-free) error while processing multiple, relocated sections in an MSP430 binary. This is caused by mishandling of an invalid symbol index, and mishandling of state across invocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<bugzilla href="https://bugzilla.suse.com/1029908">SUSE bug 1029908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6967" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007149.html" source="SUSE-SU"/>
    <description>
    xrdp 0.9.1 calls the PAM function auth_start_session() in an incorrect location, leading to PAM session modules not being properly initialized, with a potential consequence of incorrect configurations or elevation of privileges, aka a pam_limits.so bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<bugzilla href="https://bugzilla.suse.com/1029912">SUSE bug 1029912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/442182">SUSE bug 442182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334476" comment="xrdp is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531102" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551536" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595663" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    readelf in GNU Binutils 2.28 is vulnerable to a heap-based buffer over-read while processing corrupt RL78 binaries. The vulnerability can trigger program crashes. It may lead to an information leak as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<bugzilla href="https://bugzilla.suse.com/1029907">SUSE bug 1029907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105209">SUSE bug 1105209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7006" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct a timing side-channel attack to bypass the Same Origin Policy and obtain sensitive information via a crafted web site that uses SVG filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7011" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to spoof the address bar via a crafted web site that uses FRAME elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7012" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the "WebKit Web Inspector" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7018" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7019" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit Page Loading" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7020" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7030" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7034" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7037" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7038" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7040" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7041" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7042" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7043" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7046" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7048" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7049" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7052" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7055" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7056" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7059" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    A DOMParser XSS issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7064" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. The issue involves the "WebKit" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<bugzilla href="https://bugzilla.suse.com/1050469">SUSE bug 1050469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334036" comment="libQtWebKit4 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334067" comment="webkitgtk3 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7089" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. The issue involves the "WebKit" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that is mishandled during parent-tab processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7090" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive cookie information via a custom URL scheme.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7091" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7092" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7093" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7094" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7095" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7096" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7098" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7099" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7100" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7102" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7104" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7109" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via crafted web content that incorrectly interacts with the Application Cache policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7117" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7120" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7142" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. Safari before 11 is affected. The issue involves the "WebKit Storage" component. It allows attackers to bypass the Safari Private Browsing protection mechanism, and consequently obtain sensitive information about visited web sites.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142</cve>
	<bugzilla href="https://bugzilla.suse.com/1066892">SUSE bug 1066892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7156" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7157" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00106.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari before 11.0.2 is affected. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. tvOS before 11.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157</cve>
	<bugzilla href="https://bugzilla.suse.com/1073654">SUSE bug 1073654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550451" comment="libjavascriptcoregtk-4_0-18-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550452" comment="libwebkit2gtk-4_0-37-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550453" comment="typelib-1_0-JavaScriptCore-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550454" comment="typelib-1_0-WebKit2-4_0-2.18.5-2.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550455" comment="webkit2gtk-4_0-injected-bundles-2.18.5-2.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7184" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7184" ref_url="https://www.suse.com/security/cve/CVE-2017-7184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0864-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0865-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0866-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0867-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0868-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0875-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0877-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0881-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0885-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0886-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0887-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0888-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00001.html" source="SUSE-SU"/>
    <description>
    The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7184/">CVE-2017-7184</cve>
	<bugzilla href="https://bugzilla.suse.com/1030573">SUSE bug 1030573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030575">SUSE bug 1030575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550103" comment="kernel-default-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550104" comment="kernel-default-base-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550105" comment="kernel-default-devel-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550106" comment="kernel-default-man-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518541" comment="kernel-devel-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518542" comment="kernel-macros-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518543" comment="kernel-source-4.4.49-92.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550107" comment="kernel-syms-4.4.49-92.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186</cve>
	<bugzilla href="https://bugzilla.suse.com/1030066">SUSE bug 1030066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037164">SUSE bug 1037164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333973" comment="pcre is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    The mem_get_bits_rectangle function in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550292" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550293" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The dump_section_as_bytes function in readelf in GNU Binutils 2.28 accesses a NULL pointer while reading section contents in a corrupt binary, leading to a program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030298">SUSE bug 1030298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    objdump in GNU Binutils 2.28 is vulnerable to multiple heap-based buffer over-reads (of size 1 and size 8) while handling corrupt STABS enum type strings in a crafted object file, leading to program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030297">SUSE bug 1030297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7214</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7214" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7214" ref_url="https://www.suse.com/security/cve/CVE-2017-7214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1443-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00074.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in exception_wrapper.py in OpenStack Nova 13.x through 13.1.3, 14.x through 14.0.4, and 15.x through 15.0.1. Legacy notification exception contexts appearing in ERROR level logs may include sensitive information such as account passwords and authorization tokens.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7214/">CVE-2017-7214</cve>
	<bugzilla href="https://bugzilla.suse.com/1030406">SUSE bug 1030406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594325" comment="openstack-ceilometer-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594326" comment="openstack-ceilometer-agent-central-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594327" comment="openstack-ceilometer-agent-compute-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594328" comment="openstack-ceilometer-agent-ipmi-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594329" comment="openstack-ceilometer-agent-notification-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594330" comment="openstack-ceilometer-api-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594331" comment="openstack-ceilometer-collector-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594332" comment="openstack-ceilometer-doc-7.0.4~a0~dev7-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594333" comment="openstack-ceilometer-polling-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594334" comment="openstack-cinder-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594335" comment="openstack-cinder-api-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594336" comment="openstack-cinder-backup-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594337" comment="openstack-cinder-doc-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594338" comment="openstack-cinder-scheduler-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594339" comment="openstack-cinder-volume-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594340" comment="openstack-dashboard-10.0.4~a0~dev2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594341" comment="openstack-glance-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594342" comment="openstack-glance-api-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594343" comment="openstack-glance-doc-13.0.1~a0~dev6-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594344" comment="openstack-glance-glare-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594345" comment="openstack-glance-registry-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594346" comment="openstack-heat-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594347" comment="openstack-heat-api-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594348" comment="openstack-heat-api-cfn-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594349" comment="openstack-heat-api-cloudwatch-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594350" comment="openstack-heat-doc-7.0.4~a0~dev4-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594351" comment="openstack-heat-engine-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594352" comment="openstack-heat-plugin-heat_docker-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594353" comment="openstack-heat-test-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594354" comment="openstack-keystone-10.0.2~a0~dev2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594355" comment="openstack-keystone-doc-10.0.2~a0~dev2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594356" comment="openstack-magnum-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594357" comment="openstack-magnum-api-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594358" comment="openstack-magnum-conductor-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594359" comment="openstack-magnum-doc-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594360" comment="openstack-manila-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594361" comment="openstack-manila-api-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594362" comment="openstack-manila-data-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594363" comment="openstack-manila-doc-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594364" comment="openstack-manila-scheduler-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594365" comment="openstack-manila-share-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594366" comment="openstack-nova-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594367" comment="openstack-nova-api-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594368" comment="openstack-nova-cells-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594369" comment="openstack-nova-cert-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594370" comment="openstack-nova-compute-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594371" comment="openstack-nova-conductor-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594372" comment="openstack-nova-console-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594373" comment="openstack-nova-consoleauth-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594374" comment="openstack-nova-doc-14.0.6~a0~dev16-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594375" comment="openstack-nova-novncproxy-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594376" comment="openstack-nova-placement-api-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594377" comment="openstack-nova-scheduler-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594378" comment="openstack-nova-serialproxy-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594379" comment="openstack-nova-vncproxy-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594380" comment="python-ceilometer-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594381" comment="python-cinder-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594382" comment="python-glance-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594383" comment="python-heat-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594384" comment="python-horizon-10.0.4~a0~dev2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594385" comment="python-keystone-10.0.2~a0~dev2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594386" comment="python-magnum-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594387" comment="python-manila-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594388" comment="python-nova-14.0.6~a0~dev16-3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    GNU assembler in GNU Binutils 2.28 is vulnerable to a global buffer overflow (of size 1) while attempting to unget an EOF character from the input stream, potentially leading to a program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030589">SUSE bug 1030589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7224" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The find_nearest_line function in objdump in GNU Binutils 2.28 is vulnerable to an invalid write (of size 1) while disassembling a corrupt binary that contains an empty function name, leading to a program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030588">SUSE bug 1030588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7225" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The find_nearest_line function in addr2line in GNU Binutils 2.28 does not handle the case where the main file name and the directory name are both empty, triggering a NULL pointer dereference and an invalid write, and leading to a program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030585">SUSE bug 1030585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7226" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The pe_ILF_object_p function in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a heap-based buffer over-read of size 4049 because it uses the strlen function instead of strnlen, leading to program crashes in several utilities such as addr2line, size, and strings. It could lead to information disclosure as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030584">SUSE bug 1030584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105209">SUSE bug 1105209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7227" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7227" ref_url="https://www.suse.com/security/cve/CVE-2017-7227" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU linker (ld) in GNU Binutils 2.28 is vulnerable to a heap-based buffer overflow while processing a bogus input script, leading to a program crash. This relates to lack of '\0' termination of a name field in ldlex.l.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7227/">CVE-2017-7227</cve>
	<bugzilla href="https://bugzilla.suse.com/1030583">SUSE bug 1030583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7228" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7228" ref_url="https://www.suse.com/security/cve/CVE-2017-7228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7228/">CVE-2017-7228</cve>
	<bugzilla href="https://bugzilla.suse.com/1030442">SUSE bug 1030442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009518569" comment="xen-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550133" comment="xen-doc-html-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518570" comment="xen-libs-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518571" comment="xen-libs-32bit-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550134" comment="xen-tools-4.7.2_02-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550135" comment="xen-tools-domU-4.7.2_02-36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7233</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7233" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7233" ref_url="https://www.suse.com/security/cve/CVE-2017-7233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0632-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an "on success" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs "safe" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7233/">CVE-2017-7233</cve>
	<bugzilla href="https://bugzilla.suse.com/1031450">SUSE bug 1031450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594740" comment="python-Django-1.8.19-3.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7234</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7234" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7234" ref_url="https://www.suse.com/security/cve/CVE-2017-7234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0632-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the ``django.views.static.serve()`` view could redirect to any other domain, aka an open redirect vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7234/">CVE-2017-7234</cve>
	<bugzilla href="https://bugzilla.suse.com/1031451">SUSE bug 1031451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594740" comment="python-Django-1.8.19-3.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244</cve>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7245" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245</cve>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7246" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246</cve>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334068" comment="pcre is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7261" ref_url="https://www.suse.com/security/cve/CVE-2017-7261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7261/">CVE-2017-7261</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031052">SUSE bug 1031052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7275" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7275" ref_url="https://www.suse.com/security/cve/CVE-2017-7275" source="SUSE CVE"/>
    <description>
    The ReadPCXImage function in coders/pcx.c in ImageMagick 7.0.4.9 allows remote attackers to cause a denial of service (attempted large memory allocation and application crash) via a crafted file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862 and CVE-2016-8866.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7275/">CVE-2017-7275</cve>
	<bugzilla href="https://bugzilla.suse.com/1031267">SUSE bug 1031267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7277" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7277" ref_url="https://www.suse.com/security/cve/CVE-2017-7277" source="SUSE CVE"/>
    <description>
    The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/socket.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7277/">CVE-2017-7277</cve>
	<bugzilla href="https://bugzilla.suse.com/1031265">SUSE bug 1031265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7286" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7286" ref_url="https://www.suse.com/security/cve/CVE-2017-7286" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7286/">CVE-2017-7286</cve>
	<bugzilla href="https://bugzilla.suse.com/1033458">SUSE bug 1033458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7294" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7294" ref_url="https://www.suse.com/security/cve/CVE-2017-7294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7294/">CVE-2017-7294</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031440">SUSE bug 1031440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031481">SUSE bug 1031481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7299" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an invalid read (of size 8) because the code to emit relocs (bfd_elf_final_link function in bfd/elflink.c) does not check the format of the input file before trying to read the ELF reloc section header. The vulnerability leads to a GNU linker (ld) program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031644">SUSE bug 1031644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7300" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that is vulnerable to a heap-based buffer over-read (off-by-one) because of an incomplete check for invalid string offsets while loading symbols, leading to a GNU linker (ld) program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031656">SUSE bug 1031656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7301" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has an aout_link_add_symbols function in bfd/aoutx.h that has an off-by-one vulnerability because it does not carefully check the string offset. The vulnerability could lead to a GNU linker (ld) program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031638">SUSE bug 1031638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7302" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a swap_std_reloc_out function in bfd/aoutx.h that is vulnerable to an invalid read (of size 4) because of missing checks for relocs that could not be recognised. This vulnerability causes Binutils utilities like strip to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031595">SUSE bug 1031595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7303" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 4) because of missing a check (in the find_link function) for null headers before attempting to match them. This vulnerability causes Binutils utilities like strip to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031593">SUSE bug 1031593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7304" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read (of size 8) because of missing a check (in the copy_special_section_fields function) for an invalid sh_link field before attempting to follow it. This vulnerability causes Binutils utilities like strip to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<bugzilla href="https://bugzilla.suse.com/1030295">SUSE bug 1030295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031590">SUSE bug 1031590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7308" ref_url="https://www.suse.com/security/cve/CVE-2017-7308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1277-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1287-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1297-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1299-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7308/">CVE-2017-7308</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031579">SUSE bug 1031579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031660">SUSE bug 1031660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7319" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7319" ref_url="https://www.suse.com/security/cve/CVE-2017-7319" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7319/">CVE-2017-7319</cve>
	<bugzilla href="https://bugzilla.suse.com/1033438">SUSE bug 1033438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7346" ref_url="https://www.suse.com/security/cve/CVE-2017-7346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The vmw_gb_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.7 does not validate certain levels data, which allows local users to cause a denial of service (system hang) via a crafted ioctl call for a /dev/dri/renderD* device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7346/">CVE-2017-7346</cve>
	<bugzilla href="https://bugzilla.suse.com/1031796">SUSE bug 1031796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7374" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7374" ref_url="https://www.suse.com/security/cve/CVE-2017-7374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7374/">CVE-2017-7374</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032006">SUSE bug 1032006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550200" comment="kernel-default-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550201" comment="kernel-default-base-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550202" comment="kernel-default-devel-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550203" comment="kernel-default-man-4.4.59-92.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518622" comment="kernel-devel-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518623" comment="kernel-macros-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518624" comment="kernel-source-4.4.59-92.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550204" comment="kernel-syms-4.4.59-92.17.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7375" ref_url="https://www.suse.com/security/cve/CVE-2017-7375" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1810-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00040.html" source="SUSE-SU"/>
    <description>
    A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7375/">CVE-2017-7375</cve>
	<bugzilla href="https://bugzilla.suse.com/1044894">SUSE bug 1044894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549410" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549411" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532226" comment="libxml2-doc-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549412" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549413" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7376" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7376" ref_url="https://www.suse.com/security/cve/CVE-2017-7376" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1810-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00040.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7376/">CVE-2017-7376</cve>
	<bugzilla href="https://bugzilla.suse.com/1044887">SUSE bug 1044887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549410" comment="libxml2-2-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549411" comment="libxml2-2-32bit-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532226" comment="libxml2-doc-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549412" comment="libxml2-tools-2.9.4-45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549413" comment="python-libxml2-2.9.4-45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7377" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7377" ref_url="https://www.suse.com/security/cve/CVE-2017-7377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    The (1) v9fs_create and (2) v9fs_lcreate functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS privileged users to cause a denial of service (file descriptor or memory consumption) via vectors related to an already in-use fid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7377/">CVE-2017-7377</cve>
	<bugzilla href="https://bugzilla.suse.com/1032075">SUSE bug 1032075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7392" ref_url="https://www.suse.com/security/cve/CVE-2017-7392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (SSecurityVeNCrypt.cxx SSecurityVeNCrypt::SSecurityVeNCrypt), an unauthenticated client can cause a small memory leak in the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7392/">CVE-2017-7392</cve>
	<bugzilla href="https://bugzilla.suse.com/1031886">SUSE bug 1031886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550172" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550173" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550174" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7393" ref_url="https://www.suse.com/security/cve/CVE-2017-7393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (VNCSConnectionST.cxx VNCSConnectionST::fence), an authenticated client can cause a double free, leading to denial of service or potentially code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7393/">CVE-2017-7393</cve>
	<bugzilla href="https://bugzilla.suse.com/1031875">SUSE bug 1031875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031879">SUSE bug 1031879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550172" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550173" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550174" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7394" ref_url="https://www.suse.com/security/cve/CVE-2017-7394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (SSecurityPlain.cxx SSecurityPlain::processMsg), unauthenticated users can crash the server by sending long usernames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7394/">CVE-2017-7394</cve>
	<bugzilla href="https://bugzilla.suse.com/1031879">SUSE bug 1031879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550172" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550173" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550174" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7395" ref_url="https://www.suse.com/security/cve/CVE-2017-7395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (SMsgReader.cxx SMsgReader::readClientCutText), by causing an integer overflow, an authenticated client can crash the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7395/">CVE-2017-7395</cve>
	<bugzilla href="https://bugzilla.suse.com/1031877">SUSE bug 1031877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550172" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550173" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550174" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7396" ref_url="https://www.suse.com/security/cve/CVE-2017-7396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1028-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00057.html" source="SUSE-SU"/>
    <description>
    In TigerVNC 1.7.1 (CConnection.cxx CConnection::CConnection), an unauthenticated client can cause a small memory leak in the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7396/">CVE-2017-7396</cve>
	<bugzilla href="https://bugzilla.suse.com/1031886">SUSE bug 1031886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550172" comment="libXvnc1-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550173" comment="tigervnc-1.6.0-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550174" comment="xorg-x11-Xvnc-1.6.0-18.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7400</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7400" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7400" ref_url="https://www.suse.com/security/cve/CVE-2017-7400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1443-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00074.html" source="SUSE-SU"/>
    <description>
    OpenStack Horizon 9.x through 9.1.1, 10.x through 10.0.2, and 11.0.0 allows remote authenticated administrators to conduct XSS attacks via a crafted federation mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7400/">CVE-2017-7400</cve>
	<bugzilla href="https://bugzilla.suse.com/1032322">SUSE bug 1032322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594325" comment="openstack-ceilometer-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594326" comment="openstack-ceilometer-agent-central-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594327" comment="openstack-ceilometer-agent-compute-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594328" comment="openstack-ceilometer-agent-ipmi-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594329" comment="openstack-ceilometer-agent-notification-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594330" comment="openstack-ceilometer-api-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594331" comment="openstack-ceilometer-collector-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594332" comment="openstack-ceilometer-doc-7.0.4~a0~dev7-3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594333" comment="openstack-ceilometer-polling-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594334" comment="openstack-cinder-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594335" comment="openstack-cinder-api-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594336" comment="openstack-cinder-backup-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594337" comment="openstack-cinder-doc-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594338" comment="openstack-cinder-scheduler-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594339" comment="openstack-cinder-volume-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594340" comment="openstack-dashboard-10.0.4~a0~dev2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594341" comment="openstack-glance-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594342" comment="openstack-glance-api-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594343" comment="openstack-glance-doc-13.0.1~a0~dev6-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594344" comment="openstack-glance-glare-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594345" comment="openstack-glance-registry-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594346" comment="openstack-heat-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594347" comment="openstack-heat-api-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594348" comment="openstack-heat-api-cfn-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594349" comment="openstack-heat-api-cloudwatch-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594350" comment="openstack-heat-doc-7.0.4~a0~dev4-4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594351" comment="openstack-heat-engine-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594352" comment="openstack-heat-plugin-heat_docker-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594353" comment="openstack-heat-test-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594354" comment="openstack-keystone-10.0.2~a0~dev2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594355" comment="openstack-keystone-doc-10.0.2~a0~dev2-6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594356" comment="openstack-magnum-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594357" comment="openstack-magnum-api-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594358" comment="openstack-magnum-conductor-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594359" comment="openstack-magnum-doc-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594360" comment="openstack-manila-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594361" comment="openstack-manila-api-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594362" comment="openstack-manila-data-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594363" comment="openstack-manila-doc-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594364" comment="openstack-manila-scheduler-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594365" comment="openstack-manila-share-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594366" comment="openstack-nova-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594367" comment="openstack-nova-api-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594368" comment="openstack-nova-cells-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594369" comment="openstack-nova-cert-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594370" comment="openstack-nova-compute-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594371" comment="openstack-nova-conductor-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594372" comment="openstack-nova-console-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594373" comment="openstack-nova-consoleauth-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594374" comment="openstack-nova-doc-14.0.6~a0~dev16-3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594375" comment="openstack-nova-novncproxy-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594376" comment="openstack-nova-placement-api-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594377" comment="openstack-nova-scheduler-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594378" comment="openstack-nova-serialproxy-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594379" comment="openstack-nova-vncproxy-14.0.6~a0~dev16-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594380" comment="python-ceilometer-7.0.4~a0~dev7-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594381" comment="python-cinder-9.1.5~a0~dev1-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594382" comment="python-glance-13.0.1~a0~dev6-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594383" comment="python-heat-7.0.4~a0~dev4-4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594384" comment="python-horizon-10.0.4~a0~dev2-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594385" comment="python-keystone-10.0.2~a0~dev2-6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594386" comment="python-magnum-3.1.2~a0~dev22-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594387" comment="python-manila-3.0.1~a0~dev27-3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594388" comment="python-nova-14.0.6~a0~dev16-3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7407" ref_url="https://www.suse.com/security/cve/CVE-2017-7407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1105-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00094.html" source="SUSE-SU"/>
    <description>
    The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7407/">CVE-2017-7407</cve>
	<bugzilla href="https://bugzilla.suse.com/1032309">SUSE bug 1032309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550162" comment="curl-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550163" comment="libcurl4-7.37.0-36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547995" comment="libcurl4-32bit-7.37.0-36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="TID000018998" ref_url="https://www.suse.com/support/kb/doc/?id=000018998" source="SUSE-SU"/>
		<reference ref_id="TID7021171" ref_url="https://www.suse.com/support/kb/doc/?id=7021171" source="SUSE-SU"/>
		<reference ref_id="TID7021201" ref_url="https://www.suse.com/support/kb/doc/?id=7021201" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00005.html" source="SUSE-SU"/>
    <description>
    In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435</cve>
	<bugzilla href="https://bugzilla.suse.com/1009127">SUSE bug 1009127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549520" comment="libzypp-16.15.2-27.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549521" comment="zypper-1.13.30-18.13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517973" comment="zypper-log-1.13.30-18.13.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7436" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="TID000018998" ref_url="https://www.suse.com/support/kb/doc/?id=000018998" source="SUSE-SU"/>
		<reference ref_id="TID7021171" ref_url="https://www.suse.com/support/kb/doc/?id=7021171" source="SUSE-SU"/>
		<reference ref_id="TID7021201" ref_url="https://www.suse.com/support/kb/doc/?id=7021201" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00014.html" source="SUSE-SU"/>
    <description>
    In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<bugzilla href="https://bugzilla.suse.com/1008325">SUSE bug 1008325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009127">SUSE bug 1009127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549520" comment="libzypp-16.15.2-27.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549521" comment="zypper-1.13.30-18.13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517973" comment="zypper-log-1.13.30-18.13.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7466</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7466" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7466" ref_url="https://www.suse.com/security/cve/CVE-2017-7466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00057.html" source="SUSE-SU"/>
    <description>
    Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7466/">CVE-2017-7466</cve>
	<bugzilla href="https://bugzilla.suse.com/1019021">SUSE bug 1019021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594299" comment="ansible-2.2.3.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594300" comment="monasca-installer-20170912_10.45-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7467" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002832.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2192-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00069.html" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found in the way minicom before version 2.7.1 handled VT100 escape sequences. A malicious terminal device could potentially use this flaw to crash minicom, or execute arbitrary code in the context of the minicom process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<bugzilla href="https://bugzilla.suse.com/1033783">SUSE bug 1033783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550171" comment="minicom-2.7-3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7468" ref_url="https://www.suse.com/security/cve/CVE-2017-7468" source="SUSE CVE"/>
    <description>
    In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7468/">CVE-2017-7468</cve>
	<bugzilla href="https://bugzilla.suse.com/1033413">SUSE bug 1033413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033442">SUSE bug 1033442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042181">SUSE bug 1042181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7471" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034990">SUSE bug 1034990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
    <description>
    Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549363" comment="libcairo-gobject2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549364" comment="libcairo-gobject2-32bit-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549365" comment="libcairo-script-interpreter2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549366" comment="libcairo2-1.15.2-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549367" comment="libcairo2-32bit-1.15.2-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7476" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476" source="SUSE CVE"/>
    <description>
    Gnulib before 2017-04-26 has a heap-based buffer overflow with the TZ environment variable. The error is in the save_abbr function in time_rz.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476</cve>
	<bugzilla href="https://bugzilla.suse.com/1036636">SUSE bug 1036636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037124">SUSE bug 1037124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037125">SUSE bug 1037125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037142">SUSE bug 1037142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333935" comment="coreutils is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334070" comment="emacs is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334071" comment="lftp is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7477" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7477" ref_url="https://www.suse.com/security/cve/CVE-2017-7477" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in drivers/net/macsec.c in the MACsec module in the Linux kernel through 4.10.12 allows attackers to cause a denial of service or possibly have unspecified other impact by leveraging the use of a MAX_SKB_FRAGS+1 size in conjunction with the NETIF_F_FRAGLIST feature, leading to an error in the skb_to_sgvec function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7477/">CVE-2017-7477</cve>
	<bugzilla href="https://bugzilla.suse.com/1035823">SUSE bug 1035823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7478" ref_url="https://www.suse.com/security/cve/CVE-2017-7478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00077.html" source="SUSE-SU"/>
    <description>
    OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7478/">CVE-2017-7478</cve>
	<bugzilla href="https://bugzilla.suse.com/1038709">SUSE bug 1038709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550378" comment="openvpn-2.3.8-16.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550379" comment="openvpn-auth-pam-plugin-2.3.8-16.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7479" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7479" ref_url="https://www.suse.com/security/cve/CVE-2017-7479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1638-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00077.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7479/">CVE-2017-7479</cve>
	<bugzilla href="https://bugzilla.suse.com/1038711">SUSE bug 1038711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038713">SUSE bug 1038713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550378" comment="openvpn-2.3.8-16.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550379" comment="openvpn-auth-pam-plugin-2.3.8-16.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7481</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7481" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7481" ref_url="https://www.suse.com/security/cve/CVE-2017-7481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003400.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2976-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2978-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00057.html" source="SUSE-SU"/>
    <description>
    Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7481/">CVE-2017-7481</cve>
	<bugzilla href="https://bugzilla.suse.com/1038785">SUSE bug 1038785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594299" comment="ansible-2.2.3.0-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594300" comment="monasca-installer-20170912_10.45-5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482</cve>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7484" ref_url="https://www.suse.com/security/cve/CVE-2017-7484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1772-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html" source="SUSE-SU"/>
    <description>
    It was found that some selectivity estimation functions in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3 did not check user privileges before providing information from pg_statistic, possibly leaking information. An unprivileged attacker could use this flaw to steal some information from tables they are otherwise not allowed to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7484/">CVE-2017-7484</cve>
	<bugzilla href="https://bugzilla.suse.com/1037603">SUSE bug 1037603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549378" comment="postgresql94-9.4.12-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549379" comment="postgresql94-contrib-9.4.12-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532193" comment="postgresql94-docs-9.4.12-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549380" comment="postgresql94-server-9.4.12-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7485" ref_url="https://www.suse.com/security/cve/CVE-2017-7485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1772-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html" source="SUSE-SU"/>
    <description>
    In PostgreSQL 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3, it was found that the PGREQUIRESSL environment variable was no longer enforcing a SSL/TLS connection to a PostgreSQL server. An active Man-in-the-Middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7485/">CVE-2017-7485</cve>
	<bugzilla href="https://bugzilla.suse.com/1038293">SUSE bug 1038293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549378" comment="postgresql94-9.4.12-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549379" comment="postgresql94-contrib-9.4.12-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532193" comment="postgresql94-docs-9.4.12-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549380" comment="postgresql94-server-9.4.12-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7486" ref_url="https://www.suse.com/security/cve/CVE-2017-7486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1495-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1772-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00016.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7486/">CVE-2017-7486</cve>
	<bugzilla href="https://bugzilla.suse.com/1037624">SUSE bug 1037624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051015">SUSE bug 1051015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549378" comment="postgresql94-9.4.12-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549379" comment="postgresql94-contrib-9.4.12-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532193" comment="postgresql94-docs-9.4.12-20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549380" comment="postgresql94-server-9.4.12-20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487</cve>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038883">SUSE bug 1038883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7493" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002918.html" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7017947" ref_url="https://www.suse.com/support/kb/doc/?id=7017947" source="SUSE-SU"/>
		<reference ref_id="TID7019508" ref_url="https://www.suse.com/support/kb/doc/?id=7019508" source="SUSE-SU"/>
		<reference ref_id="TID7021068" ref_url="https://www.suse.com/support/kb/doc/?id=7021068" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1401-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00072.html" source="SUSE-SU"/>
    <description>
    Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<bugzilla href="https://bugzilla.suse.com/1038231">SUSE bug 1038231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550286" comment="libdcerpc-atsvc0-4.2.4-28.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550243" comment="libdcerpc-binding0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550244" comment="libdcerpc-binding0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550245" comment="libdcerpc0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550246" comment="libdcerpc0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550247" comment="libndr-krb5pac0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550248" comment="libndr-krb5pac0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550249" comment="libndr-nbt0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550250" comment="libndr-nbt0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550251" comment="libndr-standard0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550252" comment="libndr-standard0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550253" comment="libndr0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550254" comment="libndr0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550255" comment="libnetapi0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550256" comment="libnetapi0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550257" comment="libsamba-credentials0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550258" comment="libsamba-credentials0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550259" comment="libsamba-errors0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550260" comment="libsamba-errors0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550261" comment="libsamba-hostconfig0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550262" comment="libsamba-hostconfig0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550263" comment="libsamba-passdb0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550264" comment="libsamba-passdb0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550265" comment="libsamba-util0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550266" comment="libsamba-util0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550267" comment="libsamdb0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550268" comment="libsamdb0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550269" comment="libsmbclient0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550270" comment="libsmbclient0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550271" comment="libsmbconf0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550272" comment="libsmbconf0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550273" comment="libsmbldap0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550274" comment="libsmbldap0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550275" comment="libtevent-util0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550276" comment="libtevent-util0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550277" comment="libwbclient0-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550278" comment="libwbclient0-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550279" comment="samba-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550280" comment="samba-client-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550281" comment="samba-client-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518677" comment="samba-doc-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550282" comment="samba-libs-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550283" comment="samba-libs-32bit-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550284" comment="samba-winbind-4.4.2-38.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550285" comment="samba-winbind-32bit-4.4.2-38.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7495" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7495" ref_url="https://www.suse.com/security/cve/CVE-2017-7495" source="SUSE CVE"/>
    <description>
    fs/ext4/inode.c in the Linux kernel before 4.6.2, when ext4 data=ordered mode is used, mishandles a needs-flushing-before-commit list, which allows local users to obtain sensitive information from other users' files in opportunistic circumstances by waiting for a hardware reset, creating a new file, making write system calls, and reading this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7495/">CVE-2017-7495</cve>
	<bugzilla href="https://bugzilla.suse.com/1039010">SUSE bug 1039010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00058.html" source="SUSE-SU"/>
    <description>
    It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135195">SUSE bug 1135195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157882">SUSE bug 1157882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521784" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545949" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545950" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545951" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545952" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545953" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594669" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594670" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545951" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594671" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594672" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3373-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00058.html" source="SUSE-SU"/>
    <description>
    It was found that versions of rpm before 4.13.0.2 use temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501</cve>
	<bugzilla href="https://bugzilla.suse.com/1119217">SUSE bug 1119217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135195">SUSE bug 1135195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157882">SUSE bug 1157882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521784" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520377" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520378" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520379" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520380" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545949" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545950" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545951" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545952" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545953" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594669" comment="python3-rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594670" comment="rpm-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545951" comment="rpm-32bit-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594671" comment="rpm-build-4.11.2-16.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594672" comment="rpm-python-4.11.2-16.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7506" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7506" ref_url="https://www.suse.com/security/cve/CVE-2017-7506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1836-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1837-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2552-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1843-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00084.html" source="SUSE-SU"/>
    <description>
    spice versions though 0.13 are vulnerable to out-of-bounds memory access when processing specially crafted messages from authenticated attacker to the spice server resulting into crash and/or server memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7506/">CVE-2017-7506</cve>
	<bugzilla href="https://bugzilla.suse.com/1046779">SUSE bug 1046779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047730">SUSE bug 1047730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517898" comment="libspice-server1-0.12.7-10.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7507" ref_url="https://www.suse.com/security/cve/CVE-2017-7507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00064.html" source="SUSE-SU"/>
    <description>
    GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7507/">CVE-2017-7507</cve>
	<bugzilla href="https://bugzilla.suse.com/1043398">SUSE bug 1043398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549451" comment="gnutls-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549452" comment="libgnutls-openssl27-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549453" comment="libgnutls28-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549454" comment="libgnutls28-32bit-3.2.15-18.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7508" ref_url="https://www.suse.com/security/cve/CVE-2017-7508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1642-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service when receiving malformed IPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7508/">CVE-2017-7508</cve>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549338" comment="openvpn-2.3.8-16.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549339" comment="openvpn-auth-pam-plugin-2.3.8-16.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7511" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    poppler since version 0.17.3 has been vulnerable to NULL pointer dereference in pdfunite triggered by specially crafted documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511</cve>
	<bugzilla href="https://bugzilla.suse.com/1041783">SUSE bug 1041783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549497" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549498" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549499" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549500" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334072" comment="poppler is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7515" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    poppler through version 0.55.0 is vulnerable to an uncontrolled recursion in pdfunite resulting into potential denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515</cve>
	<bugzilla href="https://bugzilla.suse.com/1043088">SUSE bug 1043088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549497" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549498" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549499" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549500" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7516" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7516" ref_url="https://www.suse.com/security/cve/CVE-2017-7516" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2015-1197.  Reason: This candidate is a duplicate of CVE-2015-1197.  Notes: All CVE users should reference CVE-2015-1197 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7516/">CVE-2017-7516</cve>
	<bugzilla href="https://bugzilla.suse.com/1077990">SUSE bug 1077990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913677">SUSE bug 913677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338991" comment="cpio is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7518" ref_url="https://www.suse.com/security/cve/CVE-2017-7518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00010.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7518/">CVE-2017-7518</cve>
	<bugzilla href="https://bugzilla.suse.com/1045922">SUSE bug 1045922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7520" ref_url="https://www.suse.com/security/cve/CVE-2017-7520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service and/or possibly sensitive memory leak triggered by man-in-the-middle attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7520/">CVE-2017-7520</cve>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549338" comment="openvpn-2.3.8-16.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549339" comment="openvpn-auth-pam-plugin-2.3.8-16.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1635-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00031.html" source="SUSE-SU"/>
    <description>
    OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<bugzilla href="https://bugzilla.suse.com/1044947">SUSE bug 1044947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549338" comment="openvpn-2.3.8-16.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549339" comment="openvpn-auth-pam-plugin-2.3.8-16.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1822-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00043.html" source="SUSE-SU"/>
    <description>
    libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047462">SUSE bug 1047462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123792">SUSE bug 1123792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549437" comment="libgcrypt20-1.6.1-16.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549438" comment="libgcrypt20-32bit-1.6.1-16.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549439" comment="libgcrypt20-hmac-1.6.1-16.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549440" comment="libgcrypt20-hmac-32bit-1.6.1-16.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7533" ref_url="https://www.suse.com/security/cve/CVE-2017-7533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7533/">CVE-2017-7533</cve>
	<bugzilla href="https://bugzilla.suse.com/1049483">SUSE bug 1049483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050677">SUSE bug 1050677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050751">SUSE bug 1050751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549515" comment="kernel-default-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549516" comment="kernel-default-base-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549517" comment="kernel-default-devel-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549518" comment="kernel-default-man-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517967" comment="kernel-devel-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517968" comment="kernel-macros-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517969" comment="kernel-source-4.4.74-92.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549519" comment="kernel-syms-4.4.74-92.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00032.html" source="SUSE-SU"/>
    <description>
    The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541</cve>
	<bugzilla href="https://bugzilla.suse.com/1049645">SUSE bug 1049645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00032.html" source="SUSE-SU"/>
    <description>
    The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061936">SUSE bug 1061936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7543</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7543" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7543" ref_url="https://www.suse.com/security/cve/CVE-2017-7543" source="SUSE CVE"/>
    <description>
    A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7543/">CVE-2017-7543</cve>
	<bugzilla href="https://bugzilla.suse.com/1052914">SUSE bug 1052914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334446" comment="openstack-neutron is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7544" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0211-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c caused by improper length computation of the allocated data of an ExifMnote entry which can cause denial-of-service or possibly information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550437" comment="libexif12-0.6.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550438" comment="libexif12-32bit-0.6.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7546" ref_url="https://www.suse.com/security/cve/CVE-2017-7546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to incorrect authentication flaw allowing remote attackers to gain access to database accounts with an empty password.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7546/">CVE-2017-7546</cve>
	<bugzilla href="https://bugzilla.suse.com/1051684">SUSE bug 1051684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549598" comment="libecpg6-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549599" comment="libpq5-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544979" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549595" comment="postgresql94-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549596" comment="postgresql94-contrib-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532380" comment="postgresql94-docs-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549597" comment="postgresql94-server-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549600" comment="postgresql96-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549601" comment="postgresql96-contrib-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532386" comment="postgresql96-docs-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549602" comment="postgresql96-server-9.6.4-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7547" ref_url="https://www.suse.com/security/cve/CVE-2017-7547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7547/">CVE-2017-7547</cve>
	<bugzilla href="https://bugzilla.suse.com/1051685">SUSE bug 1051685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549598" comment="libecpg6-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549599" comment="libpq5-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544979" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549595" comment="postgresql94-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549596" comment="postgresql94-contrib-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532380" comment="postgresql94-docs-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549597" comment="postgresql94-server-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549600" comment="postgresql96-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549601" comment="postgresql96-contrib-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532386" comment="postgresql96-docs-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549602" comment="postgresql96-server-9.6.4-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7548" ref_url="https://www.suse.com/security/cve/CVE-2017-7548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2356-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions before 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers with no privileges on a large object to overwrite the entire contents of the object, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-7548/">CVE-2017-7548</cve>
	<bugzilla href="https://bugzilla.suse.com/1053259">SUSE bug 1053259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054365">SUSE bug 1054365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549598" comment="libecpg6-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549599" comment="libpq5-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009544979" comment="libpq5-32bit-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549595" comment="postgresql94-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549596" comment="postgresql94-contrib-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532380" comment="postgresql94-docs-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549597" comment="postgresql94-server-9.4.13-21.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549600" comment="postgresql96-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549601" comment="postgresql96-contrib-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532386" comment="postgresql96-docs-9.6.4-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549602" comment="postgresql96-server-9.6.4-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7550</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7550" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0605-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2976-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2978-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00029.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host's logs. This flaw was fixed by not allowing passwords to be specified in the "params" argument, and noting this in the module documentation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550</cve>
	<bugzilla href="https://bugzilla.suse.com/1035124">SUSE bug 1035124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065872">SUSE bug 1065872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594735" comment="ansible-2.2.3.0-9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7555" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
    <description>
    Augeas versions up to and including 1.8.0 are vulnerable to heap-based buffer overflow due to improper handling of escaped strings. Attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550756" comment="augeas-1.2.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550757" comment="augeas-lenses-1.2.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550758" comment="libaugeas0-1.2.0-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7558" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7558" ref_url="https://www.suse.com/security/cve/CVE-2017-7558" source="SUSE CVE"/>
    <description>
    A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7558/">CVE-2017-7558</cve>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055300">SUSE bug 1055300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7585" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1107-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550241" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548072" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7586" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1107-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00096.html" source="SUSE-SU"/>
    <description>
    In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586</cve>
	<bugzilla href="https://bugzilla.suse.com/1033053">SUSE bug 1033053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550161" comment="libsndfile1-1.0.25-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009547992" comment="libsndfile1-32bit-1.0.25-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7592" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The putagreytile function in tif_getimage.c in LibTIFF 4.0.7 has a left-shift undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592</cve>
	<bugzilla href="https://bugzilla.suse.com/1033131">SUSE bug 1033131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7593" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    tif_read.c in LibTIFF 4.0.7 does not ensure that tif_rawdata is properly initialized, which might allow remote attackers to obtain sensitive information from process memory via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<bugzilla href="https://bugzilla.suse.com/1033129">SUSE bug 1033129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7594" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The OJPEGReadHeaderInfoSecTablesDcTable function in tif_ojpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (memory leak) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594</cve>
	<bugzilla href="https://bugzilla.suse.com/1033128">SUSE bug 1033128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7595" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    The JPEGSetupEncode function in tiff_jpeg.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7596" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7597" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    tif_dirread.c in LibTIFF 4.0.7 has an "outside the range of representable values of type float" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7598" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    tif_dirread.c in LibTIFF 4.0.7 might allow remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598</cve>
	<bugzilla href="https://bugzilla.suse.com/1033118">SUSE bug 1033118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7599" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has an "outside the range of representable values of type short" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7600" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<bugzilla href="https://bugzilla.suse.com/1033112">SUSE bug 1033112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033113">SUSE bug 1033113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033120">SUSE bug 1033120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033126">SUSE bug 1033126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7601" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has a "shift exponent too large for 64-bit type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<bugzilla href="https://bugzilla.suse.com/1033111">SUSE bug 1033111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033127">SUSE bug 1033127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7602" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.0.7 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<bugzilla href="https://bugzilla.suse.com/1033109">SUSE bug 1033109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7606" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7606" ref_url="https://www.suse.com/security/cve/CVE-2017-7606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    coders/rle.c in ImageMagick 7.0.5-4 has an "outside the range of representable values of type unsigned char" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7606/">CVE-2017-7606</cve>
	<bugzilla href="https://bugzilla.suse.com/1033091">SUSE bug 1033091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334529" comment="elfutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334529" comment="elfutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7609" ref_url="https://www.suse.com/security/cve/CVE-2017-7609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7609/">CVE-2017-7609</cve>
	<bugzilla href="https://bugzilla.suse.com/1033086">SUSE bug 1033086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334529" comment="elfutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334529" comment="elfutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334529" comment="elfutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html" source="SUSE-SU"/>
    <description>
    elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334529" comment="elfutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7614" ref_url="https://www.suse.com/security/cve/CVE-2017-7614" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a "member access within null pointer" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an "int main() {return 0;}" program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7614/">CVE-2017-7614</cve>
	<bugzilla href="https://bugzilla.suse.com/1033122">SUSE bug 1033122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105209">SUSE bug 1105209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7616" ref_url="https://www.suse.com/security/cve/CVE-2017-7616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7616/">CVE-2017-7616</cve>
	<bugzilla href="https://bugzilla.suse.com/1033336">SUSE bug 1033336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7618" ref_url="https://www.suse.com/security/cve/CVE-2017-7618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00016.html" source="SUSE-SU"/>
    <description>
    crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7618/">CVE-2017-7618</cve>
	<bugzilla href="https://bugzilla.suse.com/1033340">SUSE bug 1033340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7619" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7619" ref_url="https://www.suse.com/security/cve/CVE-2017-7619" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.4-9, an infinite loop can occur because of a floating-point rounding error in some of the color algorithms. This affects ModulateHSL, ModulateHCL, ModulateHCLp, ModulateHSB, ModulateHSI, ModulateHSV, ModulateHWB, ModulateLCHab, and ModulateLCHuv.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7619/">CVE-2017-7619</cve>
	<bugzilla href="https://bugzilla.suse.com/1033361">SUSE bug 1033361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7659" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7659" ref_url="https://www.suse.com/security/cve/CVE-2017-7659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00108.html" source="SUSE-SU"/>
    <description>
    A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7659/">CVE-2017-7659</cve>
	<bugzilla href="https://bugzilla.suse.com/1045160">SUSE bug 1045160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550512" comment="apache2-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533082" comment="apache2-doc-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550513" comment="apache2-example-pages-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550514" comment="apache2-prefork-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550515" comment="apache2-utils-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550516" comment="apache2-worker-2.4.23-29.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7668" ref_url="https://www.suse.com/security/cve/CVE-2017-7668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
    <description>
    The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7668/">CVE-2017-7668</cve>
	<bugzilla href="https://bugzilla.suse.com/1045061">SUSE bug 1045061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333965" comment="apache2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7674" ref_url="https://www.suse.com/security/cve/CVE-2017-7674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3069-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00033.html" source="SUSE-SU"/>
    <description>
    The CORS Filter in Apache Tomcat 9.0.0.M1 to 9.0.0.M21, 8.5.0 to 8.5.15, 8.0.0.RC1 to 8.0.44 and 7.0.41 to 7.0.78 did not add an HTTP Vary header indicating that the response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7674/">CVE-2017-7674</cve>
	<bugzilla href="https://bugzilla.suse.com/1053352">SUSE bug 1053352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532585" comment="tomcat-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532586" comment="tomcat-admin-webapps-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532587" comment="tomcat-docs-webapp-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532588" comment="tomcat-el-3_0-api-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532589" comment="tomcat-javadoc-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532590" comment="tomcat-jsp-2_3-api-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532591" comment="tomcat-lib-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532592" comment="tomcat-servlet-3_1-api-8.0.43-29.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532593" comment="tomcat-webapps-8.0.43-29.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7675" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7675" ref_url="https://www.suse.com/security/cve/CVE-2017-7675" source="SUSE CVE"/>
    <description>
    The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7675/">CVE-2017-7675</cve>
	<bugzilla href="https://bugzilla.suse.com/1053357">SUSE bug 1053357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7679" ref_url="https://www.suse.com/security/cve/CVE-2017-7679" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1803-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00032.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7679/">CVE-2017-7679</cve>
	<bugzilla href="https://bugzilla.suse.com/1045060">SUSE bug 1045060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057861">SUSE bug 1057861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549397" comment="apache2-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532211" comment="apache2-doc-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549398" comment="apache2-example-pages-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549399" comment="apache2-prefork-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549400" comment="apache2-utils-2.4.23-28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549401" comment="apache2-worker-2.4.23-28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7697" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7697" ref_url="https://www.suse.com/security/cve/CVE-2017-7697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002819.html" source="SUSE-SU"/>
    <description>
    In libsamplerate before 0.1.9, a buffer over-read occurs in the calc_output_single function in src_sinc.c via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7697/">CVE-2017-7697</cve>
	<bugzilla href="https://bugzilla.suse.com/1033564">SUSE bug 1033564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334658" comment="libsamplerate is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7700" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<bugzilla href="https://bugzilla.suse.com/1033936">SUSE bug 1033936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7701" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<bugzilla href="https://bugzilla.suse.com/1033937">SUSE bug 1033937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7702" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<bugzilla href="https://bugzilla.suse.com/1033938">SUSE bug 1033938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7703" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<bugzilla href="https://bugzilla.suse.com/1033939">SUSE bug 1033939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7704" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<bugzilla href="https://bugzilla.suse.com/1033940">SUSE bug 1033940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7705" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<bugzilla href="https://bugzilla.suse.com/1033941">SUSE bug 1033941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7718" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7718" ref_url="https://www.suse.com/security/cve/CVE-2017-7718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7718/">CVE-2017-7718</cve>
	<bugzilla href="https://bugzilla.suse.com/1034908">SUSE bug 1034908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034994">SUSE bug 1034994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518607" comment="xen-4.7.2_04-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550180" comment="xen-doc-html-4.7.2_04-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518608" comment="xen-libs-4.7.2_04-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518609" comment="xen-libs-32bit-4.7.2_04-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550181" comment="xen-tools-4.7.2_04-39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550182" comment="xen-tools-domU-4.7.2_04-39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7741" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7741" ref_url="https://www.suse.com/security/cve/CVE-2017-7741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1107-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with write memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7741/">CVE-2017-7741</cve>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033915">SUSE bug 1033915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550241" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548072" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7742" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7742" ref_url="https://www.suse.com/security/cve/CVE-2017-7742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1107-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00096.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7742/">CVE-2017-7742</cve>
	<bugzilla href="https://bugzilla.suse.com/1033054">SUSE bug 1033054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033914">SUSE bug 1033914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550241" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548072" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7745" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SIGCOMP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-sigcomp.c by correcting a memory-size check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<bugzilla href="https://bugzilla.suse.com/1033942">SUSE bug 1033942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7746" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the SLSK dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-slsk.c by adding checks for the remaining length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<bugzilla href="https://bugzilla.suse.com/1033943">SUSE bug 1033943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7747" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the PacketBB dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-packetbb.c by restricting additions to the protocol tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<bugzilla href="https://bugzilla.suse.com/1033944">SUSE bug 1033944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7748" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1087-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-04/msg00088.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WSP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by adding a length check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<bugzilla href="https://bugzilla.suse.com/1033945">SUSE bug 1033945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550305" comment="libwireshark8-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550306" comment="libwiretap6-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550307" comment="libwscodecs1-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550308" comment="libwsutil7-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550309" comment="wireshark-2.2.6-44.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550310" comment="wireshark-gtk-2.2.6-44.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during video control operations when a "&lt;track&gt;" element holds a reference to an older window if that window has been replaced in the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability with content viewer listeners that results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability during specific user interactions with the input method editor (IME) in some languages due to how events are handled. This results in a potentially exploitable crash but would require specific user interaction to trigger. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in WebGL with a maliciously crafted "ImageInfo" object during WebGL operations. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7755" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The Firefox installer on Windows can be made to load malicious DLL files stored in the same directory as the installer when it is run. This allows privileged execution if the installer is run with elevated privileges. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in IndexedDB when one of its objects is destroyed in memory while a method on it is still being executed. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio stream changes while the encoder is in use. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7761" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service "helper.exe" application creates a temporary directory writable by non-privileged users. When this is combined with creation of a junction (a form of symbolic link), protected files in the target directory of the junction can be deleted by the Mozilla Maintenance Service, which has privileged access. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR &lt; 52.2 and Firefox &lt; 54.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7763" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
    <description>
    Default fonts on OS X display some Tibetan characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7765" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The "Mark of the Web" was not correctly saved on Windows when files with very long names were downloaded from the Internet. Without the Mark of the Web data, the security warning that Windows displays before running executables downloaded from the Internet is not shown. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7768" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service can be invoked by an unprivileged user to read 32 bytes of any arbitrary file on the local system by convincing the service that it is reading a status file provided by the Mozilla Windows Updater. The Mozilla Maintenance Service executes with privileged access, bypassing system protections against unprivileged users. Note: This attack requires local system access and only affects Windows. Other operating systems are not affected. This vulnerability affects Firefox ESR &lt; 52.2 and Firefox &lt; 54.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1579-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<bugzilla href="https://bugzilla.suse.com/1043960">SUSE bug 1043960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044239">SUSE bug 1044239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044240">SUSE bug 1044240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044241">SUSE bug 1044241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044242">SUSE bug 1044242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549368" comment="MozillaFirefox-52.2.0esr-108.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549369" comment="MozillaFirefox-branding-SLE-52-31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549370" comment="MozillaFirefox-translations-52.2.0esr-108.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7782" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    An error in the "WindowsDllDetourPatcher" where a RWX ("Read/Write/Execute") 4k block is allocated but never protected, violating DEP protections. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7789" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7789" ref_url="https://www.suse.com/security/cve/CVE-2017-7789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If a server sends two Strict-Transport-Security (STS) headers for a single connection, they will be rejected as invalid and HTTP Strict Transport Security (HSTS) will not be enabled for the connection. This vulnerability affects Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7789/">CVE-2017-7789</cve>
	<bugzilla href="https://bugzilla.suse.com/1047281">SUSE bug 1047281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR &lt; 52.3 and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while re-computing layout for a "marquee" element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    When a page's content security policy (CSP) header contains a "sandbox" directive, other directives are ignored. This results in the incorrect enforcement of CSP. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7804" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    The destructor function for the "WindowsDllDetourPatcher" class can be re-purposed by malicious code in concert with another vulnerability to write arbitrary data to an attacker controlled location in memory. This can be used to bypass existing memory protections in this situation. Note: This attack only affects Windows operating systems. Other operating systems are not affected. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061005">SUSE bug 1061005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2589-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2151-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00056.html" source="SUSE-SU"/>
    <description>
    A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. This vulnerability affects Thunderbird &lt; 52.3, Firefox ESR &lt; 52.3, and Firefox &lt; 55.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<bugzilla href="https://bugzilla.suse.com/1052829">SUSE bug 1052829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549666" comment="MozillaFirefox-52.3.0esr-109.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549667" comment="MozillaFirefox-translations-52.3.0esr-109.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7825" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2688-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2872-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Several fonts on OS X display some Tibetan and Arabic characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 56, Firefox ESR &lt; 52.4, and Thunderbird &lt; 52.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<bugzilla href="https://bugzilla.suse.com/1060445">SUSE bug 1060445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549722" comment="MozillaFirefox-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549723" comment="MozillaFirefox-translations-52.4.0esr-109.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549724" comment="libfreebl3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545037" comment="libfreebl3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549725" comment="libfreebl3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545039" comment="libfreebl3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549726" comment="libsoftokn3-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545041" comment="libsoftokn3-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549727" comment="libsoftokn3-hmac-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545043" comment="libsoftokn3-hmac-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549728" comment="mozilla-nss-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545045" comment="mozilla-nss-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549729" comment="mozilla-nss-certs-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545047" comment="mozilla-nss-certs-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549730" comment="mozilla-nss-sysinit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545050" comment="mozilla-nss-sysinit-32bit-3.29.5-58.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549731" comment="mozilla-nss-tools-3.29.5-58.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3108-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3110-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00087.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549904" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549905" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3108-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3110-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00087.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when flushing and resizing layout because the "PressShell" object has been freed while still in use. This results in a potentially exploitable crash during these operations. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549904" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549905" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3108-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3110-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-11/msg00087.html" source="SUSE-SU"/>
    <description>
    The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. This vulnerability affects Firefox &lt; 57, Firefox ESR &lt; 52.5, and Thunderbird &lt; 52.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<bugzilla href="https://bugzilla.suse.com/1068101">SUSE bug 1068101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549904" comment="MozillaFirefox-52.5.0esr-109.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549905" comment="MozillaFirefox-translations-52.5.0esr-109.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7844" ref_url="https://www.suse.com/security/cve/CVE-2017-7844" source="SUSE CVE"/>
    <description>
    A combination of an external SVG image referenced on a page and the coloring of anchor links stored within this image can be used to determine which pages a user has in their history. This can allow a malicious website to query user history. Note: This issue only affects Firefox 57. Earlier releases are not affected. This vulnerability affects Firefox &lt; 57.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7844/">CVE-2017-7844</cve>
	<bugzilla href="https://bugzilla.suse.com/1072034">SUSE bug 1072034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072036">SUSE bug 1072036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7845" ref_url="https://www.suse.com/security/cve/CVE-2017-7845" source="SUSE CVE"/>
    <description>
    A buffer overflow occurs when drawing and validating elements using Direct 3D 9 with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Thunderbird &lt; 52.5.2, Firefox ESR &lt; 52.5.2, and Firefox &lt; 57.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-7845/">CVE-2017-7845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7857" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7857" ref_url="https://www.suse.com/security/cve/CVE-2017-7857" source="SUSE CVE"/>
    <description>
    FreeType 2 before 2017-03-08 has an out-of-bounds write caused by a heap-based buffer overflow related to the TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7857/">CVE-2017-7857</cve>
	<bugzilla href="https://bugzilla.suse.com/1034189">SUSE bug 1034189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7858" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7858" ref_url="https://www.suse.com/security/cve/CVE-2017-7858" source="SUSE CVE"/>
    <description>
    FreeType 2 before 2017-03-07 has an out-of-bounds write related to the TT_Get_MM_Var function in truetype/ttgxvar.c and the sfnt_init_face function in sfnt/sfobjs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7858/">CVE-2017-7858</cve>
	<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7864" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7864" ref_url="https://www.suse.com/security/cve/CVE-2017-7864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00016.html" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2017-02-02 has an out-of-bounds write caused by a heap-based buffer overflow related to the tt_size_reset function in truetype/ttobjs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7864/">CVE-2017-7864</cve>
	<bugzilla href="https://bugzilla.suse.com/1034178">SUSE bug 1034178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550672" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550673" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550674" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7867" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7867" ref_url="https://www.suse.com/security/cve/CVE-2017-7867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7867/">CVE-2017-7867</cve>
	<bugzilla href="https://bugzilla.suse.com/1034678">SUSE bug 1034678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546245" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546246" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546248" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594765" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594766" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594767" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7868" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7868" ref_url="https://www.suse.com/security/cve/CVE-2017-7868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1401-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1422-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00103.html" source="SUSE-SU"/>
    <description>
    International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7868/">CVE-2017-7868</cve>
	<bugzilla href="https://bugzilla.suse.com/1034674">SUSE bug 1034674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123121">SUSE bug 1123121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530415" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521005" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521006" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521007" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546245" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546246" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546248" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594765" comment="libicu-doc-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594766" comment="libicu52_1-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546247" comment="libicu52_1-32bit-52.1-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594767" comment="libicu52_1-data-52.1-8.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1875-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00064.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149679">SUSE bug 1149679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549451" comment="gnutls-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549452" comment="libgnutls-openssl27-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549453" comment="libgnutls28-3.2.15-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549454" comment="libgnutls28-32bit-3.2.15-18.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7874" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7874" ref_url="https://www.suse.com/security/cve/CVE-2017-7874" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7874/">CVE-2017-7874</cve>
	<bugzilla href="https://bugzilla.suse.com/1034330">SUSE bug 1034330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493158">SUSE bug 493158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7889" ref_url="https://www.suse.com/security/cve/CVE-2017-7889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7889/">CVE-2017-7889</cve>
	<bugzilla href="https://bugzilla.suse.com/1034405">SUSE bug 1034405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7941" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7941" ref_url="https://www.suse.com/security/cve/CVE-2017-7941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1177-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    The ReadSGIImage function in sgi.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7941/">CVE-2017-7941</cve>
	<bugzilla href="https://bugzilla.suse.com/1034876">SUSE bug 1034876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7942" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7942" ref_url="https://www.suse.com/security/cve/CVE-2017-7942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    The ReadAVSImage function in avs.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7942/">CVE-2017-7942</cve>
	<bugzilla href="https://bugzilla.suse.com/1034872">SUSE bug 1034872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7943" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7943" ref_url="https://www.suse.com/security/cve/CVE-2017-7943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    The ReadSVGImage function in svg.c in ImageMagick 7.0.5-4 allows remote attackers to consume an amount of available memory via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7943/">CVE-2017-7943</cve>
	<bugzilla href="https://bugzilla.suse.com/1034870">SUSE bug 1034870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7948" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7948" ref_url="https://www.suse.com/security/cve/CVE-2017-7948" source="SUSE CVE"/>
    <description>
    Integer overflow in the mark_curve function in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7948/">CVE-2017-7948</cve>
	<bugzilla href="https://bugzilla.suse.com/1035036">SUSE bug 1035036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7960" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
    <description>
    The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960</cve>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334531" comment="libcroco is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7961" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE: third-party analysis reports "This is not a security issue in my view. The conversion surely is truncating the double into a long value, but there is no impact as the value is one of the RGB components."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961</cve>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132069">SUSE bug 1132069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334531" comment="libcroco is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7979" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7979" ref_url="https://www.suse.com/security/cve/CVE-2017-7979" source="SUSE CVE"/>
    <description>
    The cookie feature in the packet action API implementation in net/sched/act_api.c in the Linux kernel 4.11.x through 4.11-rc7 mishandles the tb nlattr array, which allows local users to cause a denial of service (uninitialized memory access and refcount underflow, and system hang or crash) or possibly have unspecified other impact via "tc filter add" commands in certain contexts. NOTE: this does not affect stable kernels, such as 4.10.x, from kernel.org.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7979/">CVE-2017-7979</cve>
	<bugzilla href="https://bugzilla.suse.com/1035107">SUSE bug 1035107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7980" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980</cve>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7982" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1426-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00094.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the plist_from_bin function in bplist.c in libimobiledevice/libplist before 2017-04-19 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted plist file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982</cve>
	<bugzilla href="https://bugzilla.suse.com/1035312">SUSE bug 1035312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550242" comment="libplist3-1.12-19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7995" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7995" ref_url="https://www.suse.com/security/cve/CVE-2017-7995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00005.html" source="SUSE-SU"/>
    <description>
    Xen PV guest before Xen 4.3 checked access permissions to MMIO ranges only after accessing them, allowing host PCI device space memory reads, leading to information disclosure. This is an error in the get_user function. NOTE: the upstream Xen Project considers versions before 4.5.x to be EOL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7995/">CVE-2017-7995</cve>
	<bugzilla href="https://bugzilla.suse.com/1033948">SUSE bug 1033948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8061" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8061" ref_url="https://www.suse.com/security/cve/CVE-2017-8061" source="SUSE CVE"/>
    <description>
    drivers/media/usb/dvb-usb/dvb-usb-firmware.c in the Linux kernel 4.9.x and 4.10.x before 4.10.7 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8061/">CVE-2017-8061</cve>
	<bugzilla href="https://bugzilla.suse.com/1035693">SUSE bug 1035693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8062" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8062" ref_url="https://www.suse.com/security/cve/CVE-2017-8062" source="SUSE CVE"/>
    <description>
    drivers/media/usb/dvb-usb/dw2102.c in the Linux kernel 4.9.x and 4.10.x before 4.10.4 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8062/">CVE-2017-8062</cve>
	<bugzilla href="https://bugzilla.suse.com/1035691">SUSE bug 1035691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8063" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8063" ref_url="https://www.suse.com/security/cve/CVE-2017-8063" source="SUSE CVE"/>
    <description>
    drivers/media/usb/dvb-usb/cxusb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8063/">CVE-2017-8063</cve>
	<bugzilla href="https://bugzilla.suse.com/1035689">SUSE bug 1035689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8064" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8064" ref_url="https://www.suse.com/security/cve/CVE-2017-8064" source="SUSE CVE"/>
    <description>
    drivers/media/usb/dvb-usb-v2/dvb_usb_core.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8064/">CVE-2017-8064</cve>
	<bugzilla href="https://bugzilla.suse.com/1035681">SUSE bug 1035681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8065" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8065" ref_url="https://www.suse.com/security/cve/CVE-2017-8065" source="SUSE CVE"/>
    <description>
    crypto/ccm.c in the Linux kernel 4.9.x and 4.10.x through 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8065/">CVE-2017-8065</cve>
	<bugzilla href="https://bugzilla.suse.com/1035673">SUSE bug 1035673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8066" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8066" ref_url="https://www.suse.com/security/cve/CVE-2017-8066" source="SUSE CVE"/>
    <description>
    drivers/net/can/usb/gs_usb.c in the Linux kernel 4.9.x and 4.10.x before 4.10.2 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8066/">CVE-2017-8066</cve>
	<bugzilla href="https://bugzilla.suse.com/1035672">SUSE bug 1035672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8067" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8067" ref_url="https://www.suse.com/security/cve/CVE-2017-8067" source="SUSE CVE"/>
    <description>
    drivers/char/virtio_console.c in the Linux kernel 4.9.x and 4.10.x before 4.10.12 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8067/">CVE-2017-8067</cve>
	<bugzilla href="https://bugzilla.suse.com/1035670">SUSE bug 1035670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8068" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8068" ref_url="https://www.suse.com/security/cve/CVE-2017-8068" source="SUSE CVE"/>
    <description>
    drivers/net/usb/pegasus.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8068/">CVE-2017-8068</cve>
	<bugzilla href="https://bugzilla.suse.com/1035669">SUSE bug 1035669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8069" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8069" ref_url="https://www.suse.com/security/cve/CVE-2017-8069" source="SUSE CVE"/>
    <description>
    drivers/net/usb/rtl8150.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8069/">CVE-2017-8069</cve>
	<bugzilla href="https://bugzilla.suse.com/1035668">SUSE bug 1035668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138468">SUSE bug 1138468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334206" comment="libqt5-qtbase is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338981" comment="unrar is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8070" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8070" ref_url="https://www.suse.com/security/cve/CVE-2017-8070" source="SUSE CVE"/>
    <description>
    drivers/net/usb/catc.c in the Linux kernel 4.9.x before 4.9.11 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8070/">CVE-2017-8070</cve>
	<bugzilla href="https://bugzilla.suse.com/1035658">SUSE bug 1035658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8071" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8071" ref_url="https://www.suse.com/security/cve/CVE-2017-8071" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 uses a spinlock without considering that sleeping is possible in a USB HID request callback, which allows local users to cause a denial of service (deadlock) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8071/">CVE-2017-8071</cve>
	<bugzilla href="https://bugzilla.suse.com/1035667">SUSE bug 1035667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8072" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8072" ref_url="https://www.suse.com/security/cve/CVE-2017-8072" source="SUSE CVE"/>
    <description>
    The cp2112_gpio_direction_input function in drivers/hid/hid-cp2112.c in the Linux kernel 4.9.x before 4.9.9 does not have the expected EIO error status for a zero-length report, which allows local users to have an unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8072/">CVE-2017-8072</cve>
	<bugzilla href="https://bugzilla.suse.com/1035649">SUSE bug 1035649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8086" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8086" ref_url="https://www.suse.com/security/cve/CVE-2017-8086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8086/">CVE-2017-8086</cve>
	<bugzilla href="https://bugzilla.suse.com/1035950">SUSE bug 1035950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00016.html" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079459">SUSE bug 1079459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550672" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550673" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550674" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8106" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8106" ref_url="https://www.suse.com/security/cve/CVE-2017-8106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8106/">CVE-2017-8106</cve>
	<bugzilla href="https://bugzilla.suse.com/1035877">SUSE bug 1035877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<bugzilla href="https://bugzilla.suse.com/1036211">SUSE bug 1036211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036470">SUSE bug 1036470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00016.html" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079459">SUSE bug 1079459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550672" comment="ft2demos-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550673" comment="libfreetype6-2.6.3-7.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550674" comment="libfreetype6-32bit-2.6.3-7.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8288" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003146.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2273-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00101.html" source="SUSE-SU"/>
    <description>
    gnome-shell 3.22 through 3.24.1 mishandles extensions that fail to reload, which can lead to leaving extensions enabled in the lock screen. With these extensions, a bystander could launch applications (but not interact with them), see information from the extensions (e.g., what applications you have opened or what music you were playing), or even execute arbitrary commands. It all depends on what extensions a user has enabled. The problem is caused by lack of exception handling in js/ui/extensionSystem.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288</cve>
	<bugzilla href="https://bugzilla.suse.com/1036494">SUSE bug 1036494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549562" comment="gnome-shell-3.20.4-77.7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549563" comment="gnome-shell-browser-plugin-3.20.4-77.7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518036" comment="gnome-shell-lang-3.20.4-77.7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1322-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00014.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript through 2017-04-26 allows -dSAFER bypass and remote command execution via .rsdparams type confusion with a "/OutputFile (%pipe%" substring in a crafted .eps document that is an input to the gs program, as exploited in the wild in April 2017.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<bugzilla href="https://bugzilla.suse.com/1036453">SUSE bug 1036453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550292" comment="ghostscript-9.15-22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550293" comment="ghostscript-x11-9.15-22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517676" comment="xen-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549414" comment="xen-doc-html-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517677" comment="xen-libs-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517678" comment="xen-libs-32bit-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549415" comment="xen-tools-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549416" comment="xen-tools-domU-4.7.2_06-42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8343" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8343" ref_url="https://www.suse.com/security/cve/CVE-2017-8343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadAAIImage function in aai.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8343/">CVE-2017-8343</cve>
	<bugzilla href="https://bugzilla.suse.com/1036977">SUSE bug 1036977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8344" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8344" ref_url="https://www.suse.com/security/cve/CVE-2017-8344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPCXImage function in pcx.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8344/">CVE-2017-8344</cve>
	<bugzilla href="https://bugzilla.suse.com/1036978">SUSE bug 1036978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8345" ref_url="https://www.suse.com/security/cve/CVE-2017-8345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8345/">CVE-2017-8345</cve>
	<bugzilla href="https://bugzilla.suse.com/1036980">SUSE bug 1036980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8346" ref_url="https://www.suse.com/security/cve/CVE-2017-8346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadDCMImage function in dcm.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8346/">CVE-2017-8346</cve>
	<bugzilla href="https://bugzilla.suse.com/1036981">SUSE bug 1036981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8347" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8347" ref_url="https://www.suse.com/security/cve/CVE-2017-8347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadEXRImage function in exr.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8347/">CVE-2017-8347</cve>
	<bugzilla href="https://bugzilla.suse.com/1036982">SUSE bug 1036982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8348" ref_url="https://www.suse.com/security/cve/CVE-2017-8348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMATImage function in mat.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8348/">CVE-2017-8348</cve>
	<bugzilla href="https://bugzilla.suse.com/1036983">SUSE bug 1036983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8349" ref_url="https://www.suse.com/security/cve/CVE-2017-8349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadSFWImage function in sfw.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8349/">CVE-2017-8349</cve>
	<bugzilla href="https://bugzilla.suse.com/1036984">SUSE bug 1036984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8350" ref_url="https://www.suse.com/security/cve/CVE-2017-8350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1798-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00028.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadJNGImage function in png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8350/">CVE-2017-8350</cve>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8351" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8351" ref_url="https://www.suse.com/security/cve/CVE-2017-8351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPCDImage function in pcd.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8351/">CVE-2017-8351</cve>
	<bugzilla href="https://bugzilla.suse.com/1036986">SUSE bug 1036986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8352" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8352" ref_url="https://www.suse.com/security/cve/CVE-2017-8352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadXWDImage function in xwd.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8352/">CVE-2017-8352</cve>
	<bugzilla href="https://bugzilla.suse.com/1036987">SUSE bug 1036987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8353" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8353" ref_url="https://www.suse.com/security/cve/CVE-2017-8353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPICTImage function in pict.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8353/">CVE-2017-8353</cve>
	<bugzilla href="https://bugzilla.suse.com/1036988">SUSE bug 1036988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055010">SUSE bug 1055010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8354" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8354" ref_url="https://www.suse.com/security/cve/CVE-2017-8354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadBMPImage function in bmp.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8354/">CVE-2017-8354</cve>
	<bugzilla href="https://bugzilla.suse.com/1036989">SUSE bug 1036989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8355" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8355" ref_url="https://www.suse.com/security/cve/CVE-2017-8355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1413-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMTVImage function in mtv.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8355/">CVE-2017-8355</cve>
	<bugzilla href="https://bugzilla.suse.com/1036990">SUSE bug 1036990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8356" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8356" ref_url="https://www.suse.com/security/cve/CVE-2017-8356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadSUNImage function in sun.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8356/">CVE-2017-8356</cve>
	<bugzilla href="https://bugzilla.suse.com/1036991">SUSE bug 1036991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8357" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8357" ref_url="https://www.suse.com/security/cve/CVE-2017-8357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadEPTImage function in ept.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8357/">CVE-2017-8357</cve>
	<bugzilla href="https://bugzilla.suse.com/1036976">SUSE bug 1036976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8361" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<bugzilla href="https://bugzilla.suse.com/1036944">SUSE bug 1036944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550241" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548072" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8362" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<bugzilla href="https://bugzilla.suse.com/1036943">SUSE bug 1036943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550241" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548072" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8363" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<bugzilla href="https://bugzilla.suse.com/1036945">SUSE bug 1036945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550241" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548072" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8365" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1427-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00095.html" source="SUSE-SU"/>
    <description>
    The i2les_array function in pcm.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<bugzilla href="https://bugzilla.suse.com/1036946">SUSE bug 1036946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550241" comment="libsndfile1-1.0.25-35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548072" comment="libsndfile1-32bit-1.0.25-35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<bugzilla href="https://bugzilla.suse.com/1037334">SUSE bug 1037334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the "megasas_mmio_write" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<bugzilla href="https://bugzilla.suse.com/1037336">SUSE bug 1037336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1422-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-05/msg00090.html" source="SUSE-SU"/>
    <description>
    git-shell in git before 2.4.12, 2.5.x before 2.5.6, 2.6.x before 2.6.7, 2.7.x before 2.7.5, 2.8.x before 2.8.5, 2.9.x before 2.9.4, 2.10.x before 2.10.3, 2.11.x before 2.11.2, and 2.12.x before 2.12.3 might allow remote authenticated users to gain privileges via a repository name that starts with a - (dash) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386</cve>
	<bugzilla href="https://bugzilla.suse.com/1038395">SUSE bug 1038395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541230" comment="git-core-2.12.3-26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532935" comment="git-doc-2.12.3-26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8392" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 8 because of missing a check to determine whether symbols are NULL in the _bfd_dwarf2_find_nearest_line function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<bugzilla href="https://bugzilla.suse.com/1037052">SUSE bug 1037052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to a global buffer over-read error because of an assumption made by code that runs for objcopy and strip, that SHT_REL/SHR_RELA sections are always named starting with a .rel/.rela prefix. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy and strip, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<bugzilla href="https://bugzilla.suse.com/1037057">SUSE bug 1037057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 4 due to NULL pointer dereferencing of _bfd_elf_large_com_section. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<bugzilla href="https://bugzilla.suse.com/1037061">SUSE bug 1037061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8395" ref_url="https://www.suse.com/security/cve/CVE-2017-8395" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid write of size 8 because of missing a malloc() return-value check to see if memory had actually been allocated in the _bfd_generic_get_section_contents function. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objcopy, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8395/">CVE-2017-8395</cve>
	<bugzilla href="https://bugzilla.suse.com/1037062">SUSE bug 1037062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 because the existing reloc offset range tests didn't catch small negative offsets less than the size of the reloc field. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<bugzilla href="https://bugzilla.suse.com/1037066">SUSE bug 1037066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8397" ref_url="https://www.suse.com/security/cve/CVE-2017-8397" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, is vulnerable to an invalid read of size 1 and an invalid write of size 1 during processing of a corrupt binary containing reloc(s) with negative addresses. This vulnerability causes programs that conduct an analysis of binary programs using the libbfd library, such as objdump, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8397/">CVE-2017-8397</cve>
	<bugzilla href="https://bugzilla.suse.com/1037070">SUSE bug 1037070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8398" ref_url="https://www.suse.com/security/cve/CVE-2017-8398" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    dwarf.c in GNU Binutils 2.28 is vulnerable to an invalid read of size 1 during dumping of debug information from a corrupt binary. This vulnerability causes programs that conduct an analysis of binary programs, such as objdump and readelf, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8398/">CVE-2017-8398</cve>
	<bugzilla href="https://bugzilla.suse.com/1037072">SUSE bug 1037072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The function coff_set_alignment_hook in coffcode.h in Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, has a memory leak vulnerability which can cause memory exhaustion in objdump via a crafted PE file. Additional validation in dump_relocs_in_section in objdump.c can resolve this.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<bugzilla href="https://bugzilla.suse.com/1037273">SUSE bug 1037273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8422" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8422" ref_url="https://www.suse.com/security/cve/CVE-2017-8422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00025.html" source="SUSE-SU"/>
    <description>
    KDE kdelibs before 4.14.32 and KAuth before 5.34 allow local users to gain root privileges by spoofing a callerID and leveraging a privileged helper app.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8422/">CVE-2017-8422</cve>
	<bugzilla href="https://bugzilla.suse.com/1033300">SUSE bug 1033300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036244">SUSE bug 1036244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041511">SUSE bug 1041511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/749065">SUSE bug 749065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869959">SUSE bug 869959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550238" comment="libkde4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548055" comment="libkde4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550239" comment="libkdecore4-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548057" comment="libkdecore4-32bit-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550240" comment="libksuseinstall1-4.12.0-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548059" comment="libksuseinstall1-32bit-4.12.0-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8439</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8439" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8439" ref_url="https://www.suse.com/security/cve/CVE-2017-8439" source="SUSE CVE"/>
    <description>
    Kibana version 5.4.0 was affected by a Cross Site Scripting (XSS) bug in the Time Series Visual Builder. This bug could allow an attacker to obtain sensitive information from Kibana users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8439/">CVE-2017-8439</cve>
	<bugzilla href="https://bugzilla.suse.com/1075545">SUSE bug 1075545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8440</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8440" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8440" ref_url="https://www.suse.com/security/cve/CVE-2017-8440" source="SUSE CVE"/>
    <description>
    Starting in version 5.3.0, Kibana had a cross-site scripting (XSS) vulnerability in the Discover page that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8440/">CVE-2017-8440</cve>
	<bugzilla href="https://bugzilla.suse.com/1075545">SUSE bug 1075545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8443</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8443" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8443" ref_url="https://www.suse.com/security/cve/CVE-2017-8443" source="SUSE CVE"/>
    <description>
    In Kibana X-Pack security versions prior to 5.4.3 if a Kibana user opens a crafted Kibana URL the result could be a redirect to an improperly initialized Kibana login screen. If the user enters credentials on this screen, the credentials will appear in the URL bar. The credentials could then be viewed by untrusted parties or logged into the Kibana access logs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8443/">CVE-2017-8443</cve>
	<bugzilla href="https://bugzilla.suse.com/1075538">SUSE bug 1075538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8452</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8452" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8452" ref_url="https://www.suse.com/security/cve/CVE-2017-8452" source="SUSE CVE"/>
    <description>
    Kibana versions prior to 5.2.1 configured for SSL client access, file descriptors will fail to be cleaned up after certain requests and will accumulate over time until the process crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8452/">CVE-2017-8452</cve>
	<bugzilla href="https://bugzilla.suse.com/1044849">SUSE bug 1044849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009341644" comment="crowbar-openstack is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339394" comment="kibana is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8765" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8765" ref_url="https://www.suse.com/security/cve/CVE-2017-8765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    The function named ReadICONImage in coders\icon.c in ImageMagick 7.0.5-5 has a memory leak vulnerability which can cause memory exhaustion via a crafted ICON file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8765/">CVE-2017-8765</cve>
	<bugzilla href="https://bugzilla.suse.com/1037527">SUSE bug 1037527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1328-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1412-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00071.html" source="SUSE-SU"/>
    <description>
    rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101814">SUSE bug 1101814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798028">SUSE bug 798028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550234" comment="libtirpc-netconfig-1.0.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550235" comment="libtirpc3-1.0.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550236" comment="libtirpc3-32bit-1.0.1-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550237" comment="rpcbind-0.2.3-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8797" ref_url="https://www.suse.com/security/cve/CVE-2017-8797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8797/">CVE-2017-8797</cve>
	<bugzilla href="https://bugzilla.suse.com/1046202">SUSE bug 1046202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046206">SUSE bug 1046206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8804" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8804" ref_url="https://www.suse.com/security/cve/CVE-2017-8804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The xdr_bytes and xdr_string functions in the GNU C Library (aka glibc or libc6) 2.25 mishandle failures of buffer deserialization, which allows remote attackers to cause a denial of service (virtual memory allocation, or memory consumption if an overcommit setting is not used) via a crafted UDP packet to port 111, a related issue to CVE-2017-8779. NOTE: [Information provided from upstream and references]
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8804/">CVE-2017-8804</cve>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550701" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550702" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550703" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550704" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533165" comment="glibc-html-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533166" comment="glibc-info-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550705" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550706" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550707" comment="glibc-profile-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550708" comment="glibc-profile-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550709" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0161-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00064.html" source="SUSE-SU"/>
    <description>
    The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816</cve>
	<bugzilla href="https://bugzilla.suse.com/1069226">SUSE bug 1069226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550985" comment="curl-7.37.0-37.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550986" comment="libcurl4-7.37.0-37.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550987" comment="libcurl4-32bit-7.37.0-37.11.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0161-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00064.html" source="SUSE-SU"/>
    <description>
    The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817</cve>
	<bugzilla href="https://bugzilla.suse.com/1069222">SUSE bug 1069222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550985" comment="curl-7.37.0-37.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550986" comment="libcurl4-7.37.0-37.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550987" comment="libcurl4-32bit-7.37.0-37.11.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8818" ref_url="https://www.suse.com/security/cve/CVE-2017-8818" source="SUSE CVE"/>
    <description>
    curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8818/">CVE-2017-8818</cve>
	<bugzilla href="https://bugzilla.suse.com/1069714">SUSE bug 1069714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00079.html" source="SUSE-SU"/>
    <description>
    The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076734">SUSE bug 1076734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549946" comment="kernel-default-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549947" comment="kernel-default-base-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549948" comment="kernel-default-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549949" comment="kernel-default-man-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518416" comment="kernel-devel-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518417" comment="kernel-macros-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518418" comment="kernel-source-4.4.103-92.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549950" comment="kernel-syms-4.4.103-92.53.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8830" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8830" ref_url="https://www.suse.com/security/cve/CVE-2017-8830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-6, the ReadBMPImage function in bmp.c:1379 allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8830/">CVE-2017-8830</cve>
	<bugzilla href="https://bugzilla.suse.com/1038000">SUSE bug 1038000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00047.html" source="SUSE-SU"/>
    <description>
    The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061936">SUSE bug 1061936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549775" comment="kernel-default-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549776" comment="kernel-default-base-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549777" comment="kernel-default-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549778" comment="kernel-default-man-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518251" comment="kernel-devel-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518252" comment="kernel-macros-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518253" comment="kernel-source-4.4.90-92.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549779" comment="kernel-syms-4.4.90-92.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00007.html" source="SUSE-SU"/>
    <description>
    The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834</cve>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334531" comment="libcroco is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00007.html" source="SUSE-SU"/>
    <description>
    The cr_parser_parse_selector_core function in cr-parser.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871</cve>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334531" comment="libcroco is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2190-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00067.html" source="SUSE-SU"/>
    <description>
    The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872</cve>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549548" comment="libxml2-2-2.9.4-46.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549549" comment="libxml2-2-32bit-2.9.4-46.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532336" comment="libxml2-doc-2.9.4-46.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549550" comment="libxml2-tools-2.9.4-46.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549551" comment="python-libxml2-2.9.4-46.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038564">SUSE bug 1038564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8905" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8905" ref_url="https://www.suse.com/security/cve/CVE-2017-8905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
    <description>
    Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8905/">CVE-2017-8905</cve>
	<bugzilla href="https://bugzilla.suse.com/1034845">SUSE bug 1034845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8908" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8908" ref_url="https://www.suse.com/security/cve/CVE-2017-8908" source="SUSE CVE"/>
    <description>
    The mark_line_tr function in gxscanc.c in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PostScript document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8908/">CVE-2017-8908</cve>
	<bugzilla href="https://bugzilla.suse.com/1038835">SUSE bug 1038835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8924" ref_url="https://www.suse.com/security/cve/CVE-2017-8924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-8924/">CVE-2017-8924</cve>
	<bugzilla href="https://bugzilla.suse.com/1037182">SUSE bug 1037182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8925" ref_url="https://www.suse.com/security/cve/CVE-2017-8925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
    <description>
    The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8925/">CVE-2017-8925</cve>
	<bugzilla href="https://bugzilla.suse.com/1037183">SUSE bug 1037183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9022" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002934.html" source="SUSE-SU"/>
    <description>
    The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<bugzilla href="https://bugzilla.suse.com/1039514">SUSE bug 1039514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550316" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518698" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550317" comment="strongswan-hmac-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550318" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550319" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9023" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1471-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002934.html" source="SUSE-SU"/>
    <description>
    The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<bugzilla href="https://bugzilla.suse.com/1039515">SUSE bug 1039515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550316" comment="strongswan-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518698" comment="strongswan-doc-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550317" comment="strongswan-hmac-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550318" comment="strongswan-ipsec-5.1.3-25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550319" comment="strongswan-libs0-5.1.3-25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9038" ref_url="https://www.suse.com/security/cve/CVE-2017-9038" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to the byte_get_little_endian function in elfcomm.c, the get_unwind_section_word function in readelf.c, and ARM unwind information that contains invalid word offsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9038/">CVE-2017-9038</cve>
	<bugzilla href="https://bugzilla.suse.com/1038874">SUSE bug 1038874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9039" ref_url="https://www.suse.com/security/cve/CVE-2017-9039" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU Binutils 2.28 allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file with many program headers, related to the get_program_headers function in readelf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9039/">CVE-2017-9039</cve>
	<bugzilla href="https://bugzilla.suse.com/1038875">SUSE bug 1038875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9040" ref_url="https://www.suse.com/security/cve/CVE-2017-9040" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU Binutils 2017-04-03 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash), related to the process_mips_specific function in readelf.c, via a crafted ELF file that triggers a large memory-allocation attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9040/">CVE-2017-9040</cve>
	<bugzilla href="https://bugzilla.suse.com/1038876">SUSE bug 1038876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038877">SUSE bug 1038877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9041" ref_url="https://www.suse.com/security/cve/CVE-2017-9041" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    GNU Binutils 2.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file, related to MIPS GOT mishandling in the process_mips_specific function in readelf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9041/">CVE-2017-9041</cve>
	<bugzilla href="https://bugzilla.suse.com/1038874">SUSE bug 1038874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038877">SUSE bug 1038877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9042" ref_url="https://www.suse.com/security/cve/CVE-2017-9042" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    readelf.c in GNU Binutils 2017-04-12 has a "cannot be represented in type long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9042/">CVE-2017-9042</cve>
	<bugzilla href="https://bugzilla.suse.com/1038878">SUSE bug 1038878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9043" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9043" ref_url="https://www.suse.com/security/cve/CVE-2017-9043" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    readelf.c in GNU Binutils 2017-04-12 has a "shift exponent too large for type unsigned long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9043/">CVE-2017-9043</cve>
	<bugzilla href="https://bugzilla.suse.com/1038880">SUSE bug 1038880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9044" ref_url="https://www.suse.com/security/cve/CVE-2017-9044" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The print_symbol_for_build_attribute function in readelf.c in GNU Binutils 2017-04-12 allows remote attackers to cause a denial of service (invalid read and SEGV) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9044/">CVE-2017-9044</cve>
	<bugzilla href="https://bugzilla.suse.com/1038881">SUSE bug 1038881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00071.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content-&gt;type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-&gt;prefix is appended to buf (if it actually fits) whereupon (ii) content-&gt;name is written to the buffer. However, the check for whether the content-&gt;name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039657">SUSE bug 1039657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550326" comment="libxml2-2-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550327" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532998" comment="libxml2-doc-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550328" comment="libxml2-tools-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550329" comment="python-libxml2-2.9.4-39.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00071.html" source="SUSE-SU"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 &lt; size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039658">SUSE bug 1039658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550326" comment="libxml2-2-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550327" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532998" comment="libxml2-doc-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550328" comment="libxml2-tools-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550329" comment="python-libxml2-2.9.4-39.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00071.html" source="SUSE-SU"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039659">SUSE bug 1039659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550326" comment="libxml2-2-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550327" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532998" comment="libxml2-doc-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550328" comment="libxml2-tools-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550329" comment="python-libxml2-2.9.4-39.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9050" ref_url="https://www.suse.com/security/cve/CVE-2017-9050" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1510-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1612-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00071.html" source="SUSE-SU"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9050/">CVE-2017-9050</cve>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550326" comment="libxml2-2-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550327" comment="libxml2-2-32bit-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532998" comment="libxml2-doc-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550328" comment="libxml2-tools-2.9.4-39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550329" comment="python-libxml2-2.9.4-39.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9059" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9059" ref_url="https://www.suse.com/security/cve/CVE-2017-9059" source="SUSE CVE"/>
    <description>
    The NFSv4 implementation in the Linux kernel through 4.11.1 allows local users to cause a denial of service (resource consumption) by leveraging improper channel callback shutdown when unmounting an NFSv4 filesystem, aka a "module reference and kernel daemon" leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9059/">CVE-2017-9059</cve>
	<bugzilla href="https://bugzilla.suse.com/1039674">SUSE bug 1039674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9060" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9060" ref_url="https://www.suse.com/security/cve/CVE-2017-9060" source="SUSE CVE"/>
    <description>
    Memory leak in the virtio_gpu_set_scanout function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (memory consumption) via a large number of "VIRTIO_GPU_CMD_SET_SCANOUT:" commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9060/">CVE-2017-9060</cve>
	<bugzilla href="https://bugzilla.suse.com/1039886">SUSE bug 1039886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074</cve>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9083" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9083" ref_url="https://www.suse.com/security/cve/CVE-2017-9083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002979.html" source="SUSE-SU"/>
    <description>
    poppler 0.54.0, as used in Evince and other products, has a NULL pointer dereference in the JPXStream::readUByte function in JPXStream.cc. For example, the perf_test utility will crash (segmentation fault) when parsing an invalid PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9083/">CVE-2017-9083</cve>
	<bugzilla href="https://bugzilla.suse.com/1040170">SUSE bug 1040170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549377" comment="libpoppler44-0.24.4-14.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9098" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9098" ref_url="https://www.suse.com/security/cve/CVE-2017-9098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.5-2 and GraphicsMagick before 1.3.24 use uninitialized memory in the RLE decoder, allowing an attacker to leak sensitive information from process memory space, as demonstrated by remote attacks against ImageMagick code in a long-running server process that converts image data on behalf of multiple users. This is caused by a missing initialization step in the ReadRLEImage function in coders/rle.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9098/">CVE-2017-9098</cve>
	<bugzilla href="https://bugzilla.suse.com/1040025">SUSE bug 1040025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9103" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9103" ref_url="https://www.suse.com/security/cve/CVE-2017-9103" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. pap_mailbox822 does not properly check st from adns__findlabel_next. Without this, an uninitialised stack value can be used as the first label length. Depending on the circumstances, an attacker might be able to trick adns into crashing the calling program, leaking aspects of the contents of some of its memory, causing it to allocate lots of memory, or perhaps overrunning a buffer. This is only possible with applications which make non-raw queries for SOA or RP records.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9103/">CVE-2017-9103</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551486" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595622" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9104" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9104" ref_url="https://www.suse.com/security/cve/CVE-2017-9104" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. It hangs, eating CPU, if a compression pointer loop is encountered.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9104/">CVE-2017-9104</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551486" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595622" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9105" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9105" ref_url="https://www.suse.com/security/cve/CVE-2017-9105" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. It corrupts a pointer when a nameserver speaks first because of a wrong number of pointer dereferences. This bug may well be exploitable as a remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9105/">CVE-2017-9105</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551486" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595622" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9106" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9106" ref_url="https://www.suse.com/security/cve/CVE-2017-9106" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. adns_rr_info mishandles a bogus *datap. The general pattern for formatting integers is to sprintf into a fixed-size buffer. This is correct if the input is in the right range; if it isn't, the buffer may be overrun (depending on the sizes of the types on the current platform). Of course the inputs ought to be right. And there are pointers in there too, so perhaps one could say that the caller ought to check these things. It may be better to require the caller to make the pointer structure right, but to have the code here be defensive about (and tolerate with an error but without crashing) out-of-range integer values. So: it should defend each of these integer conversion sites with a check for the actual permitted range, and return adns_s_invaliddata if not. The lack of this check causes the SOA sign extension bug to be a serious security problem: the sign extended SOA value is out of range, and overruns the buffer when reconverted. This is related to sign extending SOA 32-bit integer fields, and use of a signed data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9106/">CVE-2017-9106</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551486" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595622" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9107" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9107" ref_url="https://www.suse.com/security/cve/CVE-2017-9107" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. It overruns reading a buffer if a domain ends with backslash. If the query domain ended with \, and adns_qf_quoteok_query was specified, qdparselabel would read additional bytes from the buffer and try to treat them as the escape sequence. It would depart the input buffer and start processing many bytes of arbitrary heap data as if it were the query domain. Eventually it would run out of input or find some other kind of error, and declare the query domain invalid. But before then it might outrun available memory and crash. In principle this could be a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9107/">CVE-2017-9107</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551486" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595622" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9108" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9108" ref_url="https://www.suse.com/security/cve/CVE-2017-9108" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9108/">CVE-2017-9108</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551486" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595622" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9109" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9109" ref_url="https://www.suse.com/security/cve/CVE-2017-9109" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006937.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0827-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in adns before 1.5.2. It fails to ignore apparent answers before the first RR that was found the first time. when this is fixed, the second answer scan finds the same RRs at the first. Otherwise, adns can be confused by interleaving answers for the CNAME target, with the CNAME itself. In that case the answer data structure (on the heap) can be overrun. With this fixed, it prefers to look only at the answer RRs which come after the CNAME, which is at least arguably correct.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9109/">CVE-2017-9109</cve>
	<bugzilla href="https://bugzilla.suse.com/1172265">SUSE bug 1172265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531033" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551486" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595622" comment="libadns1-1.4-103.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9110" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00013.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<bugzilla href="https://bugzilla.suse.com/1040107">SUSE bug 1040107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550747" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550748" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9111" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111</cve>
	<bugzilla href="https://bugzilla.suse.com/1040109">SUSE bug 1040109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334510" comment="openexr is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 1 in the getBits function in ImfHuf.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112</cve>
	<bugzilla href="https://bugzilla.suse.com/1040112">SUSE bug 1040112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334510" comment="openexr is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9113" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113</cve>
	<bugzilla href="https://bugzilla.suse.com/1040113">SUSE bug 1040113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334510" comment="openexr is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9114" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0619-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00013.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<bugzilla href="https://bugzilla.suse.com/1040114">SUSE bug 1040114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550747" comment="libIlmImf-Imf_2_1-21-2.1.0-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550748" comment="openexr-2.1.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00000.html" source="SUSE-SU"/>
    <description>
    In OpenEXR 2.2.0, an invalid write of size 2 in the = operator function in half.h could cause the application to crash or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115</cve>
	<bugzilla href="https://bugzilla.suse.com/1040115">SUSE bug 1040115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334510" comment="openexr is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9116" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9116" ref_url="https://www.suse.com/security/cve/CVE-2017-9116" source="SUSE CVE"/>
    <description>
    In OpenEXR 2.2.0, an invalid read of size 1 in the uncompress function in ImfZip.cpp could cause the application to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9116/">CVE-2017-9116</cve>
	<bugzilla href="https://bugzilla.suse.com/1040116">SUSE bug 1040116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334075" comment="openexr is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9122" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_read_moov function in moov.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122</cve>
	<bugzilla href="https://bugzilla.suse.com/1044000">SUSE bug 1044000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044002">SUSE bug 1044002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044006">SUSE bug 1044006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044008">SUSE bug 1044008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044009">SUSE bug 1044009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044077">SUSE bug 1044077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044122">SUSE bug 1044122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051855">SUSE bug 1051855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051859">SUSE bug 1051859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549436" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9123" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The lqt_frame_duration function in lqt_quicktime.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123</cve>
	<bugzilla href="https://bugzilla.suse.com/1044009">SUSE bug 1044009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549436" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9124" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_match_32 function in util.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124</cve>
	<bugzilla href="https://bugzilla.suse.com/1044008">SUSE bug 1044008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549436" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9125" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The lqt_frame_duration function in lqt_quicktime.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125</cve>
	<bugzilla href="https://bugzilla.suse.com/1044122">SUSE bug 1044122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549436" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9126" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_read_dref_table function in dref.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126</cve>
	<bugzilla href="https://bugzilla.suse.com/1044006">SUSE bug 1044006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549436" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9127" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_user_atoms_read_atom function in useratoms.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127</cve>
	<bugzilla href="https://bugzilla.suse.com/1044002">SUSE bug 1044002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549436" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9128" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1806-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00035.html" source="SUSE-SU"/>
    <description>
    The quicktime_video_width function in lqt_quicktime.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128</cve>
	<bugzilla href="https://bugzilla.suse.com/1044000">SUSE bug 1044000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044002">SUSE bug 1044002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044006">SUSE bug 1044006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044008">SUSE bug 1044008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044009">SUSE bug 1044009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044077">SUSE bug 1044077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044122">SUSE bug 1044122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051855">SUSE bug 1051855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051859">SUSE bug 1051859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549436" comment="libquicktime0-1.2.4-13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9141" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9141" ref_url="https://www.suse.com/security/cve/CVE-2017-9141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the ResetImageProfileIterator function in MagickCore/profile.c because of missing checks in the ReadDDSImage function in coders/dds.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9141/">CVE-2017-9141</cve>
	<bugzilla href="https://bugzilla.suse.com/1040303">SUSE bug 1040303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9142" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9142" ref_url="https://www.suse.com/security/cve/CVE-2017-9142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1511-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, a crafted file could trigger an assertion failure in the WriteBlob function in MagickCore/blob.c because of missing checks in the ReadOneJNGImage function in coders/png.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9142/">CVE-2017-9142</cve>
	<bugzilla href="https://bugzilla.suse.com/1036985">SUSE bug 1036985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040304">SUSE bug 1040304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9143" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9143" ref_url="https://www.suse.com/security/cve/CVE-2017-9143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9143/">CVE-2017-9143</cve>
	<bugzilla href="https://bugzilla.suse.com/1040306">SUSE bug 1040306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9144" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9144" ref_url="https://www.suse.com/security/cve/CVE-2017-9144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1560-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00045.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, a crafted RLE image can trigger a crash because of incorrect EOF handling in coders/rle.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9144/">CVE-2017-9144</cve>
	<bugzilla href="https://bugzilla.suse.com/1040332">SUSE bug 1040332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048936">SUSE bug 1048936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550324" comment="libMagickCore-6_Q16-1-6.8.8.1-70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550325" comment="libMagickWand-6_Q16-1-6.8.8.1-70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9148" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1609-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00069.html" source="SUSE-SU"/>
    <description>
    The TLS session cache in FreeRADIUS 2.1.1 through 2.1.7, 3.0.x before 3.0.14, 3.1.x before 2017-02-04, and 4.0.x before 2017-02-04 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148</cve>
	<bugzilla href="https://bugzilla.suse.com/1041445">SUSE bug 1041445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046141">SUSE bug 1046141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549381" comment="freeradius-server-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549382" comment="freeradius-server-doc-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549383" comment="freeradius-server-krb5-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549384" comment="freeradius-server-ldap-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549385" comment="freeradius-server-libs-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549386" comment="freeradius-server-mysql-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549387" comment="freeradius-server-perl-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549388" comment="freeradius-server-postgresql-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549389" comment="freeradius-server-python-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549390" comment="freeradius-server-sqlite-3.0.3-17.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549391" comment="freeradius-server-utils-3.0.3-17.4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9150" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9150" ref_url="https://www.suse.com/security/cve/CVE-2017-9150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00006.html" source="SUSE-SU"/>
    <description>
    The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9150/">CVE-2017-9150</cve>
	<bugzilla href="https://bugzilla.suse.com/1040279">SUSE bug 1040279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9208" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to releaseResolved functions, aka qpdf-infiniteloop1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<bugzilla href="https://bugzilla.suse.com/1040311">SUSE bug 1040311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545821" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545822" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545823" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545824" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545825" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545826" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594603" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594604" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594605" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594606" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594607" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594608" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9209" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to QPDFObjectHandle::parseInternal, aka qpdf-infiniteloop2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<bugzilla href="https://bugzilla.suse.com/1040312">SUSE bug 1040312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545821" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545822" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545823" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545824" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545825" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545826" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594603" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594604" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594605" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594606" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594607" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594608" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9210" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3066-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0469-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00056.html" source="SUSE-SU"/>
    <description>
    libqpdf.a in QPDF 6.0.0 allows remote attackers to cause a denial of service (infinite recursion and stack consumption) via a crafted PDF document, related to unparse functions, aka qpdf-infiniteloop3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<bugzilla href="https://bugzilla.suse.com/1040313">SUSE bug 1040313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530286" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530287" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530288" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530289" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520147" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530290" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545821" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545822" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545823" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545824" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545825" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545826" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594603" comment="cups-filters-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594604" comment="cups-filters-cups-browsed-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594605" comment="cups-filters-foomatic-rip-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594606" comment="cups-filters-ghostscript-1.0.58-15.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594607" comment="libqpdf18-7.1.1-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594608" comment="qpdf-7.1.1-3.3.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9211" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9211" ref_url="https://www.suse.com/security/cve/CVE-2017-9211" source="SUSE CVE"/>
    <description>
    The crypto_skcipher_init_tfm function in crypto/skcipher.c in the Linux kernel through 4.11.2 relies on a setkey function that lacks a key-size check, which allows local users to cause a denial of service (NULL pointer dereference) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9211/">CVE-2017-9211</cve>
	<bugzilla href="https://bugzilla.suse.com/1040389">SUSE bug 1040389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9214" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9214" ref_url="https://www.suse.com/security/cve/CVE-2017-9214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003744.html" source="SUSE-SU"/>
    <description>
    In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9214/">CVE-2017-9214</cve>
	<bugzilla href="https://bugzilla.suse.com/1040543">SUSE bug 1040543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550583" comment="openvswitch-2.5.1-25.12.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550584" comment="openvswitch-dpdk-2.5.1-25.12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550585" comment="openvswitch-dpdk-switch-2.5.1-25.12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550586" comment="openvswitch-switch-2.5.1-25.12.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9216" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<bugzilla href="https://bugzilla.suse.com/1040643">SUSE bug 1040643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9217" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9217" ref_url="https://www.suse.com/security/cve/CVE-2017-9217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1844-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00054.html" source="SUSE-SU"/>
    <description>
    systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9217/">CVE-2017-9217</cve>
	<bugzilla href="https://bugzilla.suse.com/1040614">SUSE bug 1040614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549427" comment="libsystemd0-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549428" comment="libsystemd0-32bit-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549429" comment="libudev1-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549430" comment="libudev1-32bit-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549431" comment="systemd-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549432" comment="systemd-32bit-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517694" comment="systemd-bash-completion-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549433" comment="systemd-sysvinit-228-149.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549434" comment="udev-228-149.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9225" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9225" ref_url="https://www.suse.com/security/cve/CVE-2017-9225" source="SUSE CVE"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A malformed regular expression could result in 4 bytes being written off the end of a stack buffer of expand_case_fold_string() during the call to onigenc_unicode_get_case_fold_codes_by_str(), a typical stack buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9225/">CVE-2017-9225</cve>
	<bugzilla href="https://bugzilla.suse.com/1040890">SUSE bug 1040890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334192" comment="ruby2.1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9228" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9228" ref_url="https://www.suse.com/security/cve/CVE-2017-9228" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9228/">CVE-2017-9228</cve>
	<bugzilla href="https://bugzilla.suse.com/1068376">SUSE bug 1068376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069606">SUSE bug 1069606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069607">SUSE bug 1069607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9229" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9229" ref_url="https://www.suse.com/security/cve/CVE-2017-9229" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3240-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3329-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg-&gt;dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9229/">CVE-2017-9229</cve>
	<bugzilla href="https://bugzilla.suse.com/1068376">SUSE bug 1068376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069631">SUSE bug 1069631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069632">SUSE bug 1069632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334358" comment="oniguruma is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2336-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00004.html" source="SUSE-SU"/>
    <description>
    XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073350">SUSE bug 1073350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123115">SUSE bug 1123115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531736" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522652" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522653" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522654" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522655" comment="python3-curses-3.4.10-25.39.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549064" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549065" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549066" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549067" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549068" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549585" comment="expat-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549586" comment="libexpat1-2.1.0-21.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549587" comment="libexpat1-32bit-2.1.0-21.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596194" comment="libpython3_4m1_0-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596195" comment="python3-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596196" comment="python3-base-3.4.10-25.39.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596197" comment="python3-curses-3.4.10-25.39.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596198" comment="python3-devel-3.4.10-25.39.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9239" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9239" ref_url="https://www.suse.com/security/cve/CVE-2017-9239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exiv2 0.26. When the data structure of the structure ifd is incorrect, the program assigns pValue_ to 0x0, and the value of pValue() is 0x0. TiffImageEntry::doWriteImage will use the value of pValue() to cause a segmentation fault. To exploit this vulnerability, someone must open a crafted tiff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9239/">CVE-2017-9239</cve>
	<bugzilla href="https://bugzilla.suse.com/1040973">SUSE bug 1040973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334027" comment="exiv2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00026.html" source="SUSE-SU"/>
    <description>
    The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242</cve>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042892">SUSE bug 1042892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549457" comment="kernel-default-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549458" comment="kernel-default-base-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549459" comment="kernel-default-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549460" comment="kernel-default-man-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517902" comment="kernel-devel-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517903" comment="kernel-macros-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517904" comment="kernel-source-4.4.74-92.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549461" comment="kernel-syms-4.4.74-92.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9261" ref_url="https://www.suse.com/security/cve/CVE-2017-9261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-6 Q16, the ReadMNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9261/">CVE-2017-9261</cve>
	<bugzilla href="https://bugzilla.suse.com/1043354">SUSE bug 1043354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9262" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9262" ref_url="https://www.suse.com/security/cve/CVE-2017-9262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0218-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-6 Q16, the ReadJNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9262/">CVE-2017-9262</cve>
	<bugzilla href="https://bugzilla.suse.com/1043353">SUSE bug 1043353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9263" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9263" ref_url="https://www.suse.com/security/cve/CVE-2017-9263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2272-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00103.html" source="SUSE-SU"/>
    <description>
    In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9263/">CVE-2017-9263</cve>
	<bugzilla href="https://bugzilla.suse.com/1041470">SUSE bug 1041470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550583" comment="openvswitch-2.5.1-25.12.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550584" comment="openvswitch-dpdk-2.5.1-25.12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550585" comment="openvswitch-dpdk-switch-2.5.1-25.12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550586" comment="openvswitch-switch-2.5.1-25.12.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9265" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9265" ref_url="https://www.suse.com/security/cve/CVE-2017-9265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2272-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00103.html" source="SUSE-SU"/>
    <description>
    In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9265/">CVE-2017-9265</cve>
	<bugzilla href="https://bugzilla.suse.com/1041447">SUSE bug 1041447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550583" comment="openvswitch-2.5.1-25.12.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550584" comment="openvswitch-dpdk-2.5.1-25.12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550585" comment="openvswitch-dpdk-switch-2.5.1-25.12.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550586" comment="openvswitch-switch-2.5.1-25.12.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9269" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004582.html" source="SUSE-SU"/>
		<reference ref_id="TID000018998" ref_url="https://www.suse.com/support/kb/doc/?id=000018998" source="SUSE-SU"/>
		<reference ref_id="TID7021171" ref_url="https://www.suse.com/support/kb/doc/?id=7021171" source="SUSE-SU"/>
		<reference ref_id="TID7021201" ref_url="https://www.suse.com/support/kb/doc/?id=7021201" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2335-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00035.html" source="SUSE-SU"/>
    <description>
    In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530245" comment="libzypp-16.17.20-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530246" comment="zypper-1.13.45-18.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549520" comment="libzypp-16.15.2-27.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549521" comment="zypper-1.13.30-18.13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517973" comment="zypper-log-1.13.30-18.13.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550536" comment="libzypp-16.17.20-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550537" comment="zypper-1.13.45-18.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594560" comment="libzypp-16.17.20-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594561" comment="zypper-1.13.45-18.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9271" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9271" ref_url="https://www.suse.com/security/cve/CVE-2017-9271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:21-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FB5G3FIS4OQH3FX723SLMBOC4P37HKHV/" source="SUSE-SU"/>
    <description>
    The commandline package update tool zypper writes HTTP proxy credentials into its logfile, allowing local attackers to gain access to proxies used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9271/">CVE-2017-9271</cve>
	<bugzilla href="https://bugzilla.suse.com/1050625">SUSE bug 1050625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334162" comment="libzypp is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334340" comment="zypper is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9287" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9287" ref_url="https://www.suse.com/security/cve/CVE-2017-9287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2181-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00063.html" source="SUSE-SU"/>
    <description>
    servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a double free vulnerability. A user with access to search the directory can crash slapd by issuing a search including the Paged Results control with a page size of 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9287/">CVE-2017-9287</cve>
	<bugzilla href="https://bugzilla.suse.com/1041764">SUSE bug 1041764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550330" comment="libldap-2_4-2-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550331" comment="libldap-2_4-2-32bit-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550332" comment="openldap2-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550333" comment="openldap2-back-meta-2.4.41-18.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550334" comment="openldap2-client-2.4.41-18.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9330" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-06/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1826-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043157">SUSE bug 1043157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517676" comment="xen-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549414" comment="xen-doc-html-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517677" comment="xen-libs-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517678" comment="xen-libs-32bit-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549415" comment="xen-tools-4.7.2_06-42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549416" comment="xen-tools-domU-4.7.2_06-42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9343" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the MSNIP dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-msnip.c by validating an IPv4 address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<bugzilla href="https://bugzilla.suse.com/1042309">SUSE bug 1042309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077080">SUSE bug 1077080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9344" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero. This was addressed in epan/dissectors/packet-btl2cap.c by validating an interval value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<bugzilla href="https://bugzilla.suse.com/1042298">SUSE bug 1042298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<bugzilla href="https://bugzilla.suse.com/1042300">SUSE bug 1042300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9346" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<bugzilla href="https://bugzilla.suse.com/1042301">SUSE bug 1042301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9347" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<bugzilla href="https://bugzilla.suse.com/1042308">SUSE bug 1042308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6, the DOF dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-dof.c by validating a size value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<bugzilla href="https://bugzilla.suse.com/1042303">SUSE bug 1042303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<bugzilla href="https://bugzilla.suse.com/1042305">SUSE bug 1042305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1958-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00090.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<bugzilla href="https://bugzilla.suse.com/1042299">SUSE bug 1042299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049255">SUSE bug 1049255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049621">SUSE bug 1049621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9351" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<bugzilla href="https://bugzilla.suse.com/1042302">SUSE bug 1042302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9352" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<bugzilla href="https://bugzilla.suse.com/1042304">SUSE bug 1042304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9353" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<bugzilla href="https://bugzilla.suse.com/1042306">SUSE bug 1042306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9354" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1534-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00033.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash. This was addressed in epan/dissectors/packet-rgmp.c by validating an IPv4 address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<bugzilla href="https://bugzilla.suse.com/1042307">SUSE bug 1042307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042324">SUSE bug 1042324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042330">SUSE bug 1042330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042331">SUSE bug 1042331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549357" comment="libwireshark8-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549358" comment="libwiretap6-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549359" comment="libwscodecs1-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549360" comment="libwsutil7-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549361" comment="wireshark-2.2.7-47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549362" comment="wireshark-gtk-2.2.7-47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9373" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9373" ref_url="https://www.suse.com/security/cve/CVE-2017-9373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in QEMU (aka Quick Emulator), when built with IDE AHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the AHCI device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9373/">CVE-2017-9373</cve>
	<bugzilla href="https://bugzilla.suse.com/1042801">SUSE bug 1042801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9374" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9374" ref_url="https://www.suse.com/security/cve/CVE-2017-9374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9374/">CVE-2017-9374</cve>
	<bugzilla href="https://bugzilla.suse.com/1043073">SUSE bug 1043073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043074">SUSE bug 1043074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9375" ref_url="https://www.suse.com/security/cve/CVE-2017-9375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with USB xHCI controller emulator support, allows local guest OS privileged users to cause a denial of service (infinite recursive call) via vectors involving control transfer descriptors sequencing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9375/">CVE-2017-9375</cve>
	<bugzilla href="https://bugzilla.suse.com/1042800">SUSE bug 1042800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9403" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.7, a memory leak vulnerability was found in the function TIFFReadDirEntryLong8Array in tif_dirread.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403</cve>
	<bugzilla href="https://bugzilla.suse.com/1042805">SUSE bug 1042805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045688">SUSE bug 1045688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9404" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-10/msg00006.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.7, a memory leak vulnerability was found in the function OJPEGReadHeaderInfoSecTablesQTable in tif_ojpeg.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404</cve>
	<bugzilla href="https://bugzilla.suse.com/1042804">SUSE bug 1042804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549659" comment="libtiff5-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549660" comment="libtiff5-32bit-4.0.8-44.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549661" comment="tiff-4.0.8-44.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9405" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9405" ref_url="https://www.suse.com/security/cve/CVE-2017-9405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0770-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180770-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadICONImage function in icon.c:452 allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9405/">CVE-2017-9405</cve>
	<bugzilla href="https://bugzilla.suse.com/1042911">SUSE bug 1042911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9406" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9406" ref_url="https://www.suse.com/security/cve/CVE-2017-9406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.54.0, a memory leak vulnerability was found in the function gmalloc in gmem.cc, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9406/">CVE-2017-9406</cve>
	<bugzilla href="https://bugzilla.suse.com/1042803">SUSE bug 1042803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549497" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549498" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549377" comment="libpoppler44-0.24.4-14.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549499" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549500" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9407" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9407" ref_url="https://www.suse.com/security/cve/CVE-2017-9407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadPALMImage function in palm.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9407/">CVE-2017-9407</cve>
	<bugzilla href="https://bugzilla.suse.com/1042824">SUSE bug 1042824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9408" ref_url="https://www.suse.com/security/cve/CVE-2017-9408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    In Poppler 0.54.0, a memory leak vulnerability was found in the function Object::initArray in Object.cc, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9408/">CVE-2017-9408</cve>
	<bugzilla href="https://bugzilla.suse.com/1042802">SUSE bug 1042802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549497" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549498" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541441" comment="libpoppler44-0.24.4-14.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549499" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549500" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9409" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9409" ref_url="https://www.suse.com/security/cve/CVE-2017-9409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0092-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00036.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, the ReadMPCImage function in mpc.c allows attackers to cause a denial of service (memory leak) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9409/">CVE-2017-9409</cve>
	<bugzilla href="https://bugzilla.suse.com/1042948">SUSE bug 1042948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550749" comment="libMagickCore-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550750" comment="libMagickWand-6_Q16-1-6.8.8.1-71.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9439" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9439" ref_url="https://www.suse.com/security/cve/CVE-2017-9439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00068.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, a memory leak was found in the function ReadPDBImage in coders/pdb.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9439/">CVE-2017-9439</cve>
	<bugzilla href="https://bugzilla.suse.com/1042826">SUSE bug 1042826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549560" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549561" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9440" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9440" ref_url="https://www.suse.com/security/cve/CVE-2017-9440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00068.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-5, a memory leak was found in the function ReadPSDChannel in coders/psd.c, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9440/">CVE-2017-9440</cve>
	<bugzilla href="https://bugzilla.suse.com/1042812">SUSE bug 1042812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549560" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549561" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1898-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445</cve>
	<bugzilla href="https://bugzilla.suse.com/1045290">SUSE bug 1045290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063249">SUSE bug 1063249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549477" comment="dracut-044.1-109.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549478" comment="dracut-fips-044.1-109.8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549479" comment="libsystemd0-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549480" comment="libsystemd0-32bit-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549481" comment="libudev1-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549482" comment="libudev1-32bit-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549483" comment="systemd-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549484" comment="systemd-32bit-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517931" comment="systemd-bash-completion-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549485" comment="systemd-sysvinit-228-150.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549486" comment="udev-228-150.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9499" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9499" ref_url="https://www.suse.com/security/cve/CVE-2017-9499" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function SetPixelChannelAttributes, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9499/">CVE-2017-9499</cve>
	<bugzilla href="https://bugzilla.suse.com/1043291">SUSE bug 1043291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9500" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9500" ref_url="https://www.suse.com/security/cve/CVE-2017-9500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-8 Q16, an assertion failure was found in the function ResetImageProfileIterator, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9500/">CVE-2017-9500</cve>
	<bugzilla href="https://bugzilla.suse.com/1043290">SUSE bug 1043290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9501" ref_url="https://www.suse.com/security/cve/CVE-2017-9501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2271-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-08/msg00068.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.5-7 Q16, an assertion failure was found in the function LockSemaphoreInfo, which allows attackers to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9501/">CVE-2017-9501</cve>
	<bugzilla href="https://bugzilla.suse.com/1043289">SUSE bug 1043289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549560" comment="libMagickCore-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549561" comment="libMagickWand-6_Q16-1-6.8.8.1-71.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9502" ref_url="https://www.suse.com/security/cve/CVE-2017-9502" source="SUSE CVE"/>
    <description>
    In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven bytes. If the default protocol is specified to be FILE or a file: URL lacks two slashes, the given "URL" starts with a drive letter, and libcurl is built for Windows or DOS, then libcurl would copy the path 7 bytes off, so that the end of the given path would write beyond the malloc buffer (7 bytes being the length in bytes of the ascii string "file://").
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-9502/">CVE-2017-9502</cve>
	<bugzilla href="https://bugzilla.suse.com/1044243">SUSE bug 1044243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9503" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-07/msg00023.html" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043297">SUSE bug 1043297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043312">SUSE bug 1043312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549417" comment="qemu-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532230" comment="qemu-arm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549418" comment="qemu-block-curl-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549419" comment="qemu-block-rbd-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549420" comment="qemu-block-ssh-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549421" comment="qemu-guest-agent-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517681" comment="qemu-ipxe-1.0.0-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549422" comment="qemu-kvm-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549423" comment="qemu-lang-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549424" comment="qemu-ppc-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549425" comment="qemu-s390-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517683" comment="qemu-seabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517684" comment="qemu-sgabios-8-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549426" comment="qemu-tools-2.6.2-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517686" comment="qemu-vgabios-1.9.1-41.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009517687" comment="qemu-x86-2.6.2-41.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9524" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<bugzilla href="https://bugzilla.suse.com/1043808">SUSE bug 1043808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549786" comment="qemu-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532541" comment="qemu-arm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549787" comment="qemu-block-curl-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549788" comment="qemu-block-rbd-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549789" comment="qemu-block-ssh-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549790" comment="qemu-guest-agent-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518266" comment="qemu-ipxe-1.0.0-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549791" comment="qemu-kvm-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549792" comment="qemu-lang-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549793" comment="qemu-ppc-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549794" comment="qemu-s390-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518268" comment="qemu-seabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518269" comment="qemu-sgabios-8-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549795" comment="qemu-tools-2.6.2-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518271" comment="qemu-vgabios-1.9.1-41.22.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518272" comment="qemu-x86-2.6.2-41.22.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9526" ref_url="https://www.suse.com/security/cve/CVE-2017-9526" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002955.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1700-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-06/msg00104.html" source="SUSE-SU"/>
    <description>
    In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-9526/">CVE-2017-9526</cve>
	<bugzilla href="https://bugzilla.suse.com/1042326">SUSE bug 1042326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043777">SUSE bug 1043777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550355" comment="libgcrypt20-1.6.1-16.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550356" comment="libgcrypt20-32bit-1.6.1-16.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550357" comment="libgcrypt20-hmac-1.6.1-16.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550358" comment="libgcrypt20-hmac-32bit-1.6.1-16.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9611" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9611" ref_url="https://www.suse.com/security/cve/CVE-2017-9611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
    <description>
    The Ins_MIRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9611/">CVE-2017-9611</cve>
	<bugzilla href="https://bugzilla.suse.com/1050893">SUSE bug 1050893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9612" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9612" ref_url="https://www.suse.com/security/cve/CVE-2017-9612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The Ins_IP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9612/">CVE-2017-9612</cve>
	<bugzilla href="https://bugzilla.suse.com/1050891">SUSE bug 1050891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9617" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9617" ref_url="https://www.suse.com/security/cve/CVE-2017-9617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.7, deeply nested DAAP data may cause stack exhaustion (uncontrolled recursion) in the dissect_daap_one_tag function in epan/dissectors/packet-daap.c in the DAAP dissector.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9617/">CVE-2017-9617</cve>
	<bugzilla href="https://bugzilla.suse.com/1044417">SUSE bug 1044417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549653" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549654" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549655" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549656" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549657" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549658" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9670" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9670" ref_url="https://www.suse.com/security/cve/CVE-2017-9670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006967.html" source="SUSE-SU"/>
    <description>
    An uninitialized stack variable vulnerability in load_tic_series() in set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact when a victim opens a specially crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9670/">CVE-2017-9670</cve>
	<bugzilla href="https://bugzilla.suse.com/1044638">SUSE bug 1044638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334532" comment="gnuplot is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9725" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9725" ref_url="https://www.suse.com/security/cve/CVE-2017-9725" source="SUSE CVE"/>
    <description>
    In all Qualcomm products with Android releases from CAF using the Linux kernel, during DMA allocation, due to wrong data type of size, allocation size gets truncated which makes allocation succeed when it should fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9725/">CVE-2017-9725</cve>
	<bugzilla href="https://bugzilla.suse.com/1057481">SUSE bug 1057481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9726" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9726" ref_url="https://www.suse.com/security/cve/CVE-2017-9726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The Ins_MDRP function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9726/">CVE-2017-9726</cve>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9727" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9727" ref_url="https://www.suse.com/security/cve/CVE-2017-9727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9727/">CVE-2017-9727</cve>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9739" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9739" ref_url="https://www.suse.com/security/cve/CVE-2017-9739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The Ins_JMPR function in base/ttinterp.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9739/">CVE-2017-9739</cve>
	<bugzilla href="https://bugzilla.suse.com/1050887">SUSE bug 1050887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9742" ref_url="https://www.suse.com/security/cve/CVE-2017-9742" source="SUSE CVE"/>
    <description>
    The score_opcodes function in opcodes/score7-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9742/">CVE-2017-9742</cve>
	<bugzilla href="https://bugzilla.suse.com/1044867">SUSE bug 1044867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9743" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9743" ref_url="https://www.suse.com/security/cve/CVE-2017-9743" source="SUSE CVE"/>
    <description>
    The print_insn_score32 function in opcodes/score7-dis.c:552 in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9743/">CVE-2017-9743</cve>
	<bugzilla href="https://bugzilla.suse.com/1044870">SUSE bug 1044870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9744" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9744" ref_url="https://www.suse.com/security/cve/CVE-2017-9744" source="SUSE CVE"/>
    <description>
    The sh_elf_set_mach_from_flags function in bfd/elf32-sh.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9744/">CVE-2017-9744</cve>
	<bugzilla href="https://bugzilla.suse.com/1044872">SUSE bug 1044872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9745" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9745" ref_url="https://www.suse.com/security/cve/CVE-2017-9745" source="SUSE CVE"/>
    <description>
    The _bfd_vms_slurp_etir function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9745/">CVE-2017-9745</cve>
	<bugzilla href="https://bugzilla.suse.com/1044885">SUSE bug 1044885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The disassemble_bytes function in objdump.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of rae insns printing for this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044891">SUSE bug 1044891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9747" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The ieee_archive_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044897">SUSE bug 1044897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9748" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The ieee_object_p function in bfd/ieee.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, might allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution. NOTE: this may be related to a compiler bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044901">SUSE bug 1044901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9749" ref_url="https://www.suse.com/security/cve/CVE-2017-9749" source="SUSE CVE"/>
    <description>
    The *regs* macros in opcodes/bfin-dis.c in GNU Binutils 2.28 allow remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9749/">CVE-2017-9749</cve>
	<bugzilla href="https://bugzilla.suse.com/1044905">SUSE bug 1044905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    opcodes/rx-decode.opc in GNU Binutils 2.28 lacks bounds checks for certain scale arrays, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044909">SUSE bug 1044909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9751" ref_url="https://www.suse.com/security/cve/CVE-2017-9751" source="SUSE CVE"/>
    <description>
    opcodes/rl78-decode.opc in GNU Binutils 2.28 has an unbounded GETBYTE macro, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9751/">CVE-2017-9751</cve>
	<bugzilla href="https://bugzilla.suse.com/1044911">SUSE bug 1044911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9752" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9752" ref_url="https://www.suse.com/security/cve/CVE-2017-9752" source="SUSE CVE"/>
    <description>
    bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file in the _bfd_vms_get_value and _bfd_vms_slurp_etir functions during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9752/">CVE-2017-9752</cve>
	<bugzilla href="https://bugzilla.suse.com/1044920">SUSE bug 1044920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9753" ref_url="https://www.suse.com/security/cve/CVE-2017-9753" source="SUSE CVE"/>
    <description>
    The versados_mkobject function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not initialize a certain data structure, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9753/">CVE-2017-9753</cve>
	<bugzilla href="https://bugzilla.suse.com/1044921">SUSE bug 1044921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044923">SUSE bug 1044923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9754" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9754" ref_url="https://www.suse.com/security/cve/CVE-2017-9754" source="SUSE CVE"/>
    <description>
    The process_otr function in bfd/versados.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, does not validate a certain offset, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9754/">CVE-2017-9754</cve>
	<bugzilla href="https://bugzilla.suse.com/1044923">SUSE bug 1044923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    opcodes/i386-dis.c in GNU Binutils 2.28 does not consider the number of registers for bnd mode, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044925">SUSE bug 1044925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
    <description>
    The aarch64_ext_ldst_reglist function in opcodes/aarch64-dis.c in GNU Binutils 2.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by mishandling of this file during "objdump -D" execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044927">SUSE bug 1044927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9766" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9766" ref_url="https://www.suse.com/security/cve/CVE-2017-9766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003581.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.7, PROFINET IO data with a high recursion depth allows remote attackers to cause a denial of service (stack exhaustion) in the dissect_IODWriteReq function in plugins/profinet/packet-dcerpc-pn-io.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9766/">CVE-2017-9766</cve>
	<bugzilla href="https://bugzilla.suse.com/1045341">SUSE bug 1045341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549653" comment="libwireshark8-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549654" comment="libwiretap6-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549655" comment="libwscodecs1-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549656" comment="libwsutil7-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549657" comment="wireshark-2.2.9-48.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549658" comment="wireshark-gtk-2.2.9-48.9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9775" ref_url="https://www.suse.com/security/cve/CVE-2017-9775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Stack buffer overflow in GfxState.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9775/">CVE-2017-9775</cve>
	<bugzilla href="https://bugzilla.suse.com/1045719">SUSE bug 1045719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549497" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549498" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541441" comment="libpoppler44-0.24.4-14.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549499" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549500" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9776" ref_url="https://www.suse.com/security/cve/CVE-2017-9776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2056-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-08/msg00015.html" source="SUSE-SU"/>
    <description>
    Integer overflow leading to Heap buffer overflow in JBIG2Stream.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9776/">CVE-2017-9776</cve>
	<bugzilla href="https://bugzilla.suse.com/1045721">SUSE bug 1045721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549497" comment="libpoppler-glib8-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549498" comment="libpoppler-qt4-4-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541441" comment="libpoppler44-0.24.4-14.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549499" comment="libpoppler60-0.43.0-16.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549500" comment="poppler-tools-0.43.0-16.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9788" ref_url="https://www.suse.com/security/cve/CVE-2017-9788" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2016-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-07/msg00122.html" source="SUSE-SU"/>
    <description>
    In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9788/">CVE-2017-9788</cve>
	<bugzilla href="https://bugzilla.suse.com/1048576">SUSE bug 1048576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549489" comment="apache2-2.4.23-29.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532285" comment="apache2-doc-2.4.23-29.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549490" comment="apache2-example-pages-2.4.23-29.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549491" comment="apache2-prefork-2.4.23-29.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549492" comment="apache2-utils-2.4.23-29.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549493" comment="apache2-worker-2.4.23-29.3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9789" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9789" ref_url="https://www.suse.com/security/cve/CVE-2017-9789" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0291-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00108.html" source="SUSE-SU"/>
    <description>
    When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9789/">CVE-2017-9789</cve>
	<bugzilla href="https://bugzilla.suse.com/1048575">SUSE bug 1048575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550512" comment="apache2-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533082" comment="apache2-doc-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550513" comment="apache2-example-pages-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550514" comment="apache2-prefork-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550515" comment="apache2-utils-2.4.23-29.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550516" comment="apache2-worker-2.4.23-29.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2549-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-09/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00069.html" source="SUSE-SU"/>
    <description>
    Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<bugzilla href="https://bugzilla.suse.com/1058058">SUSE bug 1058058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1060757">SUSE bug 1060757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077582">SUSE bug 1077582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078450">SUSE bug 1078450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549648" comment="apache2-2.4.23-29.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532426" comment="apache2-doc-2.4.23-29.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549649" comment="apache2-example-pages-2.4.23-29.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549650" comment="apache2-prefork-2.4.23-29.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549651" comment="apache2-utils-2.4.23-29.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549652" comment="apache2-worker-2.4.23-29.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9799</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9799" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9799" ref_url="https://www.suse.com/security/cve/CVE-2017-9799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2017-11/msg00023.html" source="SUSE-SU"/>
    <description>
    It was found that under some situations and configurations of Apache Storm 1.x before 1.0.4 and 1.1.x before 1.1.1, it is theoretically possible for the owner of a topology to trick the supervisor to launch a worker as a different, non-root, user. In the worst case this could lead to secure credentials of the other user being compromised.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9799/">CVE-2017-9799</cve>
	<bugzilla href="https://bugzilla.suse.com/1059463">SUSE bug 1059463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594301" comment="storm-1.0.5-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594302" comment="storm-nimbus-1.0.5-5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594303" comment="storm-supervisor-1.0.5-5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9831" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9831" ref_url="https://www.suse.com/security/cve/CVE-2017-9831" source="SUSE CVE"/>
    <description>
    An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9831/">CVE-2017-9831</cve>
	<bugzilla href="https://bugzilla.suse.com/1045916">SUSE bug 1045916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338992" comment="libmtp is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9832" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9832" ref_url="https://www.suse.com/security/cve/CVE-2017-9832" source="SUSE CVE"/>
    <description>
    An integer overflow vulnerability in ptp-pack.c (ptp_unpack_OPL function) of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9832/">CVE-2017-9832</cve>
	<bugzilla href="https://bugzilla.suse.com/1045917">SUSE bug 1045917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338992" comment="libmtp is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9835" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9835" ref_url="https://www.suse.com/security/cve/CVE-2017-9835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003973.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0421-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The gs_alloc_ref_array function in psi/ialloc.c in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted PostScript document. This is related to a lack of an integer overflow check in base/gsalloc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9835/">CVE-2017-9835</cve>
	<bugzilla href="https://bugzilla.suse.com/1050879">SUSE bug 1050879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550661" comment="ghostscript-9.15-23.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550662" comment="ghostscript-x11-9.15-23.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9865" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9865" ref_url="https://www.suse.com/security/cve/CVE-2017-9865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00032.html" source="SUSE-SU"/>
    <description>
    The function GfxImageColorMap::getGray in GfxState.cc in Poppler 0.54.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted PDF document, related to missing color-map validation in ImageOutputDev.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9865/">CVE-2017-9865</cve>
	<bugzilla href="https://bugzilla.suse.com/1045939">SUSE bug 1045939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9935" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00056.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.8, there is a heap-based buffer overflow in the t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could lead to different damages. For example, a crafted TIFF document can lead to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free in t2p_free. Given these possibilities, it probably could cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074318">SUSE bug 1074318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108606">SUSE bug 1108606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9936" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9936" ref_url="https://www.suse.com/security/cve/CVE-2017-9936" source="SUSE CVE"/>
    <description>
    In LibTIFF 4.0.8, there is a memory leak in tif_jbig.c. A crafted TIFF document can lead to a memory leak resulting in a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9936/">CVE-2017-9936</cve>
	<bugzilla href="https://bugzilla.suse.com/1046073">SUSE bug 1046073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9951" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9951" ref_url="https://www.suse.com/security/cve/CVE-2017-9951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004166.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0855-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00074.html" source="SUSE-SU"/>
    <description>
    The try_read_command function in memcached.c in memcached before 1.4.39 allows remote attackers to cause a denial of service (segmentation fault) via a request to add/set a key, which makes a comparison between signed and unsigned int and triggers a heap-based buffer over-read. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8705.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9951/">CVE-2017-9951</cve>
	<bugzilla href="https://bugzilla.suse.com/1007870">SUSE bug 1007870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056865">SUSE bug 1056865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550899" comment="memcached-1.4.39-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594736" comment="memcached-1.4.39-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9954" ref_url="https://www.suse.com/security/cve/CVE-2017-9954" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The getvalue function in tekhex.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted tekhex file, as demonstrated by mishandling within the nm program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-9954/">CVE-2017-9954</cve>
	<bugzilla href="https://bugzilla.suse.com/1052061">SUSE bug 1052061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9955" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9955" ref_url="https://www.suse.com/security/cve/CVE-2017-9955" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003462.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3199-1" ref_url="https://lists.opensuse.org/opensuse-updates/2017-12/msg00008.html" source="SUSE-SU"/>
    <description>
    The get_build_id function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.28, allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file in which a certain size field is larger than a corresponding data field, as demonstrated by mishandling within the objdump program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9955/">CVE-2017-9955</cve>
	<bugzilla href="https://bugzilla.suse.com/1046094">SUSE bug 1046094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549900" comment="binutils-2.29.1-9.20.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9984" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9984" ref_url="https://www.suse.com/security/cve/CVE-2017-9984" source="SUSE CVE"/>
    <description>
    The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9984/">CVE-2017-9984</cve>
	<bugzilla href="https://bugzilla.suse.com/1046599">SUSE bug 1046599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/187396">SUSE bug 187396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9985" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9985" ref_url="https://www.suse.com/security/cve/CVE-2017-9985" source="SUSE CVE"/>
    <description>
    The snd_msndmidi_input_read function in sound/isa/msnd/msnd_midi.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9985/">CVE-2017-9985</cve>
	<bugzilla href="https://bugzilla.suse.com/1046601">SUSE bug 1046601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9986" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9986" ref_url="https://www.suse.com/security/cve/CVE-2017-9986" source="SUSE CVE"/>
    <description>
    The intr function in sound/oss/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9986/">CVE-2017-9986</cve>
	<bugzilla href="https://bugzilla.suse.com/1046600">SUSE bug 1046600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0202" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
    <description>
    clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550823" comment="clamav-0.99.4-33.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00063.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103091">SUSE bug 1103091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103092">SUSE bug 1103092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103099">SUSE bug 1103099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545663" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594480" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0361" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00063.html" source="SUSE-SU"/>
    <description>
    ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<bugzilla href="https://bugzilla.suse.com/1101410">SUSE bug 1101410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101412">SUSE bug 1101412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103091">SUSE bug 1103091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103092">SUSE bug 1103092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103099">SUSE bug 1103099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545663" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594480" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0486" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0486" ref_url="https://www.suse.com/security/cve/CVE-2018-0486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003822.html" source="SUSE-SU"/>
		<reference ref_id="TID7022691" ref_url="https://www.suse.com/support/kb/doc/?id=7022691" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00070.html" source="SUSE-SU"/>
    <description>
    Shibboleth XMLTooling-C before 1.6.3, as used in Shibboleth Service Provider before 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0486/">CVE-2018-0486</cve>
	<bugzilla href="https://bugzilla.suse.com/1075975">SUSE bug 1075975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083247">SUSE bug 1083247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550799" comment="libxmltooling6-1.5.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550800" comment="xmltooling-schemas-1.5.6-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0489" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0489" ref_url="https://www.suse.com/security/cve/CVE-2018-0489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003822.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00070.html" source="SUSE-SU"/>
    <description>
    Shibboleth XMLTooling-C before 1.6.4, as used in Shibboleth Service Provider before 2.6.1.4 on Windows and other products, mishandles digital signatures of user data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via crafted XML data. NOTE: this issue exists because of an incomplete fix for CVE-2018-0486.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0489/">CVE-2018-0489</cve>
	<bugzilla href="https://bugzilla.suse.com/1083247">SUSE bug 1083247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550799" comment="libxmltooling6-1.5.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550800" comment="xmltooling-schemas-1.5.6-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2452-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2122-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00070.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334493" comment="jasper is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334540" comment="libgxps is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0502" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00001.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502</cve>
	<bugzilla href="https://bugzilla.suse.com/1107296">SUSE bug 1107296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194009">SUSE bug 1194009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194012">SUSE bug 1194012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663987" comment="zsh-5.0.5-6.12.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0618" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0618" ref_url="https://www.suse.com/security/cve/CVE-2018-0618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00053.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting vulnerability in Mailman 2.1.26 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0618/">CVE-2018-0618</cve>
	<bugzilla href="https://bugzilla.suse.com/1099510">SUSE bug 1099510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530378" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546036" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594734" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1887-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2855-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3013-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00009.html" source="SUSE-SU"/>
    <description>
    During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<bugzilla href="https://bugzilla.suse.com/1077628">SUSE bug 1077628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099502">SUSE bug 1099502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106692">SUSE bug 1106692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110163">SUSE bug 1110163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519760" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519761" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519762" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530140" comment="libopenssl1_0_0-hmac-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530141" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519763" comment="openssl-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530142" comment="openssl-doc-1.0.2j-60.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550424" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550425" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550426" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550427" comment="libopenssl1_0_0-hmac-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550428" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550429" comment="openssl-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530142" comment="openssl-doc-1.0.2j-60.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594446" comment="libopenssl-devel-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594447" comment="libopenssl1_0_0-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550426" comment="libopenssl1_0_0-32bit-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594448" comment="libopenssl1_0_0-hmac-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550428" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594564" comment="nodejs6-6.14.4-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594449" comment="openssl-1.0.2j-60.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530142" comment="openssl-doc-1.0.2j-60.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0733" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0733" ref_url="https://www.suse.com/security/cve/CVE-2018-0733" source="SUSE CVE"/>
    <description>
    Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered as authenticated in an amount of tries lower than that guaranteed by the security claims of the scheme. The module can only be compiled by the HP-UX assembler, so that only HP-UX PA-RISC targets are affected. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-0733/">CVE-2018-0733</cve>
	<bugzilla href="https://bugzilla.suse.com/1087106">SUSE bug 1087106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3945-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183945-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520373" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520374" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520375" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530330" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530331" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520376" comment="openssl-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550655" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550656" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550657" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550658" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550659" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550660" comment="openssl-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594665" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594666" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550657" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594667" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550659" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595376" comment="nodejs6-6.16.0-11.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594668" comment="openssl-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0735</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3945-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183945-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3890-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00043.html" source="SUSE-SU"/>
    <description>
    The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113651">SUSE bug 1113651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2928-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2957-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00009.html" source="SUSE-SU"/>
    <description>
    The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089041">SUSE bug 1089041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089044">SUSE bug 1089044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089045">SUSE bug 1089045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123780">SUSE bug 1123780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334018" comment="openssl is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520119" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520120" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520121" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530267" comment="libopenssl1_0_0-hmac-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530268" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520122" comment="openssl-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530269" comment="openssl-doc-1.0.2j-60.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550543" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550544" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550545" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550546" comment="libopenssl1_0_0-hmac-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550547" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550548" comment="openssl-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530269" comment="openssl-doc-1.0.2j-60.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594585" comment="libopenssl-devel-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594586" comment="libopenssl1_0_0-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550545" comment="libopenssl1_0_0-32bit-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594587" comment="libopenssl1_0_0-hmac-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550547" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594588" comment="openssl-1.0.2j-60.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530269" comment="openssl-doc-1.0.2j-60.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0902-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0975-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0936-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00023.html" source="SUSE-SU"/>
    <description>
    Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009538002" comment="ovmf-2015+git1462940744.321151f-19.10.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538003" comment="ovmf-tools-2015+git1462940744.321151f-19.10.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538004" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.10.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009541426" comment="libopenssl-devel-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550948" comment="libopenssl1_0_0-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550949" comment="libopenssl1_0_0-32bit-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550950" comment="libopenssl1_0_0-hmac-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550951" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550952" comment="openssl-1.0.2j-60.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533365" comment="openssl-doc-1.0.2j-60.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099047">SUSE bug 1099047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550701" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550702" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550703" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550704" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533165" comment="glibc-html-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533166" comment="glibc-info-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550705" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550706" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550707" comment="glibc-profile-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550708" comment="glibc-profile-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550709" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009536741" comment="kgraft-patch-4_4_103-92_53-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536740" comment="kgraft-patch-4_4_103-92_56-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536735" comment="kgraft-patch-4_4_59-92_17-default-10-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536745" comment="kgraft-patch-4_4_59-92_20-default-10-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536734" comment="kgraft-patch-4_4_59-92_24-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536738" comment="kgraft-patch-4_4_74-92_29-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536739" comment="kgraft-patch-4_4_74-92_32-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536737" comment="kgraft-patch-4_4_74-92_35-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536746" comment="kgraft-patch-4_4_74-92_38-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536743" comment="kgraft-patch-4_4_90-92_45-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536744" comment="kgraft-patch-4_4_90-92_50-default-5-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000005" ref_url="https://www.suse.com/security/cve/CVE-2018-1000005" source="SUSE CVE"/>
    <description>
    libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000005/">CVE-2018-1000005</cve>
	<bugzilla href="https://bugzilla.suse.com/1076360">SUSE bug 1076360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0236-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00101.html" source="SUSE-SU"/>
    <description>
    libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145903">SUSE bug 1145903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185551">SUSE bug 1185551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192797">SUSE bug 1192797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198766">SUSE bug 1198766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550442" comment="curl-7.37.0-37.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550443" comment="libcurl4-7.37.0-37.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550444" comment="libcurl4-32bit-7.37.0-37.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000024" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00028.html" source="SUSE-SU"/>
    <description>
    The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024</cve>
	<bugzilla href="https://bugzilla.suse.com/1077003">SUSE bug 1077003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550755" comment="squid-3.5.21-26.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000026" ref_url="https://www.suse.com/security/cve/CVE-2018-1000026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000026/">CVE-2018-1000026</cve>
	<bugzilla href="https://bugzilla.suse.com/1079384">SUSE bug 1079384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096723">SUSE bug 1096723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009536593" comment="kgraft-patch-4_4_103-92_53-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536592" comment="kgraft-patch-4_4_103-92_56-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536596" comment="kgraft-patch-4_4_114-92_64-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536595" comment="kgraft-patch-4_4_114-92_67-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536594" comment="kgraft-patch-4_4_74-92_38-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536591" comment="kgraft-patch-4_4_90-92_45-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536590" comment="kgraft-patch-4_4_90-92_50-default-10-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000027" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003826.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0647-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00028.html" source="SUSE-SU"/>
    <description>
    The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027</cve>
	<bugzilla href="https://bugzilla.suse.com/1077006">SUSE bug 1077006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550755" comment="squid-3.5.21-26.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000031" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000031" ref_url="https://www.suse.com/security/cve/CVE-2018-1000031" source="SUSE CVE"/>
    <description>
    A heap-based buffer overflow exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service or to possibly achieve code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000031/">CVE-2018-1000031</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080075">SUSE bug 1080075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338997" comment="unzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000032" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000032" ref_url="https://www.suse.com/security/cve/CVE-2018-1000032" source="SUSE CVE"/>
    <description>
    A heap-based buffer overflow exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service or to possibly achieve code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000032/">CVE-2018-1000032</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080076">SUSE bug 1080076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338997" comment="unzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000033" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000033" ref_url="https://www.suse.com/security/cve/CVE-2018-1000033" source="SUSE CVE"/>
    <description>
    An out-of-bounds read exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service and read sensitive memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-1000033/">CVE-2018-1000033</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080077">SUSE bug 1080077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338997" comment="unzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000034" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000034" ref_url="https://www.suse.com/security/cve/CVE-2018-1000034" source="SUSE CVE"/>
    <description>
    An out-of-bounds read exists in Info-Zip UnZip version 6.10c22 that allows an attacker to perform a denial of service and read sensitive memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-1000034/">CVE-2018-1000034</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080079">SUSE bug 1080079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338997" comment="unzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00013.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow exists in Info-Zip UnZip version &lt;= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035</cve>
	<bugzilla href="https://bugzilla.suse.com/1076531">SUSE bug 1076531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080074">SUSE bug 1080074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149684">SUSE bug 1149684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159417">SUSE bug 1159417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196768">SUSE bug 1196768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334480" comment="unzip is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location function of package.rb that can result in path traversal when writing to a symlinked basedir outside of the root. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073</cve>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074</cve>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175764">SUSE bug 1175764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop.. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075</cve>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could be installed, as the tarball would contain multiple gem signatures.. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076</cve>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem could set an invalid homepage URL. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077</cve>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183937">SUSE bug 1183937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334078" comment="ruby is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appear to be exploitable via the victim must browse to a malicious gem on a vulnerable gem server. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078</cve>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation that can result in the gem could write to arbitrary filesystem locations during installation. This attack appear to be exploitable via the victim must install a malicious gem. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079</cve>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000085" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00063.html" source="SUSE-SU"/>
    <description>
    ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<bugzilla href="https://bugzilla.suse.com/1082858">SUSE bug 1082858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545663" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550823" comment="clamav-0.99.4-33.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594480" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000097" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000097" ref_url="https://www.suse.com/security/cve/CVE-2018-1000097" source="SUSE CVE"/>
    <description>
    Sharutils sharutils (unshar command) version 4.15.2 contains a Buffer Overflow vulnerability in Affected component on the file unshar.c at line 75, function looks_like_c_code. Failure to perform checking of the buffer containing input line. that can result in Could lead to code execution. This attack appear to be exploitable via Victim have to run unshar command on a specially crafted file..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000097/">CVE-2018-1000097</cve>
	<bugzilla href="https://bugzilla.suse.com/1085004">SUSE bug 1085004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334079" comment="sharutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000115" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000115" ref_url="https://www.suse.com/security/cve/CVE-2018-1000115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004061.html" source="SUSE-SU"/>
		<reference ref_id="TID000019137" ref_url="https://www.suse.com/support/kb/doc/?id=000019137" source="SUSE-SU"/>
		<reference ref_id="TID7022726" ref_url="https://www.suse.com/support/kb/doc/?id=7022726" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0968-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000115/">CVE-2018-1000115</cve>
	<bugzilla href="https://bugzilla.suse.com/1083903">SUSE bug 1083903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334534" comment="memcached is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004533.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0794-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00084.html" source="SUSE-SU"/>
    <description>
    A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550809" comment="curl-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550810" comment="libcurl4-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550811" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0794-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00084.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085215">SUSE bug 1085215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550809" comment="curl-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550810" comment="libcurl4-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550811" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0794-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00084.html" source="SUSE-SU"/>
    <description>
    A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550809" comment="curl-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550810" comment="libcurl4-7.37.0-37.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550811" comment="libcurl4-32bit-7.37.0-37.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000127" ref_url="https://www.suse.com/security/cve/CVE-2018-1000127" source="SUSE CVE"/>
    <description>
    memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability appears to have been fixed in 1.4.37 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000127/">CVE-2018-1000127</cve>
	<bugzilla href="https://bugzilla.suse.com/1085209">SUSE bug 1085209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334021" comment="memcached is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334534" comment="memcached is affected"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000135" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000135" ref_url="https://www.suse.com/security/cve/CVE-2018-1000135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00005.html" source="SUSE-SU"/>
    <description>
    GNOME NetworkManager version 1.10.2 and earlier contains a Information Exposure (CWE-200) vulnerability in DNS resolver that can result in Private DNS queries leaked to local network's DNS servers, while on VPN. This vulnerability appears to have been fixed in Some Ubuntu 16.04 packages were fixed, but later updates removed the fix. cf. https://bugs.launchpad.net/ubuntu/+bug/1754671 an upstream fix does not appear to be available at this time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000135/">CVE-2018-1000135</cve>
	<bugzilla href="https://bugzilla.suse.com/1086263">SUSE bug 1086263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334334" comment="NetworkManager is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000140" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0822-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0828-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00064.html" source="SUSE-SU"/>
    <description>
    rsyslog librelp version 1.2.14 and earlier contains a Buffer Overflow vulnerability in the checking of x509 certificates from a peer that can result in Remote code execution. This attack appear to be exploitable a remote attacker that can connect to rsyslog and trigger a stack buffer overflow by sending a specially crafted x509 certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140</cve>
	<bugzilla href="https://bugzilla.suse.com/1086730">SUSE bug 1086730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550843" comment="librelp0-1.2.7-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1128-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1137-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00004.html" source="SUSE-SU"/>
    <description>
    GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156</cve>
	<bugzilla href="https://bugzilla.suse.com/1088420">SUSE bug 1088420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093615">SUSE bug 1093615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101128">SUSE bug 1101128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142513">SUSE bug 1142513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334312" comment="patch is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000161" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000161" ref_url="https://www.suse.com/security/cve/CVE-2018-1000161" source="SUSE CVE"/>
    <description>
    nmap version 6.49BETA6 through 7.60, up to and including SVN revision 37147 contains a Directory Traversal vulnerability in NSE script http-fetch that can result in file overwrite as the user is running it. This attack appears to be exploitable via a victim that runs NSE script http-fetch against a malicious web site. This vulnerability appears to have been fixed in 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000161/">CVE-2018-1000161</cve>
	<bugzilla href="https://bugzilla.suse.com/1088608">SUSE bug 1088608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334053" comment="nmap is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000168" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00021.html" source="SUSE-SU"/>
    <description>
    nghttp2 version &gt;= 1.10.0 and nghttp2 &lt;= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in &gt;= 1.31.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097401">SUSE bug 1097401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334080" comment="nghttp2 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552180" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596437" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000199" ref_url="https://www.suse.com/security/cve/CVE-2018-1000199" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1224-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1225-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1229-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1237-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1240-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1245-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1246-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1252-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1253-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1259-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1263-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1266-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1267-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000199/">CVE-2018-1000199</cve>
	<bugzilla href="https://bugzilla.suse.com/1089895">SUSE bug 1089895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090036">SUSE bug 1090036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536761" comment="kgraft-patch-4_4_103-92_53-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536760" comment="kgraft-patch-4_4_103-92_56-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536767" comment="kgraft-patch-4_4_114-92_64-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536766" comment="kgraft-patch-4_4_114-92_67-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536757" comment="kgraft-patch-4_4_120-92_70-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536468" comment="kgraft-patch-4_4_121-92_73-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536469" comment="kgraft-patch-4_4_121-92_80-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536768" comment="kgraft-patch-4_4_59-92_17-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536769" comment="kgraft-patch-4_4_59-92_20-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536770" comment="kgraft-patch-4_4_59-92_24-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536763" comment="kgraft-patch-4_4_74-92_29-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536762" comment="kgraft-patch-4_4_74-92_32-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536765" comment="kgraft-patch-4_4_74-92_35-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536764" comment="kgraft-patch-4_4_74-92_38-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536759" comment="kgraft-patch-4_4_90-92_45-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536758" comment="kgraft-patch-4_4_90-92_50-default-6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000200" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000200" ref_url="https://www.suse.com/security/cve/CVE-2018-1000200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously with the oom reaper's unmap_page_range() since the vma's VM_LOCKED bit is cleared before munlocking (to determine if any other vmas share the memory and are mlocked).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000200/">CVE-2018-1000200</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090150">SUSE bug 1090150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000201</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000201" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000201" ref_url="https://www.suse.com/security/cve/CVE-2018-1000201" source="SUSE CVE"/>
    <description>
    ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000201/">CVE-2018-1000201</cve>
	<bugzilla href="https://bugzilla.suse.com/1122119">SUSE bug 1122119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009340771" comment="rubygem-ffi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000204" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000300" ref_url="https://www.suse.com/security/cve/CVE-2018-1000300" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00015.html" source="SUSE-SU"/>
    <description>
    curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerability appears to have been fixed in curl &lt; 7.54.1 and curl &gt;= 7.60.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000300/">CVE-2018-1000300</cve>
	<bugzilla href="https://bugzilla.suse.com/1092094">SUSE bug 1092094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00015.html" source="SUSE-SU"/>
    <description>
    curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl &lt; 7.20.0 and curl &gt;= 7.60.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334020" comment="curl is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520965" comment="curl-7.37.0-37.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520966" comment="libcurl4-7.37.0-37.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520967" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546202" comment="curl-7.37.0-37.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546203" comment="libcurl4-7.37.0-37.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546204" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594748" comment="curl-7.37.0-37.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594749" comment="libcurl4-7.37.0-37.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546204" comment="libcurl4-32bit-7.37.0-37.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000654</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1372-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005515.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1498-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html" source="SUSE-SU"/>
    <description>
    GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654</cve>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334558" comment="libtasn1 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3052-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548677" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548678" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548679" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551198" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595054" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595055" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595056" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595057" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000805</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000805" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000805" ref_url="https://www.suse.com/security/cve/CVE-2018-1000805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0396-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190396-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0129-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00001.html" source="SUSE-SU"/>
    <description>
    Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000805/">CVE-2018-1000805</cve>
	<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595389" comment="python-amqp-1.4.9-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595390" comment="python-oslo.messaging-5.10.2-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595391" comment="python-ovs-2.5.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595392" comment="python-paramiko-2.0.9-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595393" comment="python-psql2mysql-0.5.0+git.1539592188.13e5d0f-1.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000807" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807</cve>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521791" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550676" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550677" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594695" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594696" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000808" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html" source="SUSE-SU"/>
    <description>
    Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808</cve>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520401" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521791" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550676" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550677" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594695" comment="python-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520402" comment="python-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520403" comment="python-setuptools-18.0.1-4.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594696" comment="python3-cryptography-1.3.1-7.13.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521792" comment="python3-pyOpenSSL-16.0.0-4.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520404" comment="python3-setuptools-18.0.1-4.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000816</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000816" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000816" ref_url="https://www.suse.com/security/cve/CVE-2018-1000816" source="SUSE CVE"/>
    <description>
    Grafana version confirmed for 5.2.4 and 5.3.0 contains a Cross Site Scripting (XSS) vulnerability in Influxdb and Graphite query editor that can result in Running arbitrary js code in victims browser.. This attack appear to be exploitable via Authenticated user must click on the input field where the payload was previously inserted..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000816/">CVE-2018-1000816</cve>
	<bugzilla href="https://bugzilla.suse.com/1120791">SUSE bug 1120791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334411" comment="grafana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000872</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000872" ref_url="https://www.suse.com/security/cve/CVE-2018-1000872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005539.html" source="SUSE-SU"/>
    <description>
    OpenKMIP PyKMIP version All versions before 0.8.0 contains a CWE 399: Resource Management Errors (similar issue to CVE-2015-5262) vulnerability in PyKMIP server that can result in DOS: the server can be made unavailable by one or more clients opening all of the available sockets. This attack appear to be exploitable via A client or clients open sockets with the server and then never close them. This vulnerability appears to have been fixed in 0.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000872/">CVE-2018-1000872</cve>
	<bugzilla href="https://bugzilla.suse.com/1120767">SUSE bug 1120767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594926" comment="caasp-openstack-heat-templates-1.0+git.1553079189.3bf8922-1.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594927" comment="crowbar-4.0+git.1551088848.823bcaa3-7.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594928" comment="crowbar-core-4.0+git.1556285635.ab602dd4d-9.46.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594929" comment="crowbar-core-branding-upstream-4.0+git.1556285635.ab602dd4d-9.46.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594930" comment="crowbar-devel-4.0+git.1551088848.823bcaa3-7.29.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594931" comment="crowbar-ha-4.0+git.1556181005.47c643d-4.46.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594932" comment="crowbar-openstack-4.0+git.1554887450.ff7c30c1c-9.51.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594933" comment="galera-python-clustercheck-0.0+git.1506329536.8f5878c-1.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594934" comment="openstack-ceilometer-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594935" comment="openstack-ceilometer-agent-central-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594936" comment="openstack-ceilometer-agent-compute-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594937" comment="openstack-ceilometer-agent-ipmi-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594938" comment="openstack-ceilometer-agent-notification-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594939" comment="openstack-ceilometer-api-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594940" comment="openstack-ceilometer-collector-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594941" comment="openstack-ceilometer-doc-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594942" comment="openstack-ceilometer-polling-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594943" comment="openstack-heat-gbp-5.1.1~dev1-2.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594944" comment="python-PyKMIP-0.5.0-3.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594945" comment="python-ceilometer-7.1.1~dev4-4.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594946" comment="python-heat-gbp-5.1.1~dev1-2.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594947" comment="python-pysaml2-4.0.2-3.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594948" comment="ruby2.1-rubygem-crowbar-client-3.9.0-7.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    binutils version 2.32 and earlier contains a Integer Overflow vulnerability in objdump, bfd_get_dynamic_reloc_upper_bound,bfd_canonicalize_dynamic_reloc that can result in Integer overflow trigger heap overflow. Successful exploitation allows execution of arbitrary code.. This attack appear to be exploitable via Local. This vulnerability appears to have been fixed in after commit 3a551c7a1b80fca579461774860574eabfd7f18f.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<bugzilla href="https://bugzilla.suse.com/1120640">SUSE bug 1120640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000877" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar-&gt;lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877</cve>
	<bugzilla href="https://bugzilla.suse.com/1120653">SUSE bug 1120653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000878" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2615-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2632-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878</cve>
	<bugzilla href="https://bugzilla.suse.com/1120654">SUSE bug 1120654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000880" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000880" ref_url="https://www.suse.com/security/cve/CVE-2018-1000880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005278.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html" source="SUSE-SU"/>
    <description>
    libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This attack appear to be exploitable via the victim must open a specially crafted WARC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000880/">CVE-2018-1000880</cve>
	<bugzilla href="https://bugzilla.suse.com/1120659">SUSE bug 1120659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334041" comment="libarchive is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10074" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10074" ref_url="https://www.suse.com/security/cve/CVE-2018-10074" source="SUSE CVE"/>
    <description>
    The hi3660_stub_clk_probe function in drivers/clk/hisilicon/clk-hi3660-stub.c in the Linux kernel before 4.16 allows local users to cause a denial of service (NULL pointer dereference) by triggering a failure of resource retrieval.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10074/">CVE-2018-10074</cve>
	<bugzilla href="https://bugzilla.suse.com/1089674">SUSE bug 1089674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10087" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089608">SUSE bug 1089608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10115" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10115" ref_url="https://www.suse.com/security/cve/CVE-2018-10115" source="SUSE CVE"/>
    <description>
    Incorrect initialization logic of RAR decoder objects in 7-Zip 18.03 and before can lead to usage of uninitialized memory, allowing remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10115/">CVE-2018-10115</cve>
	<bugzilla href="https://bugzilla.suse.com/1091758">SUSE bug 1091758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334011" comment="p7zip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089752">SUSE bug 1089752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10126" ref_url="https://www.suse.com/security/cve/CVE-2018-10126" source="SUSE CVE"/>
    <description>
    LibTIFF 4.0.9 has a NULL pointer dereference in the jpeg_fdct_16x16 function in jfdctint.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10126/">CVE-2018-10126</cve>
	<bugzilla href="https://bugzilla.suse.com/1090496">SUSE bug 1090496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334077" comment="tiff is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10177" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10177" ref_url="https://www.suse.com/security/cve/CVE-2018-10177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1123-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-28, there is an infinite loop in the ReadOneMNGImage function of the coders/png.c file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted mng file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10177/">CVE-2018-10177</cve>
	<bugzilla href="https://bugzilla.suse.com/1089781">SUSE bug 1089781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004242.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00010.html" source="SUSE-SU"/>
    <description>
    The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<bugzilla href="https://bugzilla.suse.com/1090099">SUSE bug 1090099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10195" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html" source="SUSE-SU"/>
    <description>
    lrzsz before version 0.12.21~rc can leak information to the receiving side due to an incorrect length check in the function zsdata that causes a size_t to wrap around.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195</cve>
	<bugzilla href="https://bugzilla.suse.com/1090051">SUSE bug 1090051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149678">SUSE bug 1149678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334537" comment="rzsz is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10196" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10196" ref_url="https://www.suse.com/security/cve/CVE-2018-10196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007668.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1303-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00073.html" source="SUSE-SU"/>
    <description>
    NULL pointer dereference vulnerability in the rebuild_vlists function in lib/dotgen/conc.c in the dotgen library in Graphviz 2.40.1 allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10196/">CVE-2018-10196</cve>
	<bugzilla href="https://bugzilla.suse.com/1093447">SUSE bug 1093447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334538" comment="graphviz is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10322" ref_url="https://www.suse.com/security/cve/CVE-2018-10322" source="SUSE CVE"/>
    <description>
    The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10322/">CVE-2018-10322</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090749">SUSE bug 1090749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090717">SUSE bug 1090717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10372" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<bugzilla href="https://bugzilla.suse.com/1091015">SUSE bug 1091015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10373" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<bugzilla href="https://bugzilla.suse.com/1090997">SUSE bug 1090997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004243.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1953-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00015.html" source="SUSE-SU"/>
    <description>
    mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels, which allows remote attackers to cause a denial of service (heap-based buffer overflow or over-read) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334082" comment="libvorbis is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00084.html" source="SUSE-SU"/>
    <description>
    bark_noise_hybridmp in psy.c in Xiph.Org libvorbis 1.3.6 has a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334082" comment="libvorbis is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334000" comment="xen is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530387" comment="xen-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530388" comment="xen-doc-html-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530389" comment="xen-libs-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530390" comment="xen-libs-32bit-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530391" comment="xen-tools-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530392" comment="xen-tools-domU-4.7.5_02-43.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334000" comment="xen is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530387" comment="xen-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530388" comment="xen-doc-html-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530389" comment="xen-libs-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530390" comment="xen-libs-32bit-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530391" comment="xen-tools-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530392" comment="xen-tools-domU-4.7.5_02-43.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1049" ref_url="https://www.suse.com/security/cve/CVE-2018-1049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0320-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00118.html" source="SUSE-SU"/>
    <description>
    In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will hang. A race condition like this may lead to denial of service, until mount points are unmounted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1049/">CVE-2018-1049</cve>
	<bugzilla href="https://bugzilla.suse.com/1076308">SUSE bug 1076308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140475">SUSE bug 1140475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550566" comment="libsystemd0-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550567" comment="libsystemd0-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550568" comment="libudev1-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550569" comment="libudev1-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550570" comment="systemd-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550571" comment="systemd-32bit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518816" comment="systemd-bash-completion-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550572" comment="systemd-sysvinit-228-150.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550573" comment="udev-228-150.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0774-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180774-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0801-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00091.html" source="SUSE-SU"/>
    <description>
    All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<bugzilla href="https://bugzilla.suse.com/1081741">SUSE bug 1081741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530194" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550500" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594481" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550856" comment="libdcerpc-binding0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550857" comment="libdcerpc-binding0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550858" comment="libdcerpc0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550859" comment="libdcerpc0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550860" comment="libndr-krb5pac0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550861" comment="libndr-krb5pac0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550862" comment="libndr-nbt0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550863" comment="libndr-nbt0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550864" comment="libndr-standard0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550865" comment="libndr-standard0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550866" comment="libndr0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550867" comment="libndr0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550868" comment="libnetapi0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550869" comment="libnetapi0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550870" comment="libsamba-credentials0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550871" comment="libsamba-credentials0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550872" comment="libsamba-errors0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550873" comment="libsamba-errors0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550874" comment="libsamba-hostconfig0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550875" comment="libsamba-hostconfig0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550876" comment="libsamba-passdb0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550877" comment="libsamba-passdb0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550878" comment="libsamba-util0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550879" comment="libsamba-util0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550880" comment="libsamdb0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550881" comment="libsamdb0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550882" comment="libsmbclient0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550883" comment="libsmbclient0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550884" comment="libsmbconf0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550885" comment="libsmbconf0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550886" comment="libsmbldap0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550887" comment="libsmbldap0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550888" comment="libtevent-util0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550889" comment="libtevent-util0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550890" comment="libwbclient0-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550891" comment="libwbclient0-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550892" comment="samba-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550893" comment="samba-client-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550894" comment="samba-client-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519111" comment="samba-doc-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550895" comment="samba-libs-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550896" comment="samba-libs-32bit-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550897" comment="samba-winbind-4.4.2-38.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550898" comment="samba-winbind-32bit-4.4.2-38.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1052" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1052" ref_url="https://www.suse.com/security/cve/CVE-2018-1052" source="SUSE CVE"/>
    <description>
    Memory disclosure vulnerability in table partitioning was found in postgresql 10.x before 10.2, allowing an authenticated attacker to read arbitrary bytes of server memory via purpose-crafted insert to a partitioned table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1052/">CVE-2018-1052</cve>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080253">SUSE bug 1080253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1053" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0523-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0688-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00044.html" source="SUSE-SU"/>
    <description>
    In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords. The attack is infeasible if a directory mode blocks the attacker searching the current working directory or if the prevailing umask blocks the attacker opening the file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<bugzilla href="https://bugzilla.suse.com/1077983">SUSE bug 1077983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550724" comment="libecpg6-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550725" comment="libpq5-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550726" comment="libpq5-32bit-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550777" comment="postgresql94-9.4.16-21.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550778" comment="postgresql94-contrib-9.4.16-21.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533230" comment="postgresql94-docs-9.4.16-21.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550779" comment="postgresql94-server-9.4.16-21.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550727" comment="postgresql96-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550728" comment="postgresql96-contrib-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533185" comment="postgresql96-docs-9.6.7-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550729" comment="postgresql96-server-9.6.7-3.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10534" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<bugzilla href="https://bugzilla.suse.com/1091368">SUSE bug 1091368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10535" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
    <description>
    The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a "SECTION" type that has a "0" value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<bugzilla href="https://bugzilla.suse.com/1091365">SUSE bug 1091365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10536" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10536" ref_url="https://www.suse.com/security/cve/CVE-2018-10536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier. The WAV parser component contains a vulnerability that allows writing to memory because ParseRiffHeaderConfig in riff.c does not reject multiple format chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10536/">CVE-2018-10536</cve>
	<bugzilla href="https://bugzilla.suse.com/1091344">SUSE bug 1091344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10537" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10537" ref_url="https://www.suse.com/security/cve/CVE-2018-10537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10537/">CVE-2018-10537</cve>
	<bugzilla href="https://bugzilla.suse.com/1091343">SUSE bug 1091343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10538" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10538" ref_url="https://www.suse.com/security/cve/CVE-2018-10538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for WAV input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in riff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10538/">CVE-2018-10538</cve>
	<bugzilla href="https://bugzilla.suse.com/1091342">SUSE bug 1091342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10539" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10539" ref_url="https://www.suse.com/security/cve/CVE-2018-10539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10539/">CVE-2018-10539</cve>
	<bugzilla href="https://bugzilla.suse.com/1091341">SUSE bug 1091341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10540" ref_url="https://www.suse.com/security/cve/CVE-2018-10540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10540/">CVE-2018-10540</cve>
	<bugzilla href="https://bugzilla.suse.com/1091340">SUSE bug 1091340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004187.html" source="SUSE-SU"/>
		<reference ref_id="TID7022763" ref_url="https://www.suse.com/support/kb/doc/?id=7022763" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1727-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00035.html" source="SUSE-SU"/>
    <description>
    On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users' passwords, including administrative users and privileged service accounts (eg Domain Controllers).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057</cve>
	<bugzilla href="https://bugzilla.suse.com/1081024">SUSE bug 1081024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1058" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0736-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0765-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0890-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00009.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<bugzilla href="https://bugzilla.suse.com/1081925">SUSE bug 1081925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550803" comment="libecpg6-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550804" comment="libpq5-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550805" comment="libpq5-32bit-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550936" comment="postgresql94-9.4.17-21.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550937" comment="postgresql94-contrib-9.4.17-21.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533353" comment="postgresql94-docs-9.4.17-21.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550938" comment="postgresql94-server-9.4.17-21.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550806" comment="postgresql96-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550807" comment="postgresql96-contrib-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533246" comment="postgresql96-docs-9.6.8-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550808" comment="postgresql96-server-9.6.8-3.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1063" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003888.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0937-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00028.html" source="SUSE-SU"/>
    <description>
    Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063</cve>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550946" comment="policycoreutils-2.5-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550947" comment="policycoreutils-python-2.5-10.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00011.html" source="SUSE-SU"/>
    <description>
    libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550914" comment="libvirt-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550915" comment="libvirt-client-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550916" comment="libvirt-daemon-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550917" comment="libvirt-daemon-config-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550918" comment="libvirt-daemon-config-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550919" comment="libvirt-daemon-driver-interface-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519135" comment="libvirt-daemon-driver-libxl-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550920" comment="libvirt-daemon-driver-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550921" comment="libvirt-daemon-driver-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550922" comment="libvirt-daemon-driver-nodedev-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550923" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550924" comment="libvirt-daemon-driver-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550925" comment="libvirt-daemon-driver-secret-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550926" comment="libvirt-daemon-driver-storage-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550927" comment="libvirt-daemon-hooks-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550928" comment="libvirt-daemon-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550929" comment="libvirt-daemon-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519145" comment="libvirt-daemon-xen-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550930" comment="libvirt-doc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550931" comment="libvirt-lock-sanlock-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550932" comment="libvirt-nss-2.0.0-27.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
    <description>
    The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<bugzilla href="https://bugzilla.suse.com/1083650">SUSE bug 1083650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1066" ref_url="https://www.suse.com/security/cve/CVE-2018-1066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before version 4.11 is vulnerable to a NULL pointer dereference in fs/cifs/cifsencrypt.c:setup_ntlmv2_rsp() that allows an attacker controlling a CIFS server to kernel panic a client that has this server mounted, because an empty TargetInfo field in an NTLMSSP setup negotiation response is mishandled during session recovery.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1066/">CVE-2018-1066</cve>
	<bugzilla href="https://bugzilla.suse.com/1083640">SUSE bug 1083640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1030-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<bugzilla href="https://bugzilla.suse.com/1085107">SUSE bug 1085107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085114">SUSE bug 1085114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123903">SUSE bug 1123903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009536741" comment="kgraft-patch-4_4_103-92_53-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536740" comment="kgraft-patch-4_4_103-92_56-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536736" comment="kgraft-patch-4_4_114-92_64-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536742" comment="kgraft-patch-4_4_114-92_67-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536735" comment="kgraft-patch-4_4_59-92_17-default-10-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536745" comment="kgraft-patch-4_4_59-92_20-default-10-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536734" comment="kgraft-patch-4_4_59-92_24-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536738" comment="kgraft-patch-4_4_74-92_29-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536739" comment="kgraft-patch-4_4_74-92_32-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536737" comment="kgraft-patch-4_4_74-92_35-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536746" comment="kgraft-patch-4_4_74-92_38-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536743" comment="kgraft-patch-4_4_90-92_45-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536744" comment="kgraft-patch-4_4_90-92_50-default-5-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10733" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10733" ref_url="https://www.suse.com/security/cve/CVE-2018-10733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00005.html" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10733/">CVE-2018-10733</cve>
	<bugzilla href="https://bugzilla.suse.com/1092125">SUSE bug 1092125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334540" comment="libgxps is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10767" ref_url="https://www.suse.com/security/cve/CVE-2018-10767" source="SUSE CVE"/>
    <description>
    There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10767/">CVE-2018-10767</cve>
	<bugzilla href="https://bugzilla.suse.com/1092123">SUSE bug 1092123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334540" comment="libgxps is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10772" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10772" ref_url="https://www.suse.com/security/cve/CVE-2018-10772" source="SUSE CVE"/>
    <description>
    The tEXtToDataBuf function in pngimage.cpp in Exiv2 through 0.26 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10772/">CVE-2018-10772</cve>
	<bugzilla href="https://bugzilla.suse.com/1092096">SUSE bug 1092096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334027" comment="exiv2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00055.html" source="SUSE-SU"/>
    <description>
    TIFFWriteScanline in tif_write.c in LibTIFF 3.8.2 has a heap-based buffer over-read, as demonstrated by bmp2tiff.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<bugzilla href="https://bugzilla.suse.com/1092480">SUSE bug 1092480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10780" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10780" ref_url="https://www.suse.com/security/cve/CVE-2018-10780" source="SUSE CVE"/>
    <description>
    Exiv2::Image::byteSwap2 in image.cpp in Exiv2 0.26 has a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-10780/">CVE-2018-10780</cve>
	<bugzilla href="https://bugzilla.suse.com/1092475">SUSE bug 1092475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10804" ref_url="https://www.suse.com/security/cve/CVE-2018-10804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    ImageMagick version 7.0.7-28 contains a memory leak in WriteTIFFImage in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10804/">CVE-2018-10804</cve>
	<bugzilla href="https://bugzilla.suse.com/1095813">SUSE bug 1095813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004481.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1862-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00040.html" source="SUSE-SU"/>
    <description>
    ImageMagick version 7.0.7-28 contains a memory leak in ReadYCBCRImage in coders/ycbcr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<bugzilla href="https://bugzilla.suse.com/1095812">SUSE bug 1095812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10811" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811</cve>
	<bugzilla href="https://bugzilla.suse.com/1093536">SUSE bug 1093536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334541" comment="strongswan is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552195" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548852" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548853" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548854" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548855" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595296" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595297" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595298" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595299" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1083" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00001.html" source="SUSE-SU"/>
    <description>
    Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083</cve>
	<bugzilla href="https://bugzilla.suse.com/1087026">SUSE bug 1087026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189668">SUSE bug 1189668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334085" comment="zsh is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10839" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    Qemu emulator &lt;= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530365" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530366" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530368" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530369" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530371" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530372" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530375" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550693" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550694" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550695" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550696" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550698" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536732" comment="qemu-ppc-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550700" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594728" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594729" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594730" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594731" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594732" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594733" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00000.html" source="SUSE-SU"/>
    <description>
    It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530255" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530256" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530257" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530258" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545806" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545807" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545808" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594570" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594571" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594572" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00000.html" source="SUSE-SU"/>
    <description>
    It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530255" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530256" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530257" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530258" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545806" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545807" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545808" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594570" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594571" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594572" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00000.html" source="SUSE-SU"/>
    <description>
    A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530255" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530256" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530257" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530258" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545806" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545807" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545808" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594570" comment="gnutls-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594571" comment="libgnutls-openssl27-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594572" comment="libgnutls28-3.2.15-18.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545809" comment="libgnutls28-32bit-3.2.15-18.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0556-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190556-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00014.html" source="SUSE-SU"/>
    <description>
    The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852</cve>
	<bugzilla href="https://bugzilla.suse.com/1098377">SUSE bug 1098377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551396" comment="libipa_hbac0-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551397" comment="libsss_idmap0-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551398" comment="libsss_sudo-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551399" comment="python-sssd-config-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551400" comment="sssd-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551401" comment="sssd-32bit-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551402" comment="sssd-ad-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551403" comment="sssd-ipa-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551404" comment="sssd-krb5-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551405" comment="sssd-krb5-common-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551406" comment="sssd-ldap-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551407" comment="sssd-proxy-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551408" comment="sssd-tools-1.13.4-34.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595490" comment="libipa_hbac0-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595491" comment="libsss_idmap0-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595492" comment="libsss_sudo-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595493" comment="python-sssd-config-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595494" comment="sssd-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551401" comment="sssd-32bit-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595495" comment="sssd-ad-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595496" comment="sssd-ipa-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595497" comment="sssd-krb5-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595498" comment="sssd-krb5-common-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595499" comment="sssd-ldap-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595500" comment="sssd-proxy-1.13.4-34.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595501" comment="sssd-tools-1.13.4-34.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<bugzilla href="https://bugzilla.suse.com/1097104">SUSE bug 1097104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097108">SUSE bug 1097108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536553" comment="kgraft-patch-4_4_103-92_53-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536552" comment="kgraft-patch-4_4_103-92_56-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536551" comment="kgraft-patch-4_4_114-92_64-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536550" comment="kgraft-patch-4_4_114-92_67-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536543" comment="kgraft-patch-4_4_120-92_70-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536544" comment="kgraft-patch-4_4_121-92_73-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536545" comment="kgraft-patch-4_4_121-92_80-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536546" comment="kgraft-patch-4_4_121-92_85-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536577" comment="kgraft-patch-4_4_121-92_92-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536549" comment="kgraft-patch-4_4_74-92_38-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536548" comment="kgraft-patch-4_4_90-92_45-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536547" comment="kgraft-patch-4_4_90-92_50-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10855</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10855" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10855" ref_url="https://www.suse.com/security/cve/CVE-2018-10855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004967.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00057.html" source="SUSE-SU"/>
    <description>
    Ansible 2.5 prior to 2.5.5, and 2.4 prior to 2.4.5, do not honor the no_log task flag for failed tasks. When the no_log flag has been used to protect sensitive data passed to a task from being logged, and that task does not run successfully, Ansible will expose sensitive data in log files and on the terminal of the user running Ansible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10855/">CVE-2018-10855</cve>
	<bugzilla href="https://bugzilla.suse.com/1097775">SUSE bug 1097775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099808">SUSE bug 1099808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109957">SUSE bug 1109957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2320-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2339-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2400-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00059.html" source="SUSE-SU"/>
    <description>
    A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<bugzilla href="https://bugzilla.suse.com/1103411">SUSE bug 1103411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110943">SUSE bug 1110943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334028" comment="samba is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530194" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530149" comment="libdcerpc-binding0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530150" comment="libdcerpc-binding0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530151" comment="libdcerpc0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530152" comment="libdcerpc0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530153" comment="libndr-krb5pac0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530154" comment="libndr-krb5pac0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530155" comment="libndr-nbt0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530156" comment="libndr-nbt0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530157" comment="libndr-standard0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530158" comment="libndr-standard0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530159" comment="libndr0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530160" comment="libndr0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530161" comment="libnetapi0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530162" comment="libnetapi0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530163" comment="libsamba-credentials0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530164" comment="libsamba-credentials0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530165" comment="libsamba-errors0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530166" comment="libsamba-errors0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530167" comment="libsamba-hostconfig0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530168" comment="libsamba-hostconfig0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530169" comment="libsamba-passdb0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530170" comment="libsamba-passdb0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530171" comment="libsamba-util0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530172" comment="libsamba-util0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530173" comment="libsamdb0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530174" comment="libsamdb0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530175" comment="libsmbclient0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530176" comment="libsmbclient0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530177" comment="libsmbconf0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530178" comment="libsmbconf0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530179" comment="libsmbldap0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530180" comment="libsmbldap0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530181" comment="libtevent-util0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530182" comment="libtevent-util0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530183" comment="libwbclient0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530184" comment="libwbclient0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530185" comment="samba-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530186" comment="samba-client-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530187" comment="samba-client-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530188" comment="samba-doc-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530189" comment="samba-libs-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530190" comment="samba-libs-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530191" comment="samba-winbind-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530192" comment="samba-winbind-32bit-4.4.2-38.20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550500" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550457" comment="libdcerpc-binding0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550458" comment="libdcerpc-binding0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550459" comment="libdcerpc0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550460" comment="libdcerpc0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550461" comment="libndr-krb5pac0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550462" comment="libndr-krb5pac0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550463" comment="libndr-nbt0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550464" comment="libndr-nbt0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550465" comment="libndr-standard0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550466" comment="libndr-standard0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550467" comment="libndr0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550468" comment="libndr0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550469" comment="libnetapi0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550470" comment="libnetapi0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550471" comment="libsamba-credentials0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550472" comment="libsamba-credentials0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550473" comment="libsamba-errors0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550474" comment="libsamba-errors0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550475" comment="libsamba-hostconfig0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550476" comment="libsamba-hostconfig0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550477" comment="libsamba-passdb0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550478" comment="libsamba-passdb0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550479" comment="libsamba-util0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550480" comment="libsamba-util0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550481" comment="libsamdb0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550482" comment="libsamdb0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550483" comment="libsmbclient0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550484" comment="libsmbclient0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550485" comment="libsmbconf0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550486" comment="libsmbconf0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550487" comment="libsmbldap0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550488" comment="libsmbldap0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550489" comment="libtevent-util0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550490" comment="libtevent-util0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550491" comment="libwbclient0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550492" comment="libwbclient0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550493" comment="samba-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550494" comment="samba-client-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550495" comment="samba-client-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530188" comment="samba-doc-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550496" comment="samba-libs-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550497" comment="samba-libs-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550498" comment="samba-winbind-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550499" comment="samba-winbind-32bit-4.4.2-38.20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594481" comment="libdcerpc-atsvc0-4.2.4-28.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594455" comment="libdcerpc-binding0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550458" comment="libdcerpc-binding0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594456" comment="libdcerpc0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550460" comment="libdcerpc0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594457" comment="libndr-krb5pac0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550462" comment="libndr-krb5pac0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594458" comment="libndr-nbt0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550464" comment="libndr-nbt0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594459" comment="libndr-standard0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550466" comment="libndr-standard0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594460" comment="libndr0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550468" comment="libndr0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594461" comment="libnetapi0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550470" comment="libnetapi0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594462" comment="libsamba-credentials0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550472" comment="libsamba-credentials0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594463" comment="libsamba-errors0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550474" comment="libsamba-errors0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594464" comment="libsamba-hostconfig0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550476" comment="libsamba-hostconfig0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594465" comment="libsamba-passdb0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550478" comment="libsamba-passdb0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594466" comment="libsamba-util0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550480" comment="libsamba-util0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594467" comment="libsamdb0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550482" comment="libsamdb0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594468" comment="libsmbclient0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550484" comment="libsmbclient0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594469" comment="libsmbconf0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550486" comment="libsmbconf0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594470" comment="libsmbldap0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550488" comment="libsmbldap0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594471" comment="libtevent-util0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550490" comment="libtevent-util0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594472" comment="libwbclient0-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550492" comment="libwbclient0-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594473" comment="samba-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594474" comment="samba-client-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550495" comment="samba-client-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530188" comment="samba-doc-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594475" comment="samba-libs-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550497" comment="samba-libs-32bit-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594476" comment="samba-winbind-4.4.2-38.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550499" comment="samba-winbind-32bit-4.4.2-38.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1087" ref_url="https://www.suse.com/security/cve/CVE-2018-1087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="TID000019188" ref_url="https://www.suse.com/support/kb/doc/?id=000019188" source="SUSE-SU"/>
		<reference ref_id="TID7022916" ref_url="https://www.suse.com/support/kb/doc/?id=7022916" source="SUSE-SU"/>
    <description>
    kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1087/">CVE-2018-1087</cve>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536459" comment="kgraft-patch-4_4_103-92_53-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536458" comment="kgraft-patch-4_4_103-92_56-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536465" comment="kgraft-patch-4_4_114-92_64-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536464" comment="kgraft-patch-4_4_114-92_67-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536455" comment="kgraft-patch-4_4_120-92_70-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536466" comment="kgraft-patch-4_4_59-92_20-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536467" comment="kgraft-patch-4_4_59-92_24-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536461" comment="kgraft-patch-4_4_74-92_29-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536460" comment="kgraft-patch-4_4_74-92_32-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536463" comment="kgraft-patch-4_4_74-92_35-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536462" comment="kgraft-patch-4_4_74-92_38-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536457" comment="kgraft-patch-4_4_90-92_45-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536456" comment="kgraft-patch-4_4_90-92_50-default-7-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00029.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531669" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531670" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531671" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531672" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531673" comment="libspice-controller0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531674" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531675" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552001" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552002" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552003" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552004" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552005" comment="libspice-controller0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552006" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552007" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596154" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596155" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596156" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596157" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596158" comment="libspice-controller0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596159" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596160" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334170" comment="spice is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334604" comment="spice-gtk is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10874</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10874" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10874" ref_url="https://www.suse.com/security/cve/CVE-2018-10874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004967.html" source="SUSE-SU"/>
    <description>
    In ansible it was found that inventory variables are loaded from current working directory when running ad-hoc command which are under attacker's control, allowing to run arbitrary code as a result.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10874/">CVE-2018-10874</cve>
	<bugzilla href="https://bugzilla.suse.com/1097775">SUSE bug 1097775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099805">SUSE bug 1099805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099808">SUSE bug 1099808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10876" ref_url="https://www.suse.com/security/cve/CVE-2018-10876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Linux kernel in the ext4 filesystem code. A use-after-free is possible in ext4_ext_remove_space() function when mounting and operating a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10876/">CVE-2018-10876</cve>
	<bugzilla href="https://bugzilla.suse.com/1099811">SUSE bug 1099811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10877" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10877" ref_url="https://www.suse.com/security/cve/CVE-2018-10877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10877/">CVE-2018-10877</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099846">SUSE bug 1099846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10878" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10878" ref_url="https://www.suse.com/security/cve/CVE-2018-10878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10878/">CVE-2018-10878</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099813">SUSE bug 1099813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10879" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10879" ref_url="https://www.suse.com/security/cve/CVE-2018-10879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10879/">CVE-2018-10879</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099844">SUSE bug 1099844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10880" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10881" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10881" ref_url="https://www.suse.com/security/cve/CVE-2018-10881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10881/">CVE-2018-10881</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099864">SUSE bug 1099864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10882" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10883" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10883" ref_url="https://www.suse.com/security/cve/CVE-2018-10883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10883/">CVE-2018-10883</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099863">SUSE bug 1099863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531669" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531670" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531671" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531672" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531673" comment="libspice-controller0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531674" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531675" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552001" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552002" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552003" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552004" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552005" comment="libspice-controller0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552006" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552007" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596154" comment="libspice-client-glib-2_0-8-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596155" comment="libspice-client-glib-helper-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596156" comment="libspice-client-gtk-2_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596157" comment="libspice-client-gtk-3_0-4-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596158" comment="libspice-controller0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531676" comment="libspice-server1-0.12.7-10.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596159" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596160" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334170" comment="spice is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334604" comment="spice-gtk is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<bugzilla href="https://bugzilla.suse.com/1105322">SUSE bug 1105322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105323">SUSE bug 1105323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536593" comment="kgraft-patch-4_4_103-92_53-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536592" comment="kgraft-patch-4_4_103-92_56-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536596" comment="kgraft-patch-4_4_114-92_64-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536595" comment="kgraft-patch-4_4_114-92_67-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536586" comment="kgraft-patch-4_4_120-92_70-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536587" comment="kgraft-patch-4_4_121-92_73-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536588" comment="kgraft-patch-4_4_121-92_80-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536589" comment="kgraft-patch-4_4_121-92_85-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536585" comment="kgraft-patch-4_4_121-92_92-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536594" comment="kgraft-patch-4_4_74-92_38-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536591" comment="kgraft-patch-4_4_90-92_45-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536590" comment="kgraft-patch-4_4_90-92_50-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10903" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10903" ref_url="https://www.suse.com/security/cve/CVE-2018-10903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3445-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00065.html" source="SUSE-SU"/>
    <description>
    A flaw was found in python-cryptography versions between &gt;=1.9.0 and &lt;2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they would have a 1 in 256 chance of passing the MAC check. GCM tag forgeries can cause key leakage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10903/">CVE-2018-10903</cve>
	<bugzilla href="https://bugzilla.suse.com/1101820">SUSE bug 1101820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531783" comment="python-cffi-1.11.2-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531784" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531785" comment="python-xattr-0.7.5-6.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531786" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531787" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552044" comment="python-cffi-1.11.2-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552045" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552046" comment="python-xattr-0.7.5-6.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552047" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552048" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596247" comment="python-cffi-1.11.2-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596248" comment="python-cryptography-2.1.4-7.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596249" comment="python-xattr-0.7.5-6.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596250" comment="python3-cffi-1.11.2-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596251" comment="python3-cryptography-2.1.4-7.28.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1091" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0972-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<bugzilla href="https://bugzilla.suse.com/1087231">SUSE bug 1087231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<bugzilla href="https://bugzilla.suse.com/1104199">SUSE bug 1104199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140876">SUSE bug 1140876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185814">SUSE bug 1185814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545954" comment="postgresql94-9.4.19-21.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545955" comment="postgresql94-contrib-9.4.19-21.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530335" comment="postgresql94-docs-9.4.19-21.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545956" comment="postgresql94-server-9.4.19-21.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545885" comment="postgresql96-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545886" comment="postgresql96-contrib-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530312" comment="postgresql96-docs-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545887" comment="postgresql96-server-9.6.10-3.22.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594673" comment="postgresql94-9.4.19-21.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594674" comment="postgresql94-contrib-9.4.19-21.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530335" comment="postgresql94-docs-9.4.19-21.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594675" comment="postgresql94-server-9.4.19-21.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594621" comment="postgresql96-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594622" comment="postgresql96-contrib-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530312" comment="postgresql96-docs-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594623" comment="postgresql96-server-9.6.10-3.22.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1092" ref_url="https://www.suse.com/security/cve/CVE-2018-1092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1092/">CVE-2018-1092</cve>
	<bugzilla href="https://bugzilla.suse.com/1087012">SUSE bug 1087012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004778.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3449-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925</cve>
	<bugzilla href="https://bugzilla.suse.com/1104202">SUSE bug 1104202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545885" comment="postgresql96-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545886" comment="postgresql96-contrib-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530312" comment="postgresql96-docs-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545887" comment="postgresql96-server-9.6.10-3.22.7 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594621" comment="postgresql96-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594622" comment="postgresql96-contrib-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530312" comment="postgresql96-docs-9.6.10-3.22.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594623" comment="postgresql96-server-9.6.10-3.22.7 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1093" ref_url="https://www.suse.com/security/cve/CVE-2018-1093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1093/">CVE-2018-1093</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087095">SUSE bug 1087095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10938" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (Linux Security Module) and NetLabel should be set up on a system before an attacker could leverage this flaw.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<bugzilla href="https://bugzilla.suse.com/1106016">SUSE bug 1106016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106191">SUSE bug 1106191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536593" comment="kgraft-patch-4_4_103-92_53-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536592" comment="kgraft-patch-4_4_103-92_56-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536596" comment="kgraft-patch-4_4_114-92_64-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536595" comment="kgraft-patch-4_4_114-92_67-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536586" comment="kgraft-patch-4_4_120-92_70-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536587" comment="kgraft-patch-4_4_121-92_73-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536588" comment="kgraft-patch-4_4_121-92_80-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536589" comment="kgraft-patch-4_4_121-92_85-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536585" comment="kgraft-patch-4_4_121-92_92-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536594" comment="kgraft-patch-4_4_74-92_38-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536591" comment="kgraft-patch-4_4_90-92_45-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536590" comment="kgraft-patch-4_4_90-92_50-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<bugzilla href="https://bugzilla.suse.com/1087007">SUSE bug 1087007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1095" ref_url="https://www.suse.com/security/cve/CVE-2018-1095" source="SUSE CVE"/>
    <description>
    The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel through 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows attackers to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1095/">CVE-2018-1095</cve>
	<bugzilla href="https://bugzilla.suse.com/1087004">SUSE bug 1087004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10963" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
    <description>
    The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file, a different vulnerability than CVE-2017-13726.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963</cve>
	<bugzilla href="https://bugzilla.suse.com/1092949">SUSE bug 1092949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00002.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334000" comment="xen is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00002.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334000" comment="xen is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10998" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10998" ref_url="https://www.suse.com/security/cve/CVE-2018-10998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3882-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004960.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exiv2 0.26. readMetadata in jp2image.cpp allows remote attackers to cause a denial of service (SIGABRT) by triggering an incorrect Safe::add call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-10998/">CVE-2018-10998</cve>
	<bugzilla href="https://bugzilla.suse.com/1093095">SUSE bug 1093095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1100" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00001.html" source="SUSE-SU"/>
    <description>
    zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100</cve>
	<bugzilla href="https://bugzilla.suse.com/1089030">SUSE bug 1089030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189668">SUSE bug 1189668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334085" comment="zsh is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670824" comment="zsh-5.0.5-6.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11037" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11037" ref_url="https://www.suse.com/security/cve/CVE-2018-11037" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, the Exiv2::PngImage::printStructure function in pngimage.cpp allows remote attackers to cause an information leak via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11037/">CVE-2018-11037</cve>
	<bugzilla href="https://bugzilla.suse.com/1093475">SUSE bug 1093475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1106" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1047-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1049-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00066.html" source="SUSE-SU"/>
    <description>
    An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106</cve>
	<bugzilla href="https://bugzilla.suse.com/1086936">SUSE bug 1086936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123722">SUSE bug 1123722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334088" comment="PackageKit is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1108" ref_url="https://www.suse.com/security/cve/CVE-2018-1108" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1108/">CVE-2018-1108</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090818">SUSE bug 1090818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1111" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1111" ref_url="https://www.suse.com/security/cve/CVE-2018-1111" source="SUSE CVE"/>
    <description>
    DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1111/">CVE-2018-1111</cve>
	<bugzilla href="https://bugzilla.suse.com/1093364">SUSE bug 1093364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334179" comment="dhcp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1115" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1115" ref_url="https://www.suse.com/security/cve/CVE-2018-1115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1900-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1115/">CVE-2018-1115</cve>
	<bugzilla href="https://bugzilla.suse.com/1091610">SUSE bug 1091610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1118" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092472">SUSE bug 1092472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1119</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1119" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1119" ref_url="https://www.suse.com/security/cve/CVE-2018-1119" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2018-10184.  Reason: This candidate is a reservation duplicate of CVE-2018-10184.  Notes: All CVE users should reference CVE-2018-10184 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-1119/">CVE-2018-1119</cve>
	<bugzilla href="https://bugzilla.suse.com/1089837">SUSE bug 1089837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092260">SUSE bug 1092260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/&lt;pid&gt;/cmdline (or /proc/&lt;pid&gt;/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11212" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0585-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<bugzilla href="https://bugzilla.suse.com/1122299">SUSE bug 1122299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530522" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530523" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530865" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546379" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546380" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546381" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546382" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546656" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542123" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546657" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548547" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548548" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548549" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548550" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594879" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594880" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594881" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594882" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595451" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595452" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595453" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594842" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594843" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594844" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594845" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546605" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546606" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595386" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595387" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546605" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546606" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595386" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595387" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11232" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11232" ref_url="https://www.suse.com/security/cve/CVE-2018-11232" source="SUSE CVE"/>
    <description>
    The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11232/">CVE-2018-11232</cve>
	<bugzilla href="https://bugzilla.suse.com/1093846">SUSE bug 1093846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233</cve>
	<bugzilla href="https://bugzilla.suse.com/1095218">SUSE bug 1095218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530088" comment="git-core-2.12.3-27.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545508" comment="git-core-2.12.3-27.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594394" comment="git-core-2.12.3-27.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1566-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2502-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<bugzilla href="https://bugzilla.suse.com/1095219">SUSE bug 1095219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530088" comment="git-core-2.12.3-27.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545508" comment="git-core-2.12.3-27.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594394" comment="git-core-2.12.3-27.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530089" comment="git-doc-2.12.3-27.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00000.html" source="SUSE-SU"/>
    <description>
    stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519646" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519647" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519648" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519649" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519651" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519652" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530086" comment="glibc-profile-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530087" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519653" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550383" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550384" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550385" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550386" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550387" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550388" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550389" comment="glibc-profile-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550390" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550391" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594389" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550384" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594390" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550386" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594391" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550388" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594392" comment="glibc-profile-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550390" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594393" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1633-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00000.html" source="SUSE-SU"/>
    <description>
    An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<bugzilla href="https://bugzilla.suse.com/1092877">SUSE bug 1092877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334045" comment="glibc is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519646" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519647" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519648" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519649" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519651" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519652" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530086" comment="glibc-profile-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530087" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519653" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550383" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550384" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550385" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550386" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550387" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550388" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550389" comment="glibc-profile-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550390" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550391" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594389" comment="glibc-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550384" comment="glibc-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594390" comment="glibc-devel-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550386" comment="glibc-devel-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530084" comment="glibc-html-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519650" comment="glibc-i18ndata-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530085" comment="glibc-info-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594391" comment="glibc-locale-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550388" comment="glibc-locale-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594392" comment="glibc-profile-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550390" comment="glibc-profile-32bit-2.22-62.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594393" comment="nscd-2.22-62.13.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546605" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546606" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595386" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595387" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546605" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546606" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595386" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595387" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521630" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521631" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546605" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546606" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595386" comment="libprocps3-3.3.9-11.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595387" comment="procps-3.3.9-11.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1128" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2193-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182193-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html" source="SUSE-SU"/>
    <description>
    It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177843">SUSE bug 1177843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177859">SUSE bug 1177859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1129" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2193-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182193-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1284-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<bugzilla href="https://bugzilla.suse.com/1096748">SUSE bug 1096748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11354" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11355" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11356" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11357" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the RRC dissector and other dissectors could crash. This was addressed in epan/proto.c by avoiding a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash. This was addressed in epan/dissectors/packet-gsm_a_dtap.c by fixing an off-by-one error that caused a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11361" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/dot11decrypt.c by avoiding a buffer overflow during FTE processing in Dot11DecryptTDLSDeriveKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1428-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<bugzilla href="https://bugzilla.suse.com/1094301">SUSE bug 1094301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11469</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11469" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11469" ref_url="https://www.suse.com/security/cve/CVE-2018-11469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004745.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00050.html" source="SUSE-SU"/>
    <description>
    Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check_request_for_cacheability function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11469/">CVE-2018-11469</cve>
	<bugzilla href="https://bugzilla.suse.com/1094846">SUSE bug 1094846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11624" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11624" ref_url="https://www.suse.com/security/cve/CVE-2018-11624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00040.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-36 Q16, the ReadMATImage function in coders/mat.c allows attackers to cause a use after free via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11624/">CVE-2018-11624</cve>
	<bugzilla href="https://bugzilla.suse.com/1096203">SUSE bug 1096203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11625" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11625" ref_url="https://www.suse.com/security/cve/CVE-2018-11625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00040.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-37 Q16, SetGrayscaleImage in the quantize.c file allows attackers to cause a heap-based buffer over-read via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11625/">CVE-2018-11625</cve>
	<bugzilla href="https://bugzilla.suse.com/1096200">SUSE bug 1096200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11627</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11627" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11627" ref_url="https://www.suse.com/security/cve/CVE-2018-11627" source="SUSE CVE"/>
    <description>
    Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11627/">CVE-2018-11627</cve>
	<bugzilla href="https://bugzilla.suse.com/1095529">SUSE bug 1095529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009340772" comment="rubygem-sinatra is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1172" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1135-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00006.html" source="SUSE-SU"/>
    <description>
    This vulnerability allows remote attackers to deny service on vulnerable installations of The Squid Software Foundation Squid 3.5.27-20180318. Authentication is not required to exploit this vulnerability. The specific flaw exists within ClientRequestContext::sslBumpAccessCheck(). A crafted request can trigger the dereference of a null pointer. An attacker can leverage this vulnerability to create a denial-of-service condition to users of the system. Was ZDI-CAN-6088.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172</cve>
	<bugzilla href="https://bugzilla.suse.com/1090089">SUSE bug 1090089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334168" comment="squid is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11763" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11763" ref_url="https://www.suse.com/security/cve/CVE-2018-11763" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3582-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3713-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11763/">CVE-2018-11763</cve>
	<bugzilla href="https://bugzilla.suse.com/1109961">SUSE bug 1109961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530317" comment="apache2-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530318" comment="apache2-doc-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530319" comment="apache2-example-pages-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530320" comment="apache2-prefork-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530321" comment="apache2-utils-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530322" comment="apache2-worker-2.4.23-29.27.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550594" comment="apache2-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530318" comment="apache2-doc-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550595" comment="apache2-example-pages-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550596" comment="apache2-prefork-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550597" comment="apache2-utils-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550598" comment="apache2-worker-2.4.23-29.27.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594632" comment="apache2-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530318" comment="apache2-doc-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594633" comment="apache2-example-pages-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594634" comment="apache2-prefork-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594635" comment="apache2-utils-2.4.23-29.27.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594636" comment="apache2-worker-2.4.23-29.27.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11779</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11779" ref_url="https://www.suse.com/security/cve/CVE-2018-11779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11779/">CVE-2018-11779</cve>
	<bugzilla href="https://bugzilla.suse.com/1143163">SUSE bug 1143163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334443" comment="storm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11805" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00003.html" source="SUSE-SU"/>
    <description>
    In Apache SpamAssassin before 3.4.3, nefarious CF files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA 3.4.3, we recommend that users should only use update channels or 3rd party .cf files from trusted places.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805</cve>
	<bugzilla href="https://bugzilla.suse.com/1118987">SUSE bug 1118987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531788" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531789" comment="spamassassin-3.4.2-44.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549119" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549120" comment="spamassassin-3.4.2-44.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596275" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596276" comment="spamassassin-3.4.2-44.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html" source="SUSE-SU"/>
    <description>
    m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334000" comment="xen is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530270" comment="qemu-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530271" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530273" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530274" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530276" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530277" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530280" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550558" comment="qemu-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550559" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550560" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550561" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550562" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550563" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536606" comment="qemu-ppc-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550564" comment="qemu-s390-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550565" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594589" comment="qemu-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594590" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594591" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594592" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550562" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594593" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550564" comment="qemu-s390-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594594" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00015.html" source="SUSE-SU"/>
    <description>
    libjpeg 9c has a large loop because read_pixel in rdtarga.c mishandles EOF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172994">SUSE bug 1172994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172995">SUSE bug 1172995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333959" comment="libjpeg-turbo is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333960" comment="libjpeg62-turbo is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2011-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00024.html" source="SUSE-SU"/>
    <description>
    In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099507">SUSE bug 1099507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545541" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545543" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594451" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594452" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1698-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1708-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1722-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1724-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00034.html" source="SUSE-SU"/>
    <description>
    mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101134">SUSE bug 1101134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519719" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545522" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594422" comment="gpg2-2.0.24-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519720" comment="gpg2-lang-2.0.24-9.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12086" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520313" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520314" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520315" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520316" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520317" comment="wireshark-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520318" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545890" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545891" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545892" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545893" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545894" comment="wireshark-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545895" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594637" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594638" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594639" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594640" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594641" comment="wireshark-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594642" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12099</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12099" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12099" ref_url="https://www.suse.com/security/cve/CVE-2018-12099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006815.html" source="SUSE-SU"/>
    <description>
    Grafana before 5.2.0-beta1 has XSS vulnerabilities in dashboard links.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12099/">CVE-2018-12099</cve>
	<bugzilla href="https://bugzilla.suse.com/1096985">SUSE bug 1096985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172450">SUSE bug 1172450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174583">SUSE bug 1174583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175951">SUSE bug 1175951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594490" comment="grafana-4.5.1-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594491" comment="kafka-0.10.2.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594492" comment="logstash-2.4.1-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594493" comment="monasca-installer-20180608_12.47-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12115</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12115" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2816-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2855-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00075.html" source="SUSE-SU"/>
    <description>
    In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115</cve>
	<bugzilla href="https://bugzilla.suse.com/1105019">SUSE bug 1105019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594564" comment="nodejs6-6.14.4-11.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12116</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12116" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
    <description>
    Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116</cve>
	<bugzilla href="https://bugzilla.suse.com/1117630">SUSE bug 1117630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595376" comment="nodejs6-6.16.0-11.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12120</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12120" ref_url="https://www.suse.com/security/cve/CVE-2018-12120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
    <description>
    Node.js: All versions prior to Node.js 6.15.0: Debugger port 5858 listens on any interface by default: When the debugger is enabled with `node --debug` or `node debug`, it listens to port 5858 on all interfaces by default. This may allow remote computers to attach to the debug port and evaluate arbitrary JavaScript. The default interface is now localhost. It has always been possible to start the debugger on a specific interface, such as `node --debug=localhost`. The debugger was removed in Node.js 8 and replaced with the inspector, so no versions from 8 and later are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12120/">CVE-2018-12120</cve>
	<bugzilla href="https://bugzilla.suse.com/1117625">SUSE bug 1117625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595376" comment="nodejs6-6.16.0-11.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12121</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12121" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
    <description>
    Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121</cve>
	<bugzilla href="https://bugzilla.suse.com/1117626">SUSE bug 1117626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595376" comment="nodejs6-6.16.0-11.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12122</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
    <description>
    Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Slowloris HTTP Denial of Service: An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122</cve>
	<bugzilla href="https://bugzilla.suse.com/1117627">SUSE bug 1117627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595376" comment="nodejs6-6.16.0-11.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12123</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12123" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0089-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
    <description>
    Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case "javascript:" (e.g. "javAscript:") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123</cve>
	<bugzilla href="https://bugzilla.suse.com/1117629">SUSE bug 1117629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595376" comment="nodejs6-6.16.0-11.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135524">SUSE bug 1135524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149729">SUSE bug 1149729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551106" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551107" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551108" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551109" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551110" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551111" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551112" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551113" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551114" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551115" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551116" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551117" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551118" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551119" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551120" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551121" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551122" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551123" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551124" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551081" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551082" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551083" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551084" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551086" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536858" comment="qemu-ppc-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551088" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594887" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594888" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594889" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594890" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594891" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594892" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594893" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594894" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594895" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594896" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594897" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594898" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594899" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594900" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594901" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594902" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594903" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594904" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594905" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594852" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594853" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594854" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594855" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594856" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594857" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551106" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551107" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551108" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551109" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551110" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551111" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551112" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551113" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551114" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551115" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551116" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551117" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551118" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551119" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551120" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551121" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551122" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551123" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551124" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551081" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551082" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551083" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551084" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551086" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536858" comment="qemu-ppc-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551088" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594887" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594888" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594889" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594890" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594891" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594892" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594893" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594894" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594895" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594896" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594897" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594898" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594899" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594900" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594901" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594902" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594903" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594904" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594905" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594852" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594853" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594854" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594855" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594856" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594857" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551106" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551107" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551108" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551109" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551110" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551111" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551112" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551113" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551114" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551115" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551116" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551117" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551118" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551119" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551120" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551121" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551122" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551123" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551124" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551081" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551082" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551083" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551084" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551086" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536858" comment="qemu-ppc-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551088" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594887" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594888" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594889" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594890" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594891" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594892" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594893" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594894" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594895" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594896" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594897" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594898" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594899" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594900" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594901" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594902" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594903" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594904" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594905" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594852" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594853" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594854" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594855" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594856" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594857" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="TID000019411" ref_url="https://www.suse.com/support/kb/doc/?id=000019411" source="SUSE-SU"/>
		<reference ref_id="TID7023735" ref_url="https://www.suse.com/support/kb/doc/?id=7023735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html" source="SUSE-SU"/>
    <description>
    Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155812">SUSE bug 1155812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155817">SUSE bug 1155817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12232</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12232" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
    <description>
    In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097593">SUSE bug 1097593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125907">SUSE bug 1125907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127757">SUSE bug 1127757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12327" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3342-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00069.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107887">SUSE bug 1107887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111552">SUSE bug 1111552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111853">SUSE bug 1111853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155513">SUSE bug 1155513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520262" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520263" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548351" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548352" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594619" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594620" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12368" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
    <description>
    Windows 10 does not warn users before opening executable files with the SettingContent-ms extension even when they have been downloaded from the internet and have the "Mark of the Web." Without the warning, unsuspecting users unfamiliar with this new file type might run an unwanted executable. This also allows a WebExtension with the limited downloads.open permission to execute arbitrary code without user interaction on Windows 10 systems. *Note: this issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12376" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12377" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12378" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2674-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12379" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
    <description>
    When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12381" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
    <description>
    Manually dragging and dropping an Outlook email message into the browser will trigger a page navigation when the message's mail columns are incorrectly interpreted as a URL. *Note: this issue only affects Windows operating systems with Outlook installed. Other operating systems are not affected.*. This vulnerability affects Firefox ESR &lt; 60.2 and Firefox &lt; 62.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12383" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2.1, and Thunderbird &lt; 60.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<bugzilla href="https://bugzilla.suse.com/1107343">SUSE bug 1107343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00030.html" source="SUSE-SU"/>
    <description>
    When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12385" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird &lt; 60.2.1, Firefox ESR &lt; 60.2.1, and Firefox &lt; 62.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<bugzilla href="https://bugzilla.suse.com/1109363">SUSE bug 1109363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12386" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00002.html" source="SUSE-SU"/>
    <description>
    A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386</cve>
	<bugzilla href="https://bugzilla.suse.com/1110506">SUSE bug 1110506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12387" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00002.html" source="SUSE-SU"/>
    <description>
    A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387</cve>
	<bugzilla href="https://bugzilla.suse.com/1110507">SUSE bug 1110507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520319" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520320" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530323" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520321" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530324" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520322" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520323" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530325" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530326" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520324" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520325" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530327" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530328" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520326" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520327" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520328" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520329" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520330" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520331" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520332" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520333" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520334" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545896" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545897" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545898" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545899" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548361" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545900" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545902" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545904" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545906" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545908" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545911" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545913" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545916" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545918" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594643" comment="MozillaFirefox-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594644" comment="MozillaFirefox-branding-SLE-60-32.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594645" comment="MozillaFirefox-devel-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594646" comment="MozillaFirefox-translations-common-60.2.2esr-109.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594647" comment="apache2-mod_nss-1.0.14-19.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594648" comment="libfreebl3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545901" comment="libfreebl3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594649" comment="libfreebl3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545903" comment="libfreebl3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594650" comment="libsoftokn3-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545905" comment="libsoftokn3-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594651" comment="libsoftokn3-hmac-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545907" comment="libsoftokn3-hmac-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594652" comment="mozilla-nspr-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545909" comment="mozilla-nspr-32bit-4.19-19.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594653" comment="mozilla-nss-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545912" comment="mozilla-nss-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594654" comment="mozilla-nss-certs-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545914" comment="mozilla-nss-certs-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594655" comment="mozilla-nss-sysinit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545917" comment="mozilla-nss-sysinit-32bit-3.36.4-58.15.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594656" comment="mozilla-nss-tools-3.36.4-58.15.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.3 and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530329" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545922" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545923" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545924" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594657" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594658" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594659" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530329" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545922" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545923" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545924" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594657" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594658" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594659" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530329" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545922" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545923" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545924" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594657" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594658" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594659" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530329" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545922" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545923" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545924" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594657" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594658" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594659" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
    <description>
    By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530329" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545922" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545923" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545924" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594657" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594658" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594659" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
    <description>
    A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530329" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545922" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545923" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545924" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594657" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594658" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594659" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3749-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005382.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html" source="SUSE-SU"/>
    <description>
    A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<bugzilla href="https://bugzilla.suse.com/1112852">SUSE bug 1112852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520350" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530329" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520351" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545922" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545923" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545924" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594657" comment="MozillaFirefox-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594658" comment="MozillaFirefox-devel-60.3.0-109.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594659" comment="MozillaFirefox-translations-common-60.3.0-109.50.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4117-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0183-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html" source="SUSE-SU"/>
    <description>
    A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12470" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12470" ref_url="https://www.suse.com/security/cve/CVE-2018-12470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2898-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004614.html" source="SUSE-SU"/>
    <description>
    A SQL Injection in the RegistrationSharing module of SUSE Linux SMT allows remote attackers to cause execute arbitrary SQL statements. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12470/">CVE-2018-12470</cve>
	<bugzilla href="https://bugzilla.suse.com/1103810">SUSE bug 1103810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530263" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530264" comment="smt-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530265" comment="smt-support-3.0.37-52.23.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548301" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548302" comment="smt-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548303" comment="smt-support-3.0.37-52.23.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594582" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594583" comment="smt-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594584" comment="smt-support-3.0.37-52.23.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12471" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12471" ref_url="https://www.suse.com/security/cve/CVE-2018-12471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2898-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004614.html" source="SUSE-SU"/>
    <description>
    A External Entity Reference ('XXE') vulnerability in SUSE Linux SMT allows remote attackers to read data from the server or cause DoS by referencing blocking elements. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12471/">CVE-2018-12471</cve>
	<bugzilla href="https://bugzilla.suse.com/1103809">SUSE bug 1103809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530263" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530264" comment="smt-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530265" comment="smt-support-3.0.37-52.23.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548301" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548302" comment="smt-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548303" comment="smt-support-3.0.37-52.23.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594582" comment="res-signingkeys-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594583" comment="smt-3.0.37-52.23.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594584" comment="smt-support-3.0.37-52.23.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12472" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12472" ref_url="https://www.suse.com/security/cve/CVE-2018-12472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2898-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3467-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005406.html" source="SUSE-SU"/>
    <description>
    A improper authentication using the HOST header in SUSE Linux SMT allows remote attackers to spoof a sibling server. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12472/">CVE-2018-12472</cve>
	<bugzilla href="https://bugzilla.suse.com/1104076">SUSE bug 1104076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530314" comment="res-signingkeys-3.0.38-52.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530315" comment="smt-3.0.38-52.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530316" comment="smt-support-3.0.38-52.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548358" comment="res-signingkeys-3.0.38-52.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548359" comment="smt-3.0.38-52.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548360" comment="smt-support-3.0.38-52.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594629" comment="res-signingkeys-3.0.38-52.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594630" comment="smt-3.0.38-52.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594631" comment="smt-support-3.0.38-52.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12474</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12474" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12474" ref_url="https://www.suse.com/security/cve/CVE-2018-12474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0329-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00024.html" source="SUSE-SU"/>
    <description>
    Improper input validation in obs-service-tar_scm of Open Build Service allows remote attackers to cause access and extract information outside the current build or cause the creation of file in attacker controlled locations. Affected releases are openSUSE Open Build Service: versions prior to 51a17c553b6ae2598820b7a90fd0c11502a49106.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12474/">CVE-2018-12474</cve>
	<bugzilla href="https://bugzilla.suse.com/1107507">SUSE bug 1107507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596500" comment="caasp-openstack-heat-templates-1.0+git.1540887180.64bfde8-1.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12539" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
    <description>
    In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530240" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530242" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530243" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545756" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541609" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545757" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594557" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594558" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594559" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html" source="SUSE-SU"/>
    <description>
    qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530270" comment="qemu-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530271" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530273" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530274" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530276" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530277" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530280" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550558" comment="qemu-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550559" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550560" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550561" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550562" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550563" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536606" comment="qemu-ppc-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550564" comment="qemu-s390-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550565" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594589" comment="qemu-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594590" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594591" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594592" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550562" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594593" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550564" comment="qemu-s390-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594594" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1279</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1279" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1279" ref_url="https://www.suse.com/security/cve/CVE-2018-1279" source="SUSE CVE"/>
    <description>
    Pivotal RabbitMQ for PCF, all versions, uses a deterministically generated cookie that is shared between all machines when configured in a multi-tenant cluster. A remote attacker who can gain information about the network topology can guess this cookie and, if they have access to the right ports on any server in the MQ cluster can use this cookie to gain full control over the entire cluster.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1279/">CVE-2018-1279</cve>
	<bugzilla href="https://bugzilla.suse.com/1119372">SUSE bug 1119372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334397" comment="rabbitmq-server is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1283" ref_url="https://www.suse.com/security/cve/CVE-2018-1283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00023.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1283/">CVE-2018-1283</cve>
	<bugzilla href="https://bugzilla.suse.com/1086814">SUSE bug 1086814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550965" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550966" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550967" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550968" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550969" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1288</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1288" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1288" ref_url="https://www.suse.com/security/cve/CVE-2018-1288" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004812.html" source="SUSE-SU"/>
    <description>
    In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authenticated Kafka users may perform action reserved for the Broker via a manually created fetch request interfering with data replication, resulting in data loss.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1288/">CVE-2018-1288</cve>
	<bugzilla href="https://bugzilla.suse.com/1102920">SUSE bug 1102920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594490" comment="grafana-4.5.1-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594491" comment="kafka-0.10.2.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594492" comment="logstash-2.4.1-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594493" comment="monasca-installer-20180608_12.47-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images. Only emulated SCSI disks (specified as "sd" in the libxl disk configuration, or an equivalent) are affected. IDE disks ("hd") are not affected (because attempts to make them readonly are rejected). Additionally, CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected; they are always read only. Only systems using qemu-xen (rather than qemu-xen-traditional) as the device model version are vulnerable. Only systems using libxl or libxl-based toolstacks are vulnerable. (This includes xl, and libvirt with the libxl driver.) The vulnerability is present in Xen versions 4.7 and later. (In earlier versions, provided that the patch for XSA-142 has been applied, attempts to create read only disks are rejected.) If the host and guest together usually support PVHVM, the issue is exploitable only if the malicious guest administrator has control of the guest kernel or guest kernel command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<bugzilla href="https://bugzilla.suse.com/1097523">SUSE bug 1097523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12896" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.3. An Integer Overflow in kernel/time/posix-timers.c in the POSIX timer code is caused by the way the overrun accounting works. Depending on interval and expiry time values, the overrun can be larger than INT_MAX, but the accounting is int based. This basically makes the accounting values, which are visible to user space via timer_getoverrun(2) and siginfo::si_overrun, random. For example, a local user can cause a denial of service (signed integer overflow) via crafted mmap, futex, timer_create, and timer_settime system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<bugzilla href="https://bugzilla.suse.com/1099922">SUSE bug 1099922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2204-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2296-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1310-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html" source="SUSE-SU"/>
    <description>
    The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<bugzilla href="https://bugzilla.suse.com/1100097">SUSE bug 1100097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551267" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551268" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551269" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595173" comment="libsoup-2_4-1-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551268" comment="libsoup-2_4-1-32bit-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519875" comment="libsoup-lang-2.62.2-5.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595174" comment="typelib-1_0-Soup-2_4-2.62.2-5.7.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12938" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12938" ref_url="https://www.suse.com/security/cve/CVE-2018-12938" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2017-17833.  Reason: This candidate is a duplicate of CVE-2017-17833.  Notes: All CVE users should reference CVE-2017-17833 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-12938/">CVE-2018-12938</cve>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099519">SUSE bug 1099519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334515" comment="openslp is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1301" ref_url="https://www.suse.com/security/cve/CVE-2018-1301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00023.html" source="SUSE-SU"/>
    <description>
    A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1301/">CVE-2018-1301</cve>
	<bugzilla href="https://bugzilla.suse.com/1086817">SUSE bug 1086817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550965" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550966" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550967" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550968" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550969" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1302" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1302" ref_url="https://www.suse.com/security/cve/CVE-2018-1302" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00023.html" source="SUSE-SU"/>
    <description>
    When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1302/">CVE-2018-1302</cve>
	<bugzilla href="https://bugzilla.suse.com/1086820">SUSE bug 1086820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550965" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550966" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550967" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550968" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550969" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1303" ref_url="https://www.suse.com/security/cve/CVE-2018-1303" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00023.html" source="SUSE-SU"/>
    <description>
    A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1303/">CVE-2018-1303</cve>
	<bugzilla href="https://bugzilla.suse.com/1086813">SUSE bug 1086813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550965" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550966" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550967" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550968" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550969" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1304" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1304" ref_url="https://www.suse.com/security/cve/CVE-2018-1304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0852-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00114.html" source="SUSE-SU"/>
    <description>
    The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1304/">CVE-2018-1304</cve>
	<bugzilla href="https://bugzilla.suse.com/1082480">SUSE bug 1082480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009533263" comment="tomcat-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533264" comment="tomcat-admin-webapps-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533265" comment="tomcat-docs-webapp-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533266" comment="tomcat-el-3_0-api-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533267" comment="tomcat-javadoc-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533268" comment="tomcat-jsp-2_3-api-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533269" comment="tomcat-lib-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533270" comment="tomcat-servlet-3_1-api-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533271" comment="tomcat-webapps-8.0.50-29.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1305" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1305" ref_url="https://www.suse.com/security/cve/CVE-2018-1305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004782.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0852-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00114.html" source="SUSE-SU"/>
    <description>
    Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1305/">CVE-2018-1305</cve>
	<bugzilla href="https://bugzilla.suse.com/1082481">SUSE bug 1082481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009533263" comment="tomcat-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533264" comment="tomcat-admin-webapps-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533265" comment="tomcat-docs-webapp-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533266" comment="tomcat-el-3_0-api-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533267" comment="tomcat-javadoc-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533268" comment="tomcat-jsp-2_3-api-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533269" comment="tomcat-lib-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533270" comment="tomcat-servlet-3_1-api-8.0.50-29.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533271" comment="tomcat-webapps-8.0.50-29.8.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13093" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/xfs_icache.c in the Linux kernel through 4.17.3. There is a NULL pointer dereference and panic in lookup_slow() on a NULL inode-&gt;i_ops pointer when doing pathwalks on a corrupted xfs image. This occurs because of a lack of proper validation that cached inodes are free during allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<bugzilla href="https://bugzilla.suse.com/1100001">SUSE bug 1100001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100000">SUSE bug 1100000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<bugzilla href="https://bugzilla.suse.com/1099999">SUSE bug 1099999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1312" ref_url="https://www.suse.com/security/cve/CVE-2018-1312" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0879-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0901-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1161-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1198-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00023.html" source="SUSE-SU"/>
    <description>
    In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1312/">CVE-2018-1312</cve>
	<bugzilla href="https://bugzilla.suse.com/1086775">SUSE bug 1086775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550965" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550966" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550967" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550968" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550969" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552190" comment="apache2-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536748" comment="apache2-doc-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552191" comment="apache2-example-pages-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552192" comment="apache2-prefork-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552193" comment="apache2-utils-2.4.23-29.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552194" comment="apache2-worker-2.4.23-29.18.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted audio file. The vulnerability can be triggered by the executable sndfile-deinterleave.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009626903" comment="libsndfile1-1.0.25-36.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626901" comment="libsndfile1-32bit-1.0.25-36.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1323" ref_url="https://www.suse.com/security/cve/CVE-2018-1323" source="SUSE CVE"/>
    <description>
    The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via IIS, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing Tomcat via the reverse proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1323/">CVE-2018-1323</cve>
	<bugzilla href="https://bugzilla.suse.com/1085220">SUSE bug 1085220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334100" comment="apache2-mod_jk is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13259" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2741-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2966-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00001.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259</cve>
	<bugzilla href="https://bugzilla.suse.com/1107294">SUSE bug 1107294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194009">SUSE bug 1194009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194012">SUSE bug 1194012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663987" comment="zsh-5.0.5-6.12.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195161">SUSE bug 1195161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13406" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<bugzilla href="https://bugzilla.suse.com/1098016">SUSE bug 1098016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100418">SUSE bug 1100418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00021.html" source="SUSE-SU"/>
    <description>
    In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<bugzilla href="https://bugzilla.suse.com/1100687">SUSE bug 1100687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530340" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545971" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541807" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541816" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594692" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594693" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594694" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594697" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594698" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13796" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13796" ref_url="https://www.suse.com/security/cve/CVE-2018-13796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00046.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13796/">CVE-2018-13796</cve>
	<bugzilla href="https://bugzilla.suse.com/1101288">SUSE bug 1101288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530378" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546036" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594734" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1417" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
    <description>
    Under certain circumstances, a flaw in the J9 JVM (IBM SDK, Java Technology Edition 7.1 and 8.0) allows untrusted code running under a security manager to elevate its privileges. IBM X-Force ID: 138823.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334103" comment="java-1_7_1-ibm is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334104" comment="java-1_8_0-ibm is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14339" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<bugzilla href="https://bugzilla.suse.com/1101810">SUSE bug 1101810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14340" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<bugzilla href="https://bugzilla.suse.com/1101804">SUSE bug 1101804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14341" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<bugzilla href="https://bugzilla.suse.com/1101776">SUSE bug 1101776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14342" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<bugzilla href="https://bugzilla.suse.com/1101777">SUSE bug 1101777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14343" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<bugzilla href="https://bugzilla.suse.com/1101786">SUSE bug 1101786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14344" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ISMP dissector could crash. This was addressed in epan/dissectors/packet-ismp.c by validating the IPX address length to avoid a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<bugzilla href="https://bugzilla.suse.com/1101788">SUSE bug 1101788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14367" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<bugzilla href="https://bugzilla.suse.com/1101791">SUSE bug 1101791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14368" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<bugzilla href="https://bugzilla.suse.com/1101794">SUSE bug 1101794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14369" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<bugzilla href="https://bugzilla.suse.com/1101800">SUSE bug 1101800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14370" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<bugzilla href="https://bugzilla.suse.com/1101802">SUSE bug 1101802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14423" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in lib/openjp3d/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14432</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14432" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14432" ref_url="https://www.suse.com/security/cve/CVE-2018-14432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004566.html" source="SUSE-SU"/>
    <description>
    In the Federation component of OpenStack Keystone before 11.0.4, 12.0.0, and 13.0.0, an authenticated "GET /v3/OS-FEDERATION/projects" request may bypass intended access restrictions on listing projects. An authenticated user may discover projects they have no authority to access, leaking all projects in the deployment and their attributes. Only Keystone with the /v3/OS-FEDERATION endpoint enabled via policy.json is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14432/">CVE-2018-14432</cve>
	<bugzilla href="https://bugzilla.suse.com/1102151">SUSE bug 1102151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594495" comment="openstack-dashboard-10.0.6~dev4-4.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594496" comment="openstack-heat-7.0.7~dev10-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594497" comment="openstack-heat-api-7.0.7~dev10-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594498" comment="openstack-heat-api-cfn-7.0.7~dev10-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594499" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594500" comment="openstack-heat-doc-7.0.7~dev10-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594501" comment="openstack-heat-engine-7.0.7~dev10-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594502" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594503" comment="openstack-heat-test-7.0.7~dev10-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594504" comment="openstack-horizon-plugin-designate-ui-3.0.2~dev1-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594505" comment="openstack-keystone-10.0.3~dev9-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594506" comment="openstack-keystone-doc-10.0.3~dev9-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594507" comment="openstack-nova-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594508" comment="openstack-nova-api-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594509" comment="openstack-nova-cells-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594510" comment="openstack-nova-cert-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594511" comment="openstack-nova-compute-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594512" comment="openstack-nova-conductor-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594513" comment="openstack-nova-console-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594514" comment="openstack-nova-consoleauth-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594515" comment="openstack-nova-doc-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594516" comment="openstack-nova-novncproxy-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594517" comment="openstack-nova-placement-api-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594518" comment="openstack-nova-scheduler-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594519" comment="openstack-nova-serialproxy-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594520" comment="openstack-nova-vncproxy-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594521" comment="python-heat-7.0.7~dev10-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594522" comment="python-horizon-10.0.6~dev4-4.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594523" comment="python-horizon-plugin-designate-ui-3.0.2~dev1-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594524" comment="python-keystone-10.0.3~dev9-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594525" comment="python-nova-14.0.11~dev13-4.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594526" comment="python-os-vif-1.2.1-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3539-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521119" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546274" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594799" comment="wpa_supplicant-2.6-15.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14574</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14574" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14574" ref_url="https://www.suse.com/security/cve/CVE-2018-14574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2375-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2488-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2488-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2809-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00058.html" source="SUSE-SU"/>
    <description>
    django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14574/">CVE-2018-14574</cve>
	<bugzilla href="https://bugzilla.suse.com/1102680">SUSE bug 1102680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334688" comment="python-Django is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14617" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<bugzilla href="https://bugzilla.suse.com/1102870">SUSE bug 1102870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14625" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14625" ref_url="https://www.suse.com/security/cve/CVE-2018-14625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-14625/">CVE-2018-14625</cve>
	<bugzilla href="https://bugzilla.suse.com/1106615">SUSE bug 1106615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<bugzilla href="https://bugzilla.suse.com/1107829">SUSE bug 1107829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107832">SUSE bug 1107832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536629" comment="kgraft-patch-4_4_103-92_53-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536628" comment="kgraft-patch-4_4_103-92_56-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536631" comment="kgraft-patch-4_4_114-92_64-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536630" comment="kgraft-patch-4_4_114-92_67-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536623" comment="kgraft-patch-4_4_120-92_70-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552439" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536622" comment="kgraft-patch-4_4_121-92_73-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536624" comment="kgraft-patch-4_4_121-92_80-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536625" comment="kgraft-patch-4_4_121-92_85-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536621" comment="kgraft-patch-4_4_121-92_92-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552398" comment="kgraft-patch-4_4_121-92_95-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552399" comment="kgraft-patch-4_4_121-92_98-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536626" comment="kgraft-patch-4_4_90-92_45-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536627" comment="kgraft-patch-4_4_90-92_50-default-11-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551409" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551410" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551411" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551413" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536629" comment="kgraft-patch-4_4_103-92_53-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536628" comment="kgraft-patch-4_4_103-92_56-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536631" comment="kgraft-patch-4_4_114-92_64-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536630" comment="kgraft-patch-4_4_114-92_67-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536623" comment="kgraft-patch-4_4_120-92_70-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537370" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537391" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536622" comment="kgraft-patch-4_4_121-92_73-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536624" comment="kgraft-patch-4_4_121-92_80-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536625" comment="kgraft-patch-4_4_121-92_85-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536621" comment="kgraft-patch-4_4_121-92_92-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536642" comment="kgraft-patch-4_4_121-92_95-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536662" comment="kgraft-patch-4_4_121-92_98-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536626" comment="kgraft-patch-4_4_90-92_45-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536627" comment="kgraft-patch-4_4_90-92_50-default-11-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595503" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595504" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595505" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595506" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14645</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14645" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14645" ref_url="https://www.suse.com/security/cve/CVE-2018-14645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004745.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3324-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00050.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14645/">CVE-2018-14645</cve>
	<bugzilla href="https://bugzilla.suse.com/1108683">SUSE bug 1108683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530816" comment="python-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530817" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530818" comment="python-demo-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530821" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530822" comment="python-idle-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530816" comment="python-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530817" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530818" comment="python-demo-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530821" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530822" comment="python-idle-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548896" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548897" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551688" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548898" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548899" comment="python-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548900" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548901" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548902" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548903" comment="python-demo-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548905" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548906" comment="python-idle-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548907" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548908" comment="python-xml-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551689" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551690" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551691" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551692" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595394" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548897" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595786" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595395" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548899" comment="python-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595396" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548901" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595397" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595398" comment="python-demo-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595399" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595400" comment="python-idle-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595401" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595402" comment="python-xml-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595787" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595788" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595789" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595790" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14678" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14678" ref_url="https://www.suse.com/security/cve/CVE-2018-14678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14678/">CVE-2018-14678</cve>
	<bugzilla href="https://bugzilla.suse.com/1102715">SUSE bug 1102715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14679" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519953" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545663" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594480" comment="clamav-0.100.1-33.15.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656968" comment="clamav-0.103.4-33.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14680" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545888" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594624" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14681" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545888" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594624" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14682" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545888" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594624" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14734" ref_url="https://www.suse.com/security/cve/CVE-2018-14734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
    <description>
    drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14734/">CVE-2018-14734</cve>
	<bugzilla href="https://bugzilla.suse.com/1103119">SUSE bug 1103119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131390">SUSE bug 1131390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536891" comment="kgraft-patch-4_4_121-92_85-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536891" comment="kgraft-patch-4_4_121-92_85-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00021.html" source="SUSE-SU"/>
    <description>
    LibVNC before commit 73cb96fec028a576a5a24417b57723b55854ad7b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<bugzilla href="https://bugzilla.suse.com/1120114">SUSE bug 1120114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00021.html" source="SUSE-SU"/>
    <description>
    LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1517" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
    <description>
    A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow an attacker to inflict a denial-of-service attack with specially crafted String data. IBM X-Force ID: 141681.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530240" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530242" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530243" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545756" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541609" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545757" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594557" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594558" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594559" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15378" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00075.html" source="SUSE-SU"/>
    <description>
    A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the "unmew11()" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<bugzilla href="https://bugzilla.suse.com/1110723">SUSE bug 1110723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520273" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545888" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594624" comment="clamav-0.100.2-33.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530305" comment="xen-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530306" comment="xen-doc-html-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530307" comment="xen-libs-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530308" comment="xen-libs-32bit-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530309" comment="xen-tools-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530310" comment="xen-tools-domU-4.7.6_05-43.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15473" ref_url="https://www.suse.com/security/cve/CVE-2018-15473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3776-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004888.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3946-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1383-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HMNIMCAHIBHI4ABCI2JE3E6E2SYDAP2T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F33WEA5KQR7XFYMXJPGRCG4IZX75GFRO/" source="SUSE-SU"/>
    <description>
    OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15473/">CVE-2018-15473</cve>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106163">SUSE bug 1106163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123133">SUSE bug 1123133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520384" comment="openssh-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520385" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530337" comment="openssh-fips-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520386" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550663" comment="openssh-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550664" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550665" comment="openssh-fips-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550666" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594676" comment="openssh-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594677" comment="openssh-askpass-gnome-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594678" comment="openssh-fips-7.2p2-74.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594679" comment="openssh-helpers-7.2p2-74.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15518" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15518" ref_url="https://www.suse.com/security/cve/CVE-2018-15518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption during parsing of a specially crafted illegal XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15518/">CVE-2018-15518</cve>
	<bugzilla href="https://bugzilla.suse.com/1118595">SUSE bug 1118595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530349" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530350" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530351" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530352" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530353" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530354" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530355" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530356" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530357" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530358" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530359" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530360" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530361" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530362" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530363" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550678" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550679" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550680" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550681" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550682" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550683" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550684" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550685" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550686" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550687" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550688" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550689" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550690" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550691" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550692" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594703" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594704" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594705" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594706" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594707" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594708" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594709" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594710" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594711" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594712" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594713" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594714" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594715" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594716" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594717" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15572" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105296">SUSE bug 1105296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15594" ref_url="https://www.suse.com/security/cve/CVE-2018-15594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15594/">CVE-2018-15594</cve>
	<bugzilla href="https://bugzilla.suse.com/1105348">SUSE bug 1105348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00025.html" source="SUSE-SU"/>
    <description>
    A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520352" comment="libsystemd0-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520353" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520354" comment="libudev1-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520355" comment="libudev1-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520356" comment="systemd-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520357" comment="systemd-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520359" comment="systemd-sysvinit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520360" comment="udev-228-150.53.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550609" comment="libsystemd0-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550610" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550611" comment="libudev1-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550612" comment="libudev1-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550613" comment="systemd-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550614" comment="systemd-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550615" comment="systemd-sysvinit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550616" comment="udev-228-150.53.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594660" comment="libsystemd0-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550610" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594661" comment="libudev1-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550612" comment="libudev1-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594662" comment="systemd-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550614" comment="systemd-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594663" comment="systemd-sysvinit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594664" comment="udev-228-150.53.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004941.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3695-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00025.html" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113669">SUSE bug 1113669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520352" comment="libsystemd0-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520353" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520354" comment="libudev1-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520355" comment="libudev1-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520356" comment="systemd-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520357" comment="systemd-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520359" comment="systemd-sysvinit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520360" comment="udev-228-150.53.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550609" comment="libsystemd0-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550610" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550611" comment="libudev1-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550612" comment="libudev1-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550613" comment="systemd-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550614" comment="systemd-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550615" comment="systemd-sysvinit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550616" comment="udev-228-150.53.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594660" comment="libsystemd0-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550610" comment="libsystemd0-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594661" comment="libudev1-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550612" comment="libudev1-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594662" comment="systemd-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550614" comment="systemd-32bit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520358" comment="systemd-bash-completion-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594663" comment="systemd-sysvinit-228-150.53.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594664" comment="udev-228-150.53.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15727</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15727" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15727" ref_url="https://www.suse.com/security/cve/CVE-2018-15727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006815.html" source="SUSE-SU"/>
    <description>
    Grafana 2.x, 3.x, and 4.x before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-15727/">CVE-2018-15727</cve>
	<bugzilla href="https://bugzilla.suse.com/1106515">SUSE bug 1106515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595186" comment="crowbar-core-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595187" comment="crowbar-core-branding-upstream-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595188" comment="crowbar-openstack-4.0+git.1569429513.e7016b2b6-9.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595189" comment="grafana-4.6.5-1.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595190" comment="novnc-1.0.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595191" comment="openstack-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595192" comment="openstack-keystone-doc-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595193" comment="openstack-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595194" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595195" comment="openstack-neutron-doc-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595196" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595197" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595198" comment="openstack-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595199" comment="openstack-neutron-lbaas-agent-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595200" comment="openstack-neutron-lbaas-doc-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595201" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595202" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595203" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595204" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595205" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595206" comment="openstack-neutron-server-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595207" comment="openstack-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595208" comment="openstack-nova-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595209" comment="openstack-nova-cells-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595210" comment="openstack-nova-cert-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595211" comment="openstack-nova-compute-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595212" comment="openstack-nova-conductor-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595213" comment="openstack-nova-console-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595214" comment="openstack-nova-consoleauth-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595215" comment="openstack-nova-doc-14.0.11~dev13-4.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595216" comment="openstack-nova-novncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595217" comment="openstack-nova-placement-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595218" comment="openstack-nova-scheduler-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595219" comment="openstack-nova-serialproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595220" comment="openstack-nova-vncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595221" comment="openstack-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595222" comment="openstack-tempest-test-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595223" comment="python-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595224" comment="python-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595225" comment="python-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595226" comment="python-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595227" comment="python-pysaml2-4.0.2-3.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595228" comment="python-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595229" comment="python-urllib3-1.16-3.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595230" comment="ruby2.1-rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595231" comment="ruby2.1-rubygem-easy_diff-1.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595232" comment="rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595233" comment="sleshammer-aarch64-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595234" comment="sleshammer-ppc64le-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595235" comment="sleshammer-s390x-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595236" comment="sleshammer-x86_64-0.7.0-0.18.12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530365" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530366" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530368" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530369" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530371" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530372" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530375" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550693" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550694" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550695" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550696" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550698" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536732" comment="qemu-ppc-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550700" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594728" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594729" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594730" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594731" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594732" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594733" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<bugzilla href="https://bugzilla.suse.com/1105464">SUSE bug 1105464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106195">SUSE bug 1106195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16056" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth Attribute Protocol dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by verifying that a dissector for a specific UUID exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16058" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth AVDTP dissector could crash. This was addressed in epan/dissectors/packet-btavdtp.c by properly initializing a data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<bugzilla href="https://bugzilla.suse.com/1106514">SUSE bug 1106514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520113" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520114" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520115" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520116" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520117" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520118" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545810" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545811" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545812" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545813" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545814" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545815" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594576" comment="libwireshark9-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594577" comment="libwiretap7-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594578" comment="libwscodecs1-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594579" comment="libwsutil8-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594580" comment="wireshark-2.4.9-48.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594581" comment="wireshark-gtk-2.4.9-48.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16151" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552195" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548852" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548853" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548854" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548855" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595296" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595297" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595298" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595299" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16152" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and CVE-2014-1568.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552195" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548852" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548853" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548854" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548855" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595296" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595297" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595298" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595299" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16276" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276</cve>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115593">SUSE bug 1115593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16301" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14191-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2348-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7F42RBJPTM53DGGULUXWD56J42LIIEII/" source="SUSE-SU"/>
    <description>
    The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<bugzilla href="https://bugzilla.suse.com/1153098">SUSE bug 1153098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668119" comment="tcpdump-4.9.2-14.20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548763" comment="libpcap1-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548764" comment="tcpdump-4.9.2-14.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595184" comment="libpcap1-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595185" comment="tcpdump-4.9.2-14.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16375" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375</cve>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16376" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16395" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395</cve>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16396" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396</cve>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16412" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16413" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the MagickCore/quantum-private.h PushShortPixel function when called from the coders/psd.c ParseImageResourceBlocks function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<bugzilla href="https://bugzilla.suse.com/1106989">SUSE bug 1106989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106996">SUSE bug 1106996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00005.html" source="SUSE-SU"/>
    <description>
    In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551161" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551162" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551163" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551164" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551165" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551166" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551167" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551168" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551169" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551170" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551171" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594991" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594992" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551163" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594993" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551165" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594994" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551167" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594995" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551169" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594996" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551171" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3966-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183966-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00005.html" source="SUSE-SU"/>
    <description>
    GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551161" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551162" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551163" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551164" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551165" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551166" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551167" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551168" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551169" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551170" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551171" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594991" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594992" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551163" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594993" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551165" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594994" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551167" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594995" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551169" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594996" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551171" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16435" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<bugzilla href="https://bugzilla.suse.com/1108813">SUSE bug 1108813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16468</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16468" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3951-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00026.html" source="SUSE-SU"/>
    <description>
    In the Loofah gem for Ruby, through v2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468</cve>
	<bugzilla href="https://bugzilla.suse.com/1113969">SUSE bug 1113969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595375" comment="ruby2.1-rubygem-loofah-2.0.2-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16470</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16470" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16470" ref_url="https://www.suse.com/security/cve/CVE-2018-16470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0185-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00026.html" source="SUSE-SU"/>
    <description>
    There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16470/">CVE-2018-16470</cve>
	<bugzilla href="https://bugzilla.suse.com/1114831">SUSE bug 1114831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334389" comment="rubygem-rack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16471</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16471" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16471" ref_url="https://www.suse.com/security/cve/CVE-2018-16471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006468.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" source="SUSE-SU"/>
    <description>
    There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16471/">CVE-2018-16471</cve>
	<bugzilla href="https://bugzilla.suse.com/1114828">SUSE bug 1114828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116600">SUSE bug 1116600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122178">SUSE bug 1122178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594919" comment="ruby2.1-rubygem-rack-1.6.11-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16476</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16476" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16476" ref_url="https://www.suse.com/security/cve/CVE-2018-16476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00013.html" source="SUSE-SU"/>
    <description>
    A Broken Access Control vulnerability in Active Job versions &gt;= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. This vulnerability has been fixed in versions 4.2.11, 5.0.7.1, 5.1.6.1, and 5.2.1.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16476/">CVE-2018-16476</cve>
	<bugzilla href="https://bugzilla.suse.com/1117632">SUSE bug 1117632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129268">SUSE bug 1129268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594958" comment="ruby2.1-rubygem-activejob-4_2-4.2.9-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118318">SUSE bug 1118318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16510" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<bugzilla href="https://bugzilla.suse.com/1107411">SUSE bug 1107411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in "ztype" could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<bugzilla href="https://bugzilla.suse.com/1107426">SUSE bug 1107426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16513" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<bugzilla href="https://bugzilla.suse.com/1107412">SUSE bug 1107412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<bugzilla href="https://bugzilla.suse.com/1107420">SUSE bug 1107420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<bugzilla href="https://bugzilla.suse.com/1107421">SUSE bug 1107421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<bugzilla href="https://bugzilla.suse.com/1107413">SUSE bug 1107413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16543" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript before 9.24, gssetresolution and gsgetresolution allow attackers to have an unspecified impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1656" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
    <description>
    The IBM Java Runtime Environment's Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530240" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530242" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530243" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545756" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541609" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545757" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594557" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594558" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594559" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16585" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in Artifex Ghostscript before 9.24. The .setdistillerkeys PostScript command is accepted even though it is not intended for use during document processing (e.g., after the startup phase). This leads to memory corruption, allowing remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact. Note: A reputable source believes that the CVE is potentially a duplicate of CVE-2018-15910 as explained in Red Hat bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=1626193).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16597" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16597" ref_url="https://www.suse.com/security/cve/CVE-2018-16597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16597/">CVE-2018-16597</cve>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16644" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2742-2" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<bugzilla href="https://bugzilla.suse.com/1107609">SUSE bug 1107609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107612">SUSE bug 1107612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117463">SUSE bug 1117463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<bugzilla href="https://bugzilla.suse.com/1092903">SUSE bug 1092903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107689">SUSE bug 1107689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction. This is due to an incomplete fix for CVE-2018-16509.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<bugzilla href="https://bugzilla.suse.com/1107410">SUSE bug 1107410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520124" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520125" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545816" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545817" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594595" comment="ghostscript-9.25-23.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594596" comment="ghostscript-x11-9.25-23.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3706-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00012.html" source="SUSE-SU"/>
    <description>
    Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113029">SUSE bug 1113029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521781" comment="curl-7.37.0-37.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521782" comment="libcurl4-7.37.0-37.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521783" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546716" comment="curl-7.37.0-37.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546717" comment="libcurl4-7.37.0-37.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546718" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595530" comment="curl-7.37.0-37.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595531" comment="libcurl4-7.37.0-37.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546718" comment="libcurl4-32bit-7.37.0-37.37.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16856</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16856" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16856" ref_url="https://www.suse.com/security/cve/CVE-2018-16856" source="SUSE CVE"/>
    <description>
    In a default Red Hat Openstack Platform Director installation, openstack-octavia before versions openstack-octavia 2.0.2-5 and openstack-octavia-3.0.1-0.20181009115732 creates log files that are readable by all users. Sensitive information such as private keys can appear in these log files allowing for information exposure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16856/">CVE-2018-16856</cve>
	<bugzilla href="https://bugzilla.suse.com/1115710">SUSE bug 1115710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334447" comment="openstack-octavia is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16859</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16859" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16859" ref_url="https://www.suse.com/security/cve/CVE-2018-16859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html" source="SUSE-SU"/>
    <description>
    Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16859/">CVE-2018-16859</cve>
	<bugzilla href="https://bugzilla.suse.com/1109957">SUSE bug 1109957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116587">SUSE bug 1116587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16862" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<bugzilla href="https://bugzilla.suse.com/1117186">SUSE bug 1117186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SYSTEM-DOWN-BLOG" ref_url="https://www.suse.com/c/stack-clashing-systemd-aka-system-down/" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00043.html" source="SUSE-SU"/>
    <description>
    An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551098" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551099" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551100" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551101" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551102" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551103" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551104" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551105" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594869" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551099" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594870" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551101" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594871" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551103" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594872" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594873" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SYSTEM-DOWN-BLOG" ref_url="https://www.suse.com/c/stack-clashing-systemd-aka-system-down/" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00043.html" source="SUSE-SU"/>
    <description>
    An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551098" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551099" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551100" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551101" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551102" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551103" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551104" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551105" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594869" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551099" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594870" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551101" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594871" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551103" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594872" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594873" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16866" ref_url="https://www.suse.com/security/cve/CVE-2018-16866" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00043.html" source="SUSE-SU"/>
    <description>
    An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16866/">CVE-2018-16866</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126183">SUSE bug 1126183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521202" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521203" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521204" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521205" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521206" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521207" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521209" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521210" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551098" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551099" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551100" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551101" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551102" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551103" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551104" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551105" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594869" comment="libsystemd0-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551099" comment="libsystemd0-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594870" comment="libudev1-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551101" comment="libudev1-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594871" comment="systemd-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551103" comment="systemd-32bit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521208" comment="systemd-bash-completion-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594872" comment="systemd-sysvinit-228-150.58.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594873" comment="udev-228-150.58.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16871</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871</cve>
	<bugzilla href="https://bugzilla.suse.com/1137103">SUSE bug 1137103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156320">SUSE bug 1156320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119494">SUSE bug 1119494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530823" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530824" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530826" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530827" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530829" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530830" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530833" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551351" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551352" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551353" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551354" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551356" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537310" comment="qemu-ppc-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551358" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595404" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595405" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595406" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595407" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595408" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595409" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16876</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16876" ref_url="https://www.suse.com/security/cve/CVE-2018-16876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0238-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html" source="SUSE-SU"/>
    <description>
    ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16876/">CVE-2018-16876</cve>
	<bugzilla href="https://bugzilla.suse.com/1109957">SUSE bug 1109957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118896">SUSE bug 1118896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16880</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16880" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16880" ref_url="https://www.suse.com/security/cve/CVE-2018-16880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16880/">CVE-2018-16880</cve>
	<bugzilla href="https://bugzilla.suse.com/1122767">SUSE bug 1122767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16881" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16881" ref_url="https://www.suse.com/security/cve/CVE-2018-16881" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0209-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190209-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0154-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00011.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16881/">CVE-2018-16881</cve>
	<bugzilla href="https://bugzilla.suse.com/1123164">SUSE bug 1123164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333979" comment="rsyslog is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16882" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16882" ref_url="https://www.suse.com/security/cve/CVE-2018-16882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions before 4.14.91 and before 4.19.13 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16882/">CVE-2018-16882</cve>
	<bugzilla href="https://bugzilla.suse.com/1119934">SUSE bug 1119934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<bugzilla href="https://bugzilla.suse.com/1119946">SUSE bug 1119946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119947">SUSE bug 1119947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537270" comment="kgraft-patch-4_4_114-92_64-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537271" comment="kgraft-patch-4_4_114-92_67-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537267" comment="kgraft-patch-4_4_120-92_70-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537268" comment="kgraft-patch-4_4_121-92_73-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537265" comment="kgraft-patch-4_4_121-92_80-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537266" comment="kgraft-patch-4_4_121-92_85-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537269" comment="kgraft-patch-4_4_121-92_92-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552436" comment="kgraft-patch-4_4_121-92_95-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552435" comment="kgraft-patch-4_4_121-92_98-default-3-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537270" comment="kgraft-patch-4_4_114-92_64-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537271" comment="kgraft-patch-4_4_114-92_67-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537267" comment="kgraft-patch-4_4_120-92_70-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537268" comment="kgraft-patch-4_4_121-92_73-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537265" comment="kgraft-patch-4_4_121-92_80-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537266" comment="kgraft-patch-4_4_121-92_85-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537269" comment="kgraft-patch-4_4_121-92_92-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537273" comment="kgraft-patch-4_4_121-92_95-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537272" comment="kgraft-patch-4_4_121-92_98-default-3-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00023.html" source="SUSE-SU"/>
    <description>
    libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546549" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546550" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546551" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595171" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595172" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546551" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16984</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16984" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16984" ref_url="https://www.suse.com/security/cve/CVE-2018-16984" source="SUSE CVE"/>
    <description>
    An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16984/">CVE-2018-16984</cve>
	<bugzilla href="https://bugzilla.suse.com/1109621">SUSE bug 1109621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334688" comment="python-Django is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17182" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3032-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<bugzilla href="https://bugzilla.suse.com/1108399">SUSE bug 1108399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110233">SUSE bug 1110233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536629" comment="kgraft-patch-4_4_103-92_53-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536628" comment="kgraft-patch-4_4_103-92_56-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536631" comment="kgraft-patch-4_4_114-92_64-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536630" comment="kgraft-patch-4_4_114-92_67-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536623" comment="kgraft-patch-4_4_120-92_70-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536622" comment="kgraft-patch-4_4_121-92_73-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536624" comment="kgraft-patch-4_4_121-92_80-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536625" comment="kgraft-patch-4_4_121-92_85-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536621" comment="kgraft-patch-4_4_121-92_92-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536626" comment="kgraft-patch-4_4_90-92_45-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536627" comment="kgraft-patch-4_4_90-92_50-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536629" comment="kgraft-patch-4_4_103-92_53-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536628" comment="kgraft-patch-4_4_103-92_56-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536631" comment="kgraft-patch-4_4_114-92_64-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536630" comment="kgraft-patch-4_4_114-92_67-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536623" comment="kgraft-patch-4_4_120-92_70-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536622" comment="kgraft-patch-4_4_121-92_73-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536624" comment="kgraft-patch-4_4_121-92_80-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536625" comment="kgraft-patch-4_4_121-92_85-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536621" comment="kgraft-patch-4_4_121-92_92-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536626" comment="kgraft-patch-4_4_90-92_45-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536627" comment="kgraft-patch-4_4_90-92_50-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2975-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3036-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545983" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545984" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545985" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594699" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594700" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594701" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17245</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17245" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17245" ref_url="https://www.suse.com/security/cve/CVE-2018-17245" source="SUSE CVE"/>
    <description>
    Kibana versions 4.0 to 4.6, 5.0 to 5.6.12, and 6.0 to 6.4.2 contain an error in the way authorization credentials are used when generating PDF reports. If a report requests external resources plaintext credentials are included in the HTTP request that could be recovered by an external resource provider.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17245/">CVE-2018-17245</cve>
	<bugzilla href="https://bugzilla.suse.com/1115060">SUSE bug 1115060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17246</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17246" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17246" ref_url="https://www.suse.com/security/cve/CVE-2018-17246" source="SUSE CVE"/>
    <description>
    Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17246/">CVE-2018-17246</cve>
	<bugzilla href="https://bugzilla.suse.com/1115069">SUSE bug 1115069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in _bfd_stab_section_find_nearest_line in syms.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<bugzilla href="https://bugzilla.suse.com/1109412">SUSE bug 1109412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory access exists in bfd_zalloc in opncls.c. Attackers could leverage this vulnerability to cause a denial of service (application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<bugzilla href="https://bugzilla.suse.com/1109413">SUSE bug 1109413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. a heap-based buffer over-read in bfd_getl32 in libbfd.c allows an attacker to cause a denial of service through a crafted PE file. This vulnerability can be triggered by the executable objdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<bugzilla href="https://bugzilla.suse.com/1109414">SUSE bug 1109414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17407" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3033-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3213-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407</cve>
	<bugzilla href="https://bugzilla.suse.com/1109673">SUSE bug 1109673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125938">SUSE bug 1125938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520140" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546621" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595388" comment="libkpathsea6-6.2.0dev-22.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4088-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<bugzilla href="https://bugzilla.suse.com/1110949">SUSE bug 1110949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530347" comment="git-core-2.12.3-27.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530348" comment="git-doc-2.12.3-27.17.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545986" comment="git-core-2.12.3-27.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530348" comment="git-doc-2.12.3-27.17.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594702" comment="git-core-2.12.3-27.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530348" comment="git-doc-2.12.3-27.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17466" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<bugzilla href="https://bugzilla.suse.com/1107874">SUSE bug 1107874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109845">SUSE bug 1109845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552195" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548852" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548853" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548854" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548855" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595296" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595297" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595298" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595299" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17572</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17572" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17572" ref_url="https://www.suse.com/security/cve/CVE-2018-17572" source="SUSE CVE"/>
    <description>
    InfluxDB 0.9.5 has Reflected XSS in the Write Data module.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-17572/">CVE-2018-17572</cve>
	<bugzilla href="https://bugzilla.suse.com/1166190">SUSE bug 1166190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339406" comment="influxdb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17795" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00056.html" source="SUSE-SU"/>
    <description>
    The function t2p_write_pdf in tiff2pdf.c in LibTIFF 4.0.9 and earlier allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, a similar issue to CVE-2017-9935.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<bugzilla href="https://bugzilla.suse.com/1046077">SUSE bug 1046077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110358">SUSE bug 1110358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17954</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17954" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17954" ref_url="https://www.suse.com/security/cve/CVE-2018-17954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
    <description>
    A Least Privilege Violation vulnerability in crowbar of SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud 9, SUSE OpenStack Cloud Crowbar 8, SUSE OpenStack Cloud Crowbar 9 allows root users on any crowbar managed node to cause become root on any other node. This issue affects: SUSE OpenStack Cloud 7 crowbar-core versions prior to 4.0+git.1578392992.fabfd186c-9.63.1, crowbar-. SUSE OpenStack Cloud 8 ardana-cinder versions prior to 8.0+git.1579279939.ee7da88-3.39.3, ardana-. SUSE OpenStack Cloud 9 ardana-ansible versions prior to 9.0+git.1581611758.f694f7d-3.16.1, ardana-. SUSE OpenStack Cloud Crowbar 8 crowbar-core versions prior to 5.0+git.1582968668.1a55c77c5-3.35.4, crowbar-. SUSE OpenStack Cloud Crowbar 9 crowbar-core versions prior to 6.0+git.1582892022.cbd70e833-3.19.3, crowbar-.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17954/">CVE-2018-17954</cve>
	<bugzilla href="https://bugzilla.suse.com/1117080">SUSE bug 1117080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595986" comment="openstack-neutron-fwaas-9.0.2~dev5-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595987" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595988" comment="python-neutron-fwaas-9.0.2~dev5-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530365" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530366" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530368" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530369" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530371" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530372" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530375" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550693" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550694" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550695" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550696" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550698" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536732" comment="qemu-ppc-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550700" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594728" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594729" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594730" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594731" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594732" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594733" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545983" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545984" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545985" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594699" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594700" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594701" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17962" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530365" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530366" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530368" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530369" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530371" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530372" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530375" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550693" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550694" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550695" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550696" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550698" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536732" comment="qemu-ppc-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550700" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594728" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594729" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594730" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594731" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594732" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594733" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17963" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530365" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530366" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530368" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530369" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530371" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530372" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530375" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530305" comment="xen-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530306" comment="xen-doc-html-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530307" comment="xen-libs-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530308" comment="xen-libs-32bit-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530309" comment="xen-tools-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530310" comment="xen-tools-domU-4.7.6_05-43.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550693" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550694" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550695" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550696" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550698" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536732" comment="qemu-ppc-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550700" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530305" comment="xen-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530306" comment="xen-doc-html-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530307" comment="xen-libs-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530308" comment="xen-libs-32bit-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530309" comment="xen-tools-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530310" comment="xen-tools-domU-4.7.6_05-43.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594728" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594729" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594730" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594731" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594732" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594733" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530305" comment="xen-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530306" comment="xen-doc-html-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530307" comment="xen-libs-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530308" comment="xen-libs-32bit-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530309" comment="xen-tools-4.7.6_05-43.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530310" comment="xen-tools-domU-4.7.6_05-43.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17972" ref_url="https://www.suse.com/security/cve/CVE-2018-17972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17972/">CVE-2018-17972</cve>
	<bugzilla href="https://bugzilla.suse.com/1110785">SUSE bug 1110785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. There is a stack consumption problem caused by the cplus_demangle_type function making recursive calls to itself in certain scenarios involving many 'P' characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<bugzilla href="https://bugzilla.suse.com/1116827">SUSE bug 1116827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18021</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18021" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18021" ref_url="https://www.suse.com/security/cve/CVE-2018-18021" source="SUSE CVE"/>
    <description>
    arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a denial of service (hypervisor panic) via an illegal exception return. This occurs because of insufficient restrictions on userspace access to the core register file, and because PSTATE.M validation does not prevent unintended execution modes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18021/">CVE-2018-18021</cve>
	<bugzilla href="https://bugzilla.suse.com/1110998">SUSE bug 1110998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18065" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3447-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2OQK3YBZP7LLGFOZF2RYGZC5GDDRHRI6/" source="SUSE-SU"/>
    <description>
    _set_key in agent/helpers/table_container.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520274" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520275" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520276" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520277" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520278" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548353" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548354" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548355" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548356" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548357" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594625" comment="libsnmp30-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548354" comment="libsnmp30-32bit-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594626" comment="net-snmp-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594627" comment="perl-SNMP-5.7.3-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594628" comment="snmp-mibs-5.7.3-6.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545983" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545984" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545985" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594699" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594700" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594701" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1754-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595040" comment="python-requests-2.11.1-6.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531063" comment="python3-requests-2.20.1-5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18227" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3590-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0362-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<bugzilla href="https://bugzilla.suse.com/1111647">SUSE bug 1111647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520313" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520314" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520315" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520316" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520317" comment="wireshark-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520318" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545890" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545891" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545892" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545893" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545894" comment="wireshark-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545895" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594637" comment="libwireshark9-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594638" comment="libwiretap7-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594639" comment="libwscodecs1-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594640" comment="libwsutil8-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594641" comment="wireshark-2.4.10-48.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594642" comment="wireshark-gtk-2.4.10-48.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00035.html" source="SUSE-SU"/>
    <description>
    Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<bugzilla href="https://bugzilla.suse.com/1113769">SUSE bug 1113769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144621">SUSE bug 1144621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545983" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545984" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545985" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594699" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594700" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594701" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18309" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<bugzilla href="https://bugzilla.suse.com/1111996">SUSE bug 1111996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00063.html" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522096" comment="perl-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522097" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522098" comment="perl-base-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548721" comment="perl-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548722" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548723" comment="perl-base-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595119" comment="perl-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548722" comment="perl-32bit-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595120" comment="perl-base-5.18.2-12.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522099" comment="perl-doc-5.18.2-12.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18335" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<bugzilla href="https://bugzilla.suse.com/1118529">SUSE bug 1118529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18356" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<bugzilla href="https://bugzilla.suse.com/1118529">SUSE bug 1118529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125396">SUSE bug 1125396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18386" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
    <description>
    drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<bugzilla href="https://bugzilla.suse.com/1094825">SUSE bug 1094825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112039">SUSE bug 1112039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536668" comment="kgraft-patch-4_4_103-92_53-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536669" comment="kgraft-patch-4_4_103-92_56-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536670" comment="kgraft-patch-4_4_90-92_50-default-12-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536668" comment="kgraft-patch-4_4_103-92_53-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536669" comment="kgraft-patch-4_4_103-92_56-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536670" comment="kgraft-patch-4_4_90-92_50-default-12-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18397" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18397" ref_url="https://www.suse.com/security/cve/CVE-2018-18397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
    <description>
    The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18397/">CVE-2018-18397</cve>
	<bugzilla href="https://bugzilla.suse.com/1117656">SUSE bug 1117656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The get_count function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31, allows remote attackers to cause a denial of service (malloc called with the result of an integer-overflowing calculation) or possibly have unspecified other impact via a crafted string, as demonstrated by c++filt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<bugzilla href="https://bugzilla.suse.com/1112535">SUSE bug 1112535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there is a stack consumption problem caused by recursive stack frames: cplus_demangle_type, d_bare_function_type, d_function_type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<bugzilla href="https://bugzilla.suse.com/1112534">SUSE bug 1112534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18492" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18493" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18494" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18498" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4112-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
    <description>
    A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520455" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530364" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520456" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520457" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520458" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520459" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520460" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520461" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520462" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520463" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520464" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520465" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520466" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520467" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520468" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520469" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546018" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546019" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546020" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546021" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546023" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546025" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546028" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546030" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546033" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546035" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594718" comment="MozillaFirefox-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594719" comment="MozillaFirefox-devel-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594720" comment="MozillaFirefox-translations-common-60.4.0esr-109.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594721" comment="libfreebl3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546022" comment="libfreebl3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594722" comment="libsoftokn3-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546024" comment="libsoftokn3-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594723" comment="mozilla-nspr-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546026" comment="mozilla-nspr-32bit-4.20-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594724" comment="mozilla-nss-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546029" comment="mozilla-nss-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594725" comment="mozilla-nss-certs-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546031" comment="mozilla-nss-certs-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594726" comment="mozilla-nss-sysinit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546034" comment="mozilla-nss-sysinit-32bit-3.40.1-58.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594727" comment="mozilla-nss-tools-3.40.1-58.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18500" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.5, Firefox ESR &lt; 60.5, and Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530790" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530791" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530792" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530793" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530794" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546570" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546571" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546572" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546573" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546574" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546575" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546576" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546577" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546578" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546579" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546580" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546581" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546582" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546583" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546584" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546585" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546587" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546588" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546589" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595354" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595355" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595356" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595357" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595358" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546575" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595359" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546577" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595360" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546579" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595361" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546581" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595362" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546583" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595363" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546585" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595364" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546588" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595365" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18501" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.5, Firefox ESR &lt; 60.5, and Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530790" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530791" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530792" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530793" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530794" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546570" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546571" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546572" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546573" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546574" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546575" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546576" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546577" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546578" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546579" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546580" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546581" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546582" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546583" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546584" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546585" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546587" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546588" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546589" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595354" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595355" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595356" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595357" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595358" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546575" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595359" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546577" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595360" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546579" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595361" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546581" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595362" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546583" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595363" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546585" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595364" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546588" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595365" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18505" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0336-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0132-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html" source="SUSE-SU"/>
    <description>
    An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird &lt; 60.5, Firefox ESR &lt; 60.5, and Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521605" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521606" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530790" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521607" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521608" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521609" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530791" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530792" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521610" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521611" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530793" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530794" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521612" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521613" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521614" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521615" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521616" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521617" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521618" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546570" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546571" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546572" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546573" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546574" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546575" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546576" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546577" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546578" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546579" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546580" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546581" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546582" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546583" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546584" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546585" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546587" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546588" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546589" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595354" comment="MozillaFirefox-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595355" comment="MozillaFirefox-branding-SLE-60-32.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595356" comment="MozillaFirefox-devel-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595357" comment="MozillaFirefox-translations-common-60.5.0esr-109.58.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595358" comment="libfreebl3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546575" comment="libfreebl3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595359" comment="libfreebl3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546577" comment="libfreebl3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595360" comment="libsoftokn3-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546579" comment="libsoftokn3-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595361" comment="libsoftokn3-hmac-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546581" comment="libsoftokn3-hmac-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595362" comment="mozilla-nss-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546583" comment="mozilla-nss-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595363" comment="mozilla-nss-certs-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546585" comment="mozilla-nss-certs-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595364" comment="mozilla-nss-sysinit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546588" comment="mozilla-nss-sysinit-32bit-3.41.1-58.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595365" comment="mozilla-nss-tools-3.41.1-58.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox &lt; 65.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<bugzilla href="https://bugzilla.suse.com/1122983">SUSE bug 1122983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986639">SUSE bug 986639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read issue was discovered in the function sec_merge_hash_lookup in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31, because _bfd_add_merge_section mishandles section merges when size is not a multiple of entsize. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<bugzilla href="https://bugzilla.suse.com/1113255">SUSE bug 1113255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the merge_strings function in merge.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in _bfd_add_merge_section when attempting to merge sections with large alignments. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<bugzilla href="https://bugzilla.suse.com/1113252">SUSE bug 1113252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in elf_link_input_bfd in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. There is a NULL pointer dereference in elf_link_input_bfd when used for finding STT_TLS symbols without any TLS section. A specially crafted ELF allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<bugzilla href="https://bugzilla.suse.com/1113247">SUSE bug 1113247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18623</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18623" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18623" ref_url="https://www.suse.com/security/cve/CVE-2018-18623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
    <description>
    Grafana 5.3.1 has XSS via the "Dashboard &gt; Text Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18623/">CVE-2018-18623</cve>
	<bugzilla href="https://bugzilla.suse.com/1172450">SUSE bug 1172450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174583">SUSE bug 1174583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175951">SUSE bug 1175951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18624</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18624" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18624" ref_url="https://www.suse.com/security/cve/CVE-2018-18624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
    <description>
    Grafana 5.3.1 has XSS via a column style on the "Dashboard &gt; Table Panel" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18624/">CVE-2018-18624</cve>
	<bugzilla href="https://bugzilla.suse.com/1172450">SUSE bug 1172450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174583">SUSE bug 1174583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175951">SUSE bug 1175951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18625</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18625" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18625" ref_url="https://www.suse.com/security/cve/CVE-2018-18625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
    <description>
    Grafana 5.3.1 has XSS via a link on the "Dashboard &gt; All Panels &gt; General" screen. NOTE: this issue exists because of an incomplete fix for CVE-2018-12099.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-18625/">CVE-2018-18625</cve>
	<bugzilla href="https://bugzilla.suse.com/1172450">SUSE bug 1172450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174583">SUSE bug 1174583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175951">SUSE bug 1175951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18690" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18690" ref_url="https://www.suse.com/security/cve/CVE-2018-18690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18690/">CVE-2018-18690</cve>
	<bugzilla href="https://bugzilla.suse.com/1105025">SUSE bug 1105025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18710" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<bugzilla href="https://bugzilla.suse.com/1113751">SUSE bug 1113751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18751</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18751" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18751" ref_url="https://www.suse.com/security/cve/CVE-2018-18751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1270-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1385-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18751/">CVE-2018-18751</cve>
	<bugzilla href="https://bugzilla.suse.com/1113719">SUSE bug 1113719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334551" comment="gettext-runtime is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00043.html" source="SUSE-SU"/>
    <description>
    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530365" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530366" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530368" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530369" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530371" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530372" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530375" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550693" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550694" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550695" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550696" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550698" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536732" comment="qemu-ppc-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550700" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594728" comment="qemu-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594729" comment="qemu-block-curl-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530367" comment="qemu-block-rbd-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594730" comment="qemu-block-ssh-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594731" comment="qemu-guest-agent-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530370" comment="qemu-ipxe-1.0.0-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550697" comment="qemu-kvm-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594732" comment="qemu-lang-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550699" comment="qemu-s390-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530373" comment="qemu-seabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530374" comment="qemu-sgabios-8-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594733" comment="qemu-tools-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530376" comment="qemu-vgabios-1.9.1-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530377" comment="qemu-x86-2.6.2-41.46.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1890" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1890" ref_url="https://www.suse.com/security/cve/CVE-2018-1890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0585-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
    <description>
    IBM SDK, Java Technology Edition Version 8 on the AIX platform uses absolute RPATHs which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 152081.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1890/">CVE-2018-1890</cve>
	<bugzilla href="https://bugzilla.suse.com/1128158">SUSE bug 1128158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530870" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530872" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548942" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542124" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595454" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595455" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19039</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19039" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19039" ref_url="https://www.suse.com/security/cve/CVE-2018-19039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary files by leveraging Editor or Admin permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19039/">CVE-2018-19039</cve>
	<bugzilla href="https://bugzilla.suse.com/1115960">SUSE bug 1115960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595186" comment="crowbar-core-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595187" comment="crowbar-core-branding-upstream-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595188" comment="crowbar-openstack-4.0+git.1569429513.e7016b2b6-9.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595189" comment="grafana-4.6.5-1.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595190" comment="novnc-1.0.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595191" comment="openstack-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595192" comment="openstack-keystone-doc-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595193" comment="openstack-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595194" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595195" comment="openstack-neutron-doc-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595196" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595197" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595198" comment="openstack-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595199" comment="openstack-neutron-lbaas-agent-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595200" comment="openstack-neutron-lbaas-doc-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595201" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595202" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595203" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595204" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595205" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595206" comment="openstack-neutron-server-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595207" comment="openstack-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595208" comment="openstack-nova-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595209" comment="openstack-nova-cells-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595210" comment="openstack-nova-cert-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595211" comment="openstack-nova-compute-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595212" comment="openstack-nova-conductor-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595213" comment="openstack-nova-console-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595214" comment="openstack-nova-consoleauth-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595215" comment="openstack-nova-doc-14.0.11~dev13-4.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595216" comment="openstack-nova-novncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595217" comment="openstack-nova-placement-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595218" comment="openstack-nova-scheduler-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595219" comment="openstack-nova-serialproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595220" comment="openstack-nova-vncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595221" comment="openstack-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595222" comment="openstack-tempest-test-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595223" comment="python-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595224" comment="python-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595225" comment="python-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595226" comment="python-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595227" comment="python-pysaml2-4.0.2-3.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595228" comment="python-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595229" comment="python-urllib3-1.16-3.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595230" comment="ruby2.1-rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595231" comment="ruby2.1-rubygem-easy_diff-1.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595232" comment="rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595233" comment="sleshammer-aarch64-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595234" comment="sleshammer-ppc64le-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595235" comment="sleshammer-s390x-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595236" comment="sleshammer-x86_64-0.7.0-0.18.12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19364" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19364" ref_url="https://www.suse.com/security/cve/CVE-2018-19364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    hw/9pfs/cofile.c and hw/9pfs/9p.c in QEMU can modify an fid path while it is being accessed by a second thread, leading to (for example) a use-after-free outcome.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19364/">CVE-2018-19364</cve>
	<bugzilla href="https://bugzilla.suse.com/1116717">SUSE bug 1116717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116726">SUSE bug 1116726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530823" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530824" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530826" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530827" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530829" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530830" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530833" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551351" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551352" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551353" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551354" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551356" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537310" comment="qemu-ppc-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551358" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595404" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595405" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595406" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595407" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595408" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595409" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19407" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<bugzilla href="https://bugzilla.suse.com/1116841">SUSE bug 1116841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<bugzilla href="https://bugzilla.suse.com/1108027">SUSE bug 1108027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109105">SUSE bug 1109105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111480">SUSE bug 1111480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118455">SUSE bug 1118455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545983" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545984" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545985" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594699" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594700" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594701" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19432" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432</cve>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334503" comment="libsndfile is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009626903" comment="libsndfile1-1.0.25-36.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626901" comment="libsndfile1-32bit-1.0.25-36.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545983" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545984" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545985" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594699" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594700" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594701" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a setcolorspace type confusion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<bugzilla href="https://bugzilla.suse.com/1117313">SUSE bug 1117313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545983" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545984" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545985" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594699" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594700" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594701" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4090-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00038.html" source="SUSE-SU"/>
    <description>
    psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<bugzilla href="https://bugzilla.suse.com/1117274">SUSE bug 1117274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117331">SUSE bug 1117331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520410" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520411" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520412" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545983" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545984" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545985" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594699" comment="ghostscript-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594700" comment="ghostscript-x11-9.26-23.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594701" comment="libspectre1-0.2.7-12.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489</cve>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117279">SUSE bug 1117279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530823" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530824" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530826" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530827" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530829" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530830" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530833" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551351" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551352" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551353" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551354" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551356" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537310" comment="qemu-ppc-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551358" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595404" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595405" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595406" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595407" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595408" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595409" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19591" ref_url="https://www.suse.com/security/cve/CVE-2018-19591" source="SUSE CVE"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19591/">CVE-2018-19591</cve>
	<bugzilla href="https://bugzilla.suse.com/1117603">SUSE bug 1117603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19636" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19636" ref_url="https://www.suse.com/security/cve/CVE-2018-19636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19636/">CVE-2018-19636</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117751">SUSE bug 1117751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19637" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19638" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19639" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html" source="SUSE-SU"/>
    <description>
    If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530432" comment="hostinfo-1.0.1-19.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521131" comment="supportutils-3.0-95.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19665" ref_url="https://www.suse.com/security/cve/CVE-2018-19665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19665/">CVE-2018-19665</cve>
	<bugzilla href="https://bugzilla.suse.com/1117749">SUSE bug 1117749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117756">SUSE bug 1117756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19758" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125575">SUSE bug 1125575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334503" comment="libsndfile is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009626903" comment="libsndfile1-1.0.25-36.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626901" comment="libsndfile1-32bit-1.0.25-36.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0019-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00004.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<bugzilla href="https://bugzilla.suse.com/1118274">SUSE bug 1118274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119056">SUSE bug 1119056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521590" comment="libpolkit0-0.113-5.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521592" comment="polkit-0.113-5.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521593" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546528" comment="libpolkit0-0.113-5.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546529" comment="polkit-0.113-5.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546530" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595028" comment="libpolkit0-0.113-5.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595029" comment="polkit-0.113-5.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595030" comment="typelib-1_0-Polkit-1_0-0.113-5.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19824" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<bugzilla href="https://bugzilla.suse.com/1118152">SUSE bug 1118152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19854" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19854" ref_url="https://www.suse.com/security/cve/CVE-2018-19854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19854/">CVE-2018-19854</cve>
	<bugzilla href="https://bugzilla.suse.com/1118428">SUSE bug 1118428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19869</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19869" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19869" ref_url="https://www.suse.com/security/cve/CVE-2018-19869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. A malformed SVG image causes a segmentation fault in qsvghandler.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19869/">CVE-2018-19869</cve>
	<bugzilla href="https://bugzilla.suse.com/1118599">SUSE bug 1118599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009341598" comment="libqt5-qtsvg is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19870" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19870" ref_url="https://www.suse.com/security/cve/CVE-2018-19870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00080.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. A malformed GIF image causes a NULL pointer dereference in QGifHandler resulting in a segmentation fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19870/">CVE-2018-19870</cve>
	<bugzilla href="https://bugzilla.suse.com/1118597">SUSE bug 1118597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531478" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531479" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531480" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531481" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531482" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531483" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531484" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531485" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531486" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531487" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531488" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531489" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531490" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531491" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531492" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551846" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551847" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551848" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551849" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551850" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551851" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551852" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551853" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551854" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551855" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551856" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551857" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551858" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551859" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551860" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596010" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596011" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596012" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596013" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596014" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596015" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596016" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596017" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596018" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596019" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596020" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596021" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596022" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596023" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596024" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19871</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19871" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19871" ref_url="https://www.suse.com/security/cve/CVE-2018-19871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00002.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. There is QTgaFile Uncontrolled Resource Consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19871/">CVE-2018-19871</cve>
	<bugzilla href="https://bugzilla.suse.com/1118598">SUSE bug 1118598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009341602" comment="libqt5-qtimageformats is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19872" ref_url="https://www.suse.com/security/cve/CVE-2018-19872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1239-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00080.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt 5.11. A malformed PPM image causes a division by zero and a crash in qppmhandler.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19872/">CVE-2018-19872</cve>
	<bugzilla href="https://bugzilla.suse.com/1130246">SUSE bug 1130246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531478" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531479" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531480" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531481" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531482" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531483" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531484" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531485" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531486" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531487" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531488" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531489" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531490" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531491" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531492" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551846" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551847" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551848" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551849" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551850" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551851" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551852" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551853" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551854" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551855" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551856" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551857" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551858" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551859" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551860" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596010" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596011" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596012" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596013" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596014" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596015" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596016" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596017" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596018" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596019" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596020" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596021" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596022" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596023" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596024" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19873" ref_url="https://www.suse.com/security/cve/CVE-2018-19873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4261-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.11.3. QBmpHandler has a buffer overflow via BMP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19873/">CVE-2018-19873</cve>
	<bugzilla href="https://bugzilla.suse.com/1118596">SUSE bug 1118596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530349" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530350" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530351" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530352" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530353" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530354" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530355" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530356" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530357" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530358" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530359" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530360" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530361" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530362" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530363" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550678" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550679" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550680" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550681" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550682" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550683" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550684" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550685" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550686" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550687" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550688" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550689" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550690" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550691" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550692" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594703" comment="libQt5Concurrent5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594704" comment="libQt5Core5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594705" comment="libQt5DBus5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594706" comment="libQt5Gui5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594707" comment="libQt5Network5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594708" comment="libQt5OpenGL5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594709" comment="libQt5PrintSupport5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594710" comment="libQt5Sql5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594711" comment="libQt5Sql5-mysql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594712" comment="libQt5Sql5-postgresql-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594713" comment="libQt5Sql5-sqlite-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594714" comment="libQt5Sql5-unixODBC-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594715" comment="libQt5Test5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594716" comment="libQt5Widgets5-5.6.1-17.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594717" comment="libQt5Xml5-5.6.1-17.6.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19931" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is a heap-based buffer overflow in bfd_elf32_swap_phdr_in in elfcode.h because the number of program headers is not restricted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils through 2.31. There is an integer overflow and infinite loop caused by the IS_CONTAINED_BY_LMA macro in elf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<bugzilla href="https://bugzilla.suse.com/1118830">SUSE bug 1118830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118831">SUSE bug 1118831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530607" comment="xen-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530608" comment="xen-doc-html-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530609" comment="xen-libs-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530610" comment="xen-libs-32bit-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530611" comment="xen-tools-4.7.6_05-43.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530612" comment="xen-tools-domU-4.7.6_05-43.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<bugzilla href="https://bugzilla.suse.com/1120743">SUSE bug 1120743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20019" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00021.html" source="SUSE-SU"/>
    <description>
    LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155442">SUSE bug 1155442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20020" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00021.html" source="SUSE-SU"/>
    <description>
    LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<bugzilla href="https://bugzilla.suse.com/1120116">SUSE bug 1120116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155472">SUSE bug 1155472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20021" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00021.html" source="SUSE-SU"/>
    <description>
    LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<bugzilla href="https://bugzilla.suse.com/1120122">SUSE bug 1120122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20022" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00021.html" source="SUSE-SU"/>
    <description>
    LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<bugzilla href="https://bugzilla.suse.com/1120120">SUSE bug 1120120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20023" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00021.html" source="SUSE-SU"/>
    <description>
    LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains CWE-665: Improper Initialization vulnerability in VNC Repeater client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023</cve>
	<bugzilla href="https://bugzilla.suse.com/1120119">SUSE bug 1120119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20024" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00021.html" source="SUSE-SU"/>
    <description>
    LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<bugzilla href="https://bugzilla.suse.com/1120121">SUSE bug 1120121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20030" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EXIF tags within libexif version 0.6.21 can be exploited to exhaust available CPU resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20060</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20060" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20060" ref_url="https://www.suse.com/security/cve/CVE-2018-20060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20060/">CVE-2018-20060</cve>
	<bugzilla href="https://bugzilla.suse.com/1119376">SUSE bug 1119376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595152" comment="python-urllib3-1.16-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20102</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20102" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20102" ref_url="https://www.suse.com/security/cve/CVE-2018-20102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00010.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20102/">CVE-2018-20102</cve>
	<bugzilla href="https://bugzilla.suse.com/1119368">SUSE bug 1119368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20103</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20103" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20103" ref_url="https://www.suse.com/security/cve/CVE-2018-20103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20103/">CVE-2018-20103</cve>
	<bugzilla href="https://bugzilla.suse.com/1119419">SUSE bug 1119419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<bugzilla href="https://bugzilla.suse.com/1119714">SUSE bug 1119714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0113-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005342.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0063-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00033.html" source="SUSE-SU"/>
    <description>
    A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521121" comment="krb5-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521122" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521123" comment="krb5-client-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530427" comment="krb5-doc-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530428" comment="krb5-plugin-kdb-ldap-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530429" comment="krb5-plugin-preauth-otp-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530430" comment="krb5-plugin-preauth-pkinit-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530431" comment="krb5-server-1.12.5-40.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551007" comment="krb5-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551008" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551009" comment="krb5-client-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551010" comment="krb5-doc-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551011" comment="krb5-plugin-kdb-ldap-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551012" comment="krb5-plugin-preauth-otp-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551013" comment="krb5-plugin-preauth-pkinit-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551014" comment="krb5-server-1.12.5-40.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594801" comment="krb5-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551008" comment="krb5-32bit-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594802" comment="krb5-client-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594803" comment="krb5-doc-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594804" comment="krb5-plugin-kdb-ldap-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594805" comment="krb5-plugin-preauth-otp-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594806" comment="krb5-plugin-preauth-pkinit-1.12.5-40.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594807" comment="krb5-server-1.12.5-40.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0788-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190788-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1159-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html" source="SUSE-SU"/>
    <description>
    SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120335">SUSE bug 1120335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131918">SUSE bug 1131918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148893">SUSE bug 1148893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169664">SUSE bug 1169664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521758" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521759" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521760" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548950" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548951" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548952" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595522" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548951" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595523" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20406" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521597" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521598" comment="python3-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521599" comment="python3-base-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521600" comment="python3-curses-3.4.6-25.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546546" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546547" comment="python3-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546548" comment="python3-base-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551266" comment="python3-curses-3.4.6-25.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595157" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595158" comment="python3-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595159" comment="python3-base-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595160" comment="python3-curses-3.4.6-25.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20467" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<bugzilla href="https://bugzilla.suse.com/1120381">SUSE bug 1120381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20505" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20505" ref_url="https://www.suse.com/security/cve/CVE-2018-20505" source="SUSE CVE"/>
    <description>
    SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20505/">CVE-2018-20505</cve>
	<bugzilla href="https://bugzilla.suse.com/1131560">SUSE bug 1131560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20506" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20506" ref_url="https://www.suse.com/security/cve/CVE-2018-20506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html" source="SUSE-SU"/>
    <description>
    SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20506/">CVE-2018-20506</cve>
	<bugzilla href="https://bugzilla.suse.com/1131560">SUSE bug 1131560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333982" comment="sqlite3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521758" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521759" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521760" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548950" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548951" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548952" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595522" comment="libsqlite3-0-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548951" comment="libsqlite3-0-32bit-3.8.10.2-9.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595523" comment="sqlite3-3.8.10.2-9.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20511" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20511" ref_url="https://www.suse.com/security/cve/CVE-2018-20511" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20511/">CVE-2018-20511</cve>
	<bugzilla href="https://bugzilla.suse.com/1120388">SUSE bug 1120388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20532" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530678" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551238" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551239" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551240" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551241" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551242" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595121" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595122" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595123" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595124" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595125" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20533" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530678" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551238" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551239" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551240" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551241" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551242" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595121" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595122" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595123" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595124" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595125" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20534" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** There is an illegal address access at ext/testcase.c in libsolv.a in libsolv through 0.7.2 that will cause a denial of service. NOTE: third parties dispute this issue stating that the issue affects the test suite and not the underlying library. It cannot be exploited in any real-world application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522100" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522101" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530678" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522102" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522103" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551238" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551239" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551240" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551241" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551242" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595121" comment="libsolv-tools-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595122" comment="libzypp-16.20.2-27.60.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595123" comment="perl-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595124" comment="python-solv-0.6.36-2.27.19.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595125" comment="zypper-1.13.54-18.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522104" comment="zypper-log-1.13.54-18.40.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20615</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20615" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20615" ref_url="https://www.suse.com/security/cve/CVE-2018-20615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0166-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00018.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20615/">CVE-2018-20615</cve>
	<bugzilla href="https://bugzilla.suse.com/1121283">SUSE bug 1121283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20623" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    In GNU Binutils 2.31.1, there is a use-after-free in the error function in elfcomm.c when called from the process_archive function in readelf.c via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<bugzilla href="https://bugzilla.suse.com/1121035">SUSE bug 1121035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20651" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was discovered in elf_link_add_object_symbols in elflink.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31.1. This occurs for a crafted ET_DYN with no program headers. A specially crafted ELF file allows remote attackers to cause a denial of service, as demonstrated by ld.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<bugzilla href="https://bugzilla.suse.com/1121034">SUSE bug 1121034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
    <description>
    An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<bugzilla href="https://bugzilla.suse.com/1122971">SUSE bug 1122971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20671" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    load_specific_debug_section in objdump.c in GNU Binutils through 2.31.1 contains an integer overflow vulnerability that can trigger a heap-based buffer overflow via a crafted section size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<bugzilla href="https://bugzilla.suse.com/1121056">SUSE bug 1121056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00041.html" source="SUSE-SU"/>
    <description>
    In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521193" comment="openssh-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521194" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530509" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521195" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551094" comment="openssh-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551095" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551096" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551097" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594862" comment="openssh-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594863" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594864" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594865" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20748" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0313-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00040.html" source="SUSE-SU"/>
    <description>
    LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<bugzilla href="https://bugzilla.suse.com/1120118">SUSE bug 1120118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123823">SUSE bug 1123823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155442">SUSE bug 1155442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530784" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530785" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546552" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546553" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595292" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595293" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20749" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0313-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00040.html" source="SUSE-SU"/>
    <description>
    LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123828">SUSE bug 1123828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530784" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530785" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546552" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546553" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595292" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595293" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20750" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0313-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0196-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00040.html" source="SUSE-SU"/>
    <description>
    LibVNC through 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<bugzilla href="https://bugzilla.suse.com/1120117">SUSE bug 1120117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123832">SUSE bug 1123832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530784" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530785" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546552" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546553" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595292" comment="libvncclient0-0.9.9-17.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595293" comment="libvncserver0-0.9.9-17.11.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20815" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
    <description>
    In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551081" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551082" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551083" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551084" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551086" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536858" comment="qemu-ppc-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551088" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594852" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594853" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594854" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594855" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594856" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594857" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<bugzilla href="https://bugzilla.suse.com/1134395">SUSE bug 1134395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20845" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845</cve>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20846" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20846" ref_url="https://www.suse.com/security/cve/CVE-2018-20846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20846/">CVE-2018-20846</cve>
	<bugzilla href="https://bugzilla.suse.com/1140205">SUSE bug 1140205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20847" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20847" ref_url="https://www.suse.com/security/cve/CVE-2018-20847" source="SUSE CVE"/>
    <description>
    An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20847/">CVE-2018-20847</cve>
	<bugzilla href="https://bugzilla.suse.com/1140220">SUSE bug 1140220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548680" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548681" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551688" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548682" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548683" comment="python-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548684" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548685" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548686" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548687" comment="python-demo-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548688" comment="python-devel-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548689" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548690" comment="python-idle-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548691" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548692" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551689" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551690" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551691" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551692" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595071" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548681" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595786" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595072" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548683" comment="python-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595073" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548685" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595074" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595075" comment="python-demo-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595076" comment="python-devel-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595077" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595078" comment="python-idle-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595079" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595080" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595787" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595788" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595789" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595790" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20855" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<bugzilla href="https://bugzilla.suse.com/1143045">SUSE bug 1143045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20856" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20856" ref_url="https://www.suse.com/security/cve/CVE-2018-20856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20856/">CVE-2018-20856</cve>
	<bugzilla href="https://bugzilla.suse.com/1143048">SUSE bug 1143048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156331">SUSE bug 1156331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552429" comment="kgraft-patch-4_4_121-92_101-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552430" comment="kgraft-patch-4_4_121-92_104-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552431" comment="kgraft-patch-4_4_121-92_109-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552432" comment="kgraft-patch-4_4_121-92_114-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552433" comment="kgraft-patch-4_4_121-92_117-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537243" comment="kgraft-patch-4_4_121-92_101-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537244" comment="kgraft-patch-4_4_121-92_104-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537245" comment="kgraft-patch-4_4_121-92_109-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537246" comment="kgraft-patch-4_4_121-92_114-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537247" comment="kgraft-patch-4_4_121-92_117-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20961" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20961" ref_url="https://www.suse.com/security/cve/CVE-2018-20961" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.16.4, a double free vulnerability in the f_midi_set_alt function of drivers/usb/gadget/function/f_midi.c in the f_midi driver may allow attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20961/">CVE-2018-20961</cve>
	<bugzilla href="https://bugzilla.suse.com/1144823">SUSE bug 1144823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<bugzilla href="https://bugzilla.suse.com/1146285">SUSE bug 1146285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21008" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.16.7. A use-after-free can be caused by the function rsi_mac80211_detach in the file drivers/net/wireless/rsi/rsi_91x_mac80211.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<bugzilla href="https://bugzilla.suse.com/1149591">SUSE bug 1149591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21009" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21009" ref_url="https://www.suse.com/security/cve/CVE-2018-21009" source="SUSE CVE"/>
    <description>
    Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-21009/">CVE-2018-21009</cve>
	<bugzilla href="https://bugzilla.suse.com/1149635">SUSE bug 1149635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334072" comment="poppler is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21010" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21010" ref_url="https://www.suse.com/security/cve/CVE-2018-21010" source="SUSE CVE"/>
    <description>
    OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-21010/">CVE-2018-21010</cve>
	<bugzilla href="https://bugzilla.suse.com/1149789">SUSE bug 1149789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21247" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25009" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function WebPMuxCreateInternal. The highest threat from this vulnerability is to data confidentiality and to the service availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009</cve>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25010" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ApplyFilter. The highest threat from this vulnerability is to data confidentiality and to the service availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010</cve>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow was found in PutLE16(). The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011</cve>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25012" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function WebPMuxCreateInternal. The highest threat from this vulnerability is to data confidentiality and to the service availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012</cve>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25013" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ShiftBytes. The highest threat from this vulnerability is to data confidentiality and to the service availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013</cve>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25014</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25014" ref_url="https://www.suse.com/security/cve/CVE-2018-25014" source="SUSE CVE"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. An unitialized variable is used in function ReadSymbol. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25014/">CVE-2018-25014</cve>
	<bugzilla href="https://bugzilla.suse.com/1186250">SUSE bug 1186250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25020" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25020" ref_url="https://www.suse.com/security/cve/CVE-2018-25020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25020/">CVE-2018-25020</cve>
	<bugzilla href="https://bugzilla.suse.com/1193575">SUSE bug 1193575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1061-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010584.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3IAWI5KYTN2PXEFZY7OU7STBINLC3H6/" source="SUSE-SU"/>
    <description>
    zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197893">SUSE bug 1197893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198667">SUSE bug 1198667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199104">SUSE bug 1199104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009677126" comment="libz1-1.2.8-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677109" comment="libz1-32bit-1.2.8-12.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677127" comment="zlib-devel-1.2.8-12.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550786" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548438" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550787" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550788" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550789" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550790" comment="mariadb-tools-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2612" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550786" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548438" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550787" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550788" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550789" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550790" comment="mariadb-tools-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550786" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548438" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550787" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550788" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550789" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550790" comment="mariadb-tools-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2638" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2638" ref_url="https://www.suse.com/security/cve/CVE-2018-2638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u152 and 9.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2638/">CVE-2018-2638</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2639" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2639" ref_url="https://www.suse.com/security/cve/CVE-2018-2639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u152 and 9.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2639/">CVE-2018-2639</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550786" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548438" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550787" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550788" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550789" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550790" comment="mariadb-tools-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2657" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2657" ref_url="https://www.suse.com/security/cve/CVE-2018-2657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u171 and 7u161; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2657/">CVE-2018-2657</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550786" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548438" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550787" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550788" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550789" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550790" comment="mariadb-tools-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0697-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0730-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00046.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078431">SUSE bug 1078431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550786" comment="libmysqlclient18-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548438" comment="libmysqlclient18-32bit-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550787" comment="mariadb-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550788" comment="mariadb-client-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550789" comment="mariadb-errormessages-10.0.34-29.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550790" comment="mariadb-tools-10.0.34-29.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0663-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0665-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0694-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0743-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0684-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<bugzilla href="https://bugzilla.suse.com/1076366">SUSE bug 1076366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082810">SUSE bug 1082810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550769" comment="java-1_7_0-openjdk-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550770" comment="java-1_7_0-openjdk-demo-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550771" comment="java-1_7_0-openjdk-devel-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550772" comment="java-1_7_0-openjdk-headless-1.7.0.171-43.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546069" comment="java-1_7_1-ibm-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535646" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546070" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535649" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.20-38.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548431" comment="java-1_8_0-ibm-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535629" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009535631" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.10-30.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550773" comment="java-1_8_0-openjdk-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550774" comment="java-1_8_0-openjdk-demo-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550775" comment="java-1_8_0-openjdk-devel-1.8.0.161-27.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550776" comment="java-1_8_0-openjdk-headless-1.8.0.161-27.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2759</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2759" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2766" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<bugzilla href="https://bugzilla.suse.com/1088681">SUSE bug 1088681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101675">SUSE bug 1101675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2777</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2777" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2782" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2783" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<bugzilla href="https://bugzilla.suse.com/1090022">SUSE bug 1090022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2786</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2786" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2787" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<bugzilla href="https://bugzilla.suse.com/1090023">SUSE bug 1090023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101637">SUSE bug 1101637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<bugzilla href="https://bugzilla.suse.com/1090024">SUSE bug 1090024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<bugzilla href="https://bugzilla.suse.com/1090025">SUSE bug 1090025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<bugzilla href="https://bugzilla.suse.com/1090026">SUSE bug 1090026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<bugzilla href="https://bugzilla.suse.com/1090027">SUSE bug 1090027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<bugzilla href="https://bugzilla.suse.com/1090028">SUSE bug 1090028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<bugzilla href="https://bugzilla.suse.com/1090029">SUSE bug 1090029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/1090030">SUSE bug 1090030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2810</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2810" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1764-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<bugzilla href="https://bugzilla.suse.com/1090032">SUSE bug 1090032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530125" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530127" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530128" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545536" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541517" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545537" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594425" comment="java-1_7_1-ibm-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530126" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594426" comment="java-1_7_1-ibm-devel-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594427" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530129" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.25-38.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1690-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1692-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1938-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1719-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<bugzilla href="https://bugzilla.suse.com/1090033">SUSE bug 1090033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519713" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530113" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530114" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519714" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519711" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530111" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530112" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519712" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545518" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545519" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545520" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545521" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548176" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548177" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548178" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548179" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594418" comment="java-1_7_0-openjdk-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594419" comment="java-1_7_0-openjdk-demo-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594420" comment="java-1_7_0-openjdk-devel-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594421" comment="java-1_7_0-openjdk-headless-1.7.0.181-43.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594414" comment="java-1_8_0-openjdk-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594415" comment="java-1_8_0-openjdk-demo-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594416" comment="java-1_8_0-openjdk-devel-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594417" comment="java-1_8_0-openjdk-headless-1.8.0.171-27.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1781-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1101-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00042.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<bugzilla href="https://bugzilla.suse.com/1089987">SUSE bug 1089987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090518">SUSE bug 1090518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519740" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519741" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519744" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519745" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519746" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530130" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548189" comment="libmysqlclient18-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548190" comment="libmysqlclient18-32bit-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548194" comment="mariadb-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548195" comment="mariadb-client-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548196" comment="mariadb-errormessages-10.0.35-29.20.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548197" comment="mariadb-tools-10.0.35-29.20.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594437" comment="galera-3-wsrep-provider-25.3.23-8.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594438" comment="libmariadb3-3.0.3-1.3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594439" comment="mariadb-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594440" comment="mariadb-client-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594441" comment="mariadb-errormessages-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594442" comment="mariadb-galera-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594443" comment="mariadb-tools-10.2.15-7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594444" comment="ruby2.1-rubygem-mysql2-0.4.10-7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594445" comment="xtrabackup-2.4.10-5.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2825" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825</cve>
	<bugzilla href="https://bugzilla.suse.com/1090196">SUSE bug 1090196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334125" comment="java-1_7_0-openjdk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333949" comment="java-1_8_0-openjdk is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2826" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1738-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004314.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826</cve>
	<bugzilla href="https://bugzilla.suse.com/1090197">SUSE bug 1090197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093311">SUSE bug 1093311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334125" comment="java-1_7_0-openjdk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333949" comment="java-1_8_0-openjdk is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530121" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530123" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548180" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541516" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594423" comment="java-1_8_0-ibm-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530122" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594424" comment="java-1_8_0-ibm-devel-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530124" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.15-30.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2938" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<bugzilla href="https://bugzilla.suse.com/1101644">SUSE bug 1101644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530284" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530285" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548314" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548315" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548316" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548317" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594599" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594600" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594601" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594602" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2940" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530240" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530242" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530243" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530284" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530285" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545756" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541609" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545757" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548314" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548315" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548316" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548317" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594557" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594558" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594559" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594599" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594600" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594601" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594602" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101651">SUSE bug 1101651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530240" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530242" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530243" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530284" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530285" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545756" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541609" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545757" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548314" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548315" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548316" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548317" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594557" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594558" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594559" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594599" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594600" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594601" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594602" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2964" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2964" ref_url="https://www.suse.com/security/cve/CVE-2018-2964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2964/">CVE-2018-2964</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101653">SUSE bug 1101653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20182973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-2973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-2973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2973" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2649-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2206-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2247-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3057-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<bugzilla href="https://bugzilla.suse.com/1101645">SUSE bug 1101645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101656">SUSE bug 1101656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530240" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530242" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530243" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530259" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530261" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520141" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530284" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530285" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520142" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545756" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541609" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545757" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548300" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541626" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548314" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548315" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548316" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548317" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594557" comment="java-1_7_1-ibm-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530241" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594558" comment="java-1_7_1-ibm-devel-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594559" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530244" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.30-38.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594573" comment="java-1_8_0-ibm-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530260" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594574" comment="java-1_8_0-ibm-devel-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530262" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.20-30.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594599" comment="java-1_8_0-openjdk-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594600" comment="java-1_8_0-openjdk-demo-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594601" comment="java-1_8_0-openjdk-devel-1.8.0.181-27.26.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594602" comment="java-1_8_0-openjdk-headless-1.8.0.181-27.26.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<bugzilla href="https://bugzilla.suse.com/1101676">SUSE bug 1101676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3060</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3060" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<bugzilla href="https://bugzilla.suse.com/1101677">SUSE bug 1101677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3064" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<bugzilla href="https://bugzilla.suse.com/1103342">SUSE bug 1103342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<bugzilla href="https://bugzilla.suse.com/1101678">SUSE bug 1101678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530340" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545971" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541807" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541816" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594692" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594693" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594694" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594697" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594698" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530340" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545971" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541807" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541816" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594692" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594693" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594694" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594697" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594698" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<bugzilla href="https://bugzilla.suse.com/1112421">SUSE bug 1112421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530340" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545971" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541807" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541816" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594692" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594693" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594694" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594697" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594698" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<bugzilla href="https://bugzilla.suse.com/1112417">SUSE bug 1112417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3162</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3162" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162</cve>
	<bugzilla href="https://bugzilla.suse.com/1112415">SUSE bug 1112415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530340" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545971" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541807" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541816" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594692" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594693" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594694" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594697" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594698" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3173</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3173" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173</cve>
	<bugzilla href="https://bugzilla.suse.com/1112386">SUSE bug 1112386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3174" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<bugzilla href="https://bugzilla.suse.com/1112368">SUSE bug 1112368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112147">SUSE bug 1112147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530340" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545971" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541807" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541816" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594692" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594693" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594694" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594697" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594698" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120714">SUSE bug 1120714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541816" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594697" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594698" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3185</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185</cve>
	<bugzilla href="https://bugzilla.suse.com/1112384">SUSE bug 1112384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3200</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3200" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200</cve>
	<bugzilla href="https://bugzilla.suse.com/1112404">SUSE bug 1112404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00008.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<bugzilla href="https://bugzilla.suse.com/1112142">SUSE bug 1112142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112143">SUSE bug 1112143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112144">SUSE bug 1112144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112146">SUSE bug 1112146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112148">SUSE bug 1112148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112152">SUSE bug 1112152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530338" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530340" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530341" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530343" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530345" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521667" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530861" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530862" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521668" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545971" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541807" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545972" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548395" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009541816" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548938" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548939" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548940" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548941" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594692" comment="java-1_7_1-ibm-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530339" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594693" comment="java-1_7_1-ibm-devel-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594694" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530342" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.35-38.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594697" comment="java-1_8_0-ibm-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530344" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594698" comment="java-1_8_0-ibm-devel-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530346" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.25-30.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595440" comment="java-1_8_0-openjdk-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595441" comment="java-1_8_0-openjdk-demo-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595442" comment="java-1_8_0-openjdk-devel-1.8.0.191-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595443" comment="java-1_8_0-openjdk-headless-1.8.0.191-27.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3251" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<bugzilla href="https://bugzilla.suse.com/1112397">SUSE bug 1112397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3277</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3277" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277</cve>
	<bugzilla href="https://bugzilla.suse.com/1112391">SUSE bug 1112391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<bugzilla href="https://bugzilla.suse.com/1112432">SUSE bug 1112432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3284</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3284" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284</cve>
	<bugzilla href="https://bugzilla.suse.com/1112377">SUSE bug 1112377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594920" comment="libmariadb3-3.0.7-1.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594921" comment="mariadb-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594922" comment="mariadb-client-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594923" comment="mariadb-errormessages-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594924" comment="mariadb-galera-10.2.22-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594925" comment="mariadb-tools-10.2.22-10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620" source="SUSE CVE"/>
		<reference ref_id="L1TF-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-the-l1-terminal-fault-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="TID000019216" ref_url="https://www.suse.com/support/kb/doc/?id=000019216" source="SUSE-SU"/>
		<reference ref_id="TID000019230" ref_url="https://www.suse.com/support/kb/doc/?id=000019230" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7023077" ref_url="https://www.suse.com/support/kb/doc/?id=7023077" source="SUSE-SU"/>
		<reference ref_id="TID7023078" ref_url="https://www.suse.com/support/kb/doc/?id=7023078" source="SUSE-SU"/>
		<reference ref_id="TID7023312" ref_url="https://www.suse.com/support/kb/doc/?id=7023312" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090340">SUSE bug 1090340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104894">SUSE bug 1104894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639" source="SUSE CVE"/>
		<reference ref_id="BLOG-SPECTREV4" ref_url="https://www.suse.com/c/suse-addresses-spectre-variant-4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="TID000019189" ref_url="https://www.suse.com/support/kb/doc/?id=000019189" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022937" ref_url="https://www.suse.com/support/kb/doc/?id=7022937" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1380-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2306-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085235">SUSE bug 1085235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085308">SUSE bug 1085308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102640">SUSE bug 1102640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173489">SUSE bug 1173489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521642" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530836" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530837" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521643" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530407" comment="kernel-default-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530408" comment="kernel-default-base-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530409" comment="kernel-default-devel-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530410" comment="kernel-devel-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530411" comment="kernel-macros-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530412" comment="kernel-source-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530413" comment="kernel-syms-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530414" comment="kgraft-patch-4_4_121-92_80-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530090" comment="libvirt-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530091" comment="libvirt-client-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530092" comment="libvirt-daemon-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530093" comment="libvirt-daemon-config-network-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530094" comment="libvirt-daemon-config-nwfilter-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530095" comment="libvirt-daemon-driver-interface-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530096" comment="libvirt-daemon-driver-libxl-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530097" comment="libvirt-daemon-driver-lxc-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530098" comment="libvirt-daemon-driver-network-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530099" comment="libvirt-daemon-driver-nodedev-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530100" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530101" comment="libvirt-daemon-driver-qemu-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530102" comment="libvirt-daemon-driver-secret-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530103" comment="libvirt-daemon-driver-storage-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530104" comment="libvirt-daemon-hooks-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530105" comment="libvirt-daemon-lxc-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530106" comment="libvirt-daemon-qemu-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530107" comment="libvirt-daemon-xen-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530108" comment="libvirt-doc-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530109" comment="libvirt-lock-sanlock-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530110" comment="libvirt-nss-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530270" comment="qemu-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530271" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530273" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530274" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530276" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530277" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530280" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546622" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546623" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546624" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546625" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548547" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548548" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548549" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548550" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550997" comment="kernel-default-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550998" comment="kernel-default-base-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550999" comment="kernel-default-devel-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551000" comment="kernel-default-man-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530410" comment="kernel-devel-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530411" comment="kernel-macros-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530412" comment="kernel-source-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551001" comment="kernel-syms-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530414" comment="kgraft-patch-4_4_121-92_80-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550397" comment="libvirt-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550398" comment="libvirt-client-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550399" comment="libvirt-daemon-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550400" comment="libvirt-daemon-config-network-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550401" comment="libvirt-daemon-config-nwfilter-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550402" comment="libvirt-daemon-driver-interface-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530096" comment="libvirt-daemon-driver-libxl-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550403" comment="libvirt-daemon-driver-lxc-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550404" comment="libvirt-daemon-driver-network-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550405" comment="libvirt-daemon-driver-nodedev-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550406" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550407" comment="libvirt-daemon-driver-qemu-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550408" comment="libvirt-daemon-driver-secret-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550409" comment="libvirt-daemon-driver-storage-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550410" comment="libvirt-daemon-hooks-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550411" comment="libvirt-daemon-lxc-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550412" comment="libvirt-daemon-qemu-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530107" comment="libvirt-daemon-xen-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550413" comment="libvirt-doc-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550414" comment="libvirt-lock-sanlock-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550415" comment="libvirt-nss-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550558" comment="qemu-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550559" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550560" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550561" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550562" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550563" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536606" comment="qemu-ppc-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550564" comment="qemu-s390-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550565" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595410" comment="java-1_7_0-openjdk-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595411" comment="java-1_7_0-openjdk-demo-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595412" comment="java-1_7_0-openjdk-devel-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595413" comment="java-1_7_0-openjdk-headless-1.7.0.201-43.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594842" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594843" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594844" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594845" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594759" comment="kernel-default-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594760" comment="kernel-default-base-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594761" comment="kernel-default-devel-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551000" comment="kernel-default-man-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530410" comment="kernel-devel-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530411" comment="kernel-macros-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530412" comment="kernel-source-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594762" comment="kernel-syms-4.4.121-92.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530414" comment="kgraft-patch-4_4_121-92_80-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594395" comment="libvirt-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594396" comment="libvirt-client-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594397" comment="libvirt-daemon-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594398" comment="libvirt-daemon-config-network-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594399" comment="libvirt-daemon-config-nwfilter-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594400" comment="libvirt-daemon-driver-interface-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530096" comment="libvirt-daemon-driver-libxl-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594401" comment="libvirt-daemon-driver-lxc-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594402" comment="libvirt-daemon-driver-network-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594403" comment="libvirt-daemon-driver-nodedev-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594404" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594405" comment="libvirt-daemon-driver-qemu-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594406" comment="libvirt-daemon-driver-secret-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594407" comment="libvirt-daemon-driver-storage-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594408" comment="libvirt-daemon-hooks-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594409" comment="libvirt-daemon-lxc-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594410" comment="libvirt-daemon-qemu-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530107" comment="libvirt-daemon-xen-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594411" comment="libvirt-doc-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594412" comment="libvirt-lock-sanlock-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594413" comment="libvirt-nss-2.0.0-27.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594589" comment="qemu-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594590" comment="qemu-block-curl-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530272" comment="qemu-block-rbd-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594591" comment="qemu-block-ssh-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594592" comment="qemu-guest-agent-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530275" comment="qemu-ipxe-1.0.0-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550562" comment="qemu-kvm-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594593" comment="qemu-lang-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550564" comment="qemu-s390-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530278" comment="qemu-seabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530279" comment="qemu-sgabios-8-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594594" comment="qemu-tools-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530281" comment="qemu-vgabios-1.9.1-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530282" comment="qemu-x86-2.6.2-41.43.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530115" comment="xen-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530116" comment="xen-doc-html-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530117" comment="xen-libs-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530118" comment="xen-libs-32bit-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530119" comment="xen-tools-4.7.5_04-43.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530120" comment="xen-tools-domU-4.7.5_04-43.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="TID000019198" ref_url="https://www.suse.com/support/kb/doc/?id=000019198" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022950" ref_url="https://www.suse.com/support/kb/doc/?id=7022950" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1904-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00058.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175912">SUSE bug 1175912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334216" comment="ucode-intel is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646" source="SUSE CVE"/>
		<reference ref_id="L1TF-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-the-l1-terminal-fault-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2410-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="TID000019216" ref_url="https://www.suse.com/support/kb/doc/?id=000019216" source="SUSE-SU"/>
		<reference ref_id="TID000019230" ref_url="https://www.suse.com/support/kb/doc/?id=000019230" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7023077" ref_url="https://www.suse.com/support/kb/doc/?id=7023077" source="SUSE-SU"/>
		<reference ref_id="TID7023078" ref_url="https://www.suse.com/support/kb/doc/?id=7023078" source="SUSE-SU"/>
		<reference ref_id="TID7023312" ref_url="https://www.suse.com/support/kb/doc/?id=7023312" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2434-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2436-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00073.html" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104365">SUSE bug 1104365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104894">SUSE bug 1104894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106548">SUSE bug 1106548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530205" comment="xen-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530206" comment="xen-doc-html-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530207" comment="xen-libs-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530208" comment="xen-libs-32bit-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530209" comment="xen-tools-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530210" comment="xen-tools-domU-4.7.6_04-43.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536553" comment="kgraft-patch-4_4_103-92_53-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536552" comment="kgraft-patch-4_4_103-92_56-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536551" comment="kgraft-patch-4_4_114-92_64-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536550" comment="kgraft-patch-4_4_114-92_67-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536543" comment="kgraft-patch-4_4_120-92_70-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536544" comment="kgraft-patch-4_4_121-92_73-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536545" comment="kgraft-patch-4_4_121-92_80-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536546" comment="kgraft-patch-4_4_121-92_85-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536549" comment="kgraft-patch-4_4_74-92_38-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536548" comment="kgraft-patch-4_4_90-92_45-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536547" comment="kgraft-patch-4_4_90-92_50-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530205" comment="xen-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530206" comment="xen-doc-html-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530207" comment="xen-libs-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530208" comment="xen-libs-32bit-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530209" comment="xen-tools-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530210" comment="xen-tools-domU-4.7.6_04-43.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519961" comment="ucode-intel-20180807-13.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530205" comment="xen-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530206" comment="xen-doc-html-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530207" comment="xen-libs-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530208" comment="xen-libs-32bit-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530209" comment="xen-tools-4.7.6_04-43.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530210" comment="xen-tools-domU-4.7.6_04-43.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2099-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182099-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="TID000019231" ref_url="https://www.suse.com/support/kb/doc/?id=000019231" source="SUSE-SU"/>
		<reference ref_id="TID000019261" ref_url="https://www.suse.com/support/kb/doc/?id=000019261" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7023076" ref_url="https://www.suse.com/support/kb/doc/?id=7023076" source="SUSE-SU"/>
		<reference ref_id="TID7023167" ref_url="https://www.suse.com/support/kb/doc/?id=7023167" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00012.html" source="SUSE-SU"/>
    <description>
    System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095241">SUSE bug 1095241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100555">SUSE bug 1100555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536504" comment="kgraft-patch-4_4_103-92_53-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536505" comment="kgraft-patch-4_4_103-92_56-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536502" comment="kgraft-patch-4_4_114-92_64-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536503" comment="kgraft-patch-4_4_114-92_67-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536509" comment="kgraft-patch-4_4_120-92_70-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536510" comment="kgraft-patch-4_4_121-92_73-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536508" comment="kgraft-patch-4_4_121-92_80-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536513" comment="kgraft-patch-4_4_74-92_29-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536512" comment="kgraft-patch-4_4_74-92_32-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536515" comment="kgraft-patch-4_4_74-92_35-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536514" comment="kgraft-patch-4_4_74-92_38-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536506" comment="kgraft-patch-4_4_90-92_45-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536507" comment="kgraft-patch-4_4_90-92_50-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530143" comment="xen-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530144" comment="xen-doc-html-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530145" comment="xen-libs-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530146" comment="xen-libs-32bit-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530147" comment="xen-tools-4.7.6_02-43.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530148" comment="xen-tools-domU-4.7.6_02-43.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3693" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3693" ref_url="https://www.suse.com/security/cve/CVE-2018-3693" source="SUSE CVE"/>
		<reference ref_id="TID000019229" ref_url="https://www.suse.com/support/kb/doc/?id=000019229" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7023075" ref_url="https://www.suse.com/support/kb/doc/?id=7023075" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3693/">CVE-2018-3693</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101008">SUSE bug 1101008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3741</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3741" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3741" ref_url="https://www.suse.com/security/cve/CVE-2018-3741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005828.html" source="SUSE-SU"/>
    <description>
    There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3741/">CVE-2018-3741</cve>
	<bugzilla href="https://bugzilla.suse.com/1085967">SUSE bug 1085967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086598">SUSE bug 1086598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595117" comment="ruby2.1-rubygem-rails-html-sanitizer-1.0.3-8.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3760</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3760" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3760" ref_url="https://www.suse.com/security/cve/CVE-2018-3760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2176-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182176-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2124-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00041.html" source="SUSE-SU"/>
    <description>
    There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower. Specially crafted requests can be used to access files that exists on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3760/">CVE-2018-3760</cve>
	<bugzilla href="https://bugzilla.suse.com/1098369">SUSE bug 1098369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182167">SUSE bug 1182167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594527" comment="crowbar-4.0+git.1528801103.f5708341-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594528" comment="crowbar-core-4.0+git.1534246408.3ab19c567-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594529" comment="crowbar-core-branding-upstream-4.0+git.1534246408.3ab19c567-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594530" comment="crowbar-devel-4.0+git.1528801103.f5708341-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594531" comment="crowbar-ha-4.0+git.1533750802.5768e73-4.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594532" comment="crowbar-openstack-4.0+git.1534254269.ce598a9fe-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594533" comment="crowbar-ui-1.1.0+git.1533844061.4ac8e723-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594454" comment="ruby2.1-rubygem-sprockets-2_12-2.12.5-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009685560" comment="rubygem-sprockets-2_12 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3817</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3817" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3817" ref_url="https://www.suse.com/security/cve/CVE-2018-3817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004502.html" source="SUSE-SU"/>
    <description>
    When logging warnings regarding deprecated settings, Logstash before 5.6.6 and 6.x before 6.1.2 could inadvertently log sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3817/">CVE-2018-3817</cve>
	<bugzilla href="https://bugzilla.suse.com/1090849">SUSE bug 1090849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594490" comment="grafana-4.5.1-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594491" comment="kafka-0.10.2.2-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594492" comment="logstash-2.4.1-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594493" comment="monasca-installer-20180608_12.47-9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3826</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3826" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3826" ref_url="https://www.suse.com/security/cve/CVE-2018-3826" source="SUSE CVE"/>
    <description>
    In Elasticsearch versions 6.0.0-beta1 to 6.2.4 a disclosure flaw was found in the _snapshot API. When the access_key and security_key parameters are set using the _snapshot API they can be exposed as plain text by users able to query the _snapshot API.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3826/">CVE-2018-3826</cve>
	<bugzilla href="https://bugzilla.suse.com/1109085">SUSE bug 1109085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3827</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3827" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3827" ref_url="https://www.suse.com/security/cve/CVE-2018-3827" source="SUSE CVE"/>
    <description>
    A sensitive data disclosure flaw was found in the Elasticsearch repository-azure (formerly elasticsearch-cloud-azure) plugin. When the repository-azure plugin is set to log at TRACE level Azure credentials can be inadvertently logged.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3827/">CVE-2018-3827</cve>
	<bugzilla href="https://bugzilla.suse.com/1109078">SUSE bug 1109078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3830</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3830" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3830" ref_url="https://www.suse.com/security/cve/CVE-2018-3830" source="SUSE CVE"/>
    <description>
    Kibana versions 5.3.0 to 6.4.1 had a cross-site scripting (XSS) vulnerability via the source field formatter that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3830/">CVE-2018-3830</cve>
	<bugzilla href="https://bugzilla.suse.com/1109087">SUSE bug 1109087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3831</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3831" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3831" ref_url="https://www.suse.com/security/cve/CVE-2018-3831" source="SUSE CVE"/>
    <description>
    Elasticsearch Alerting and Monitoring in versions before 6.4.1 or 5.6.12 have an information disclosure issue when secrets are configured via the API. The Elasticsearch _cluster/settings API, when queried, could leak sensitive configuration information such as passwords, tokens, or usernames. This could allow an authenticated Elasticsearch user to improperly view these details.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3831/">CVE-2018-3831</cve>
	<bugzilla href="https://bugzilla.suse.com/1109077">SUSE bug 1109077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4191" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4197" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4208" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4209" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4210" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, an array indexing issue existed in the handling of a function in javascript core. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4212" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4213" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4261" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4262" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 11.4.1, iCloud for Windows before 7.6, multiple memory corruption issues were addressed with improved memory handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4263" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4264" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4265" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4266" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A race condition was addressed with additional validation. This issue affected versions prior toiVersions prior to: OS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4267" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4270" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4272" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4273" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved input validation. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4278" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 11.4.1, iCloud for Windows before 7.6, sound fetched through audio elements may be exfiltrated cross-origin. This issue was addressed with improved audio taint tracking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4284" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, tvOS 11.4.1, watchOS 4.3.2, Safari 11.1.2, iTunes 12.8 for Windows, iCloud for Windows 7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<bugzilla href="https://bugzilla.suse.com/1104169">SUSE bug 1104169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4299" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4306" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4309" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4312" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4314" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4315" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4316" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4317" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4318" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4319" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue affected versions prior to iOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4328" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4345" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4359" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4361" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory consumption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<bugzilla href="https://bugzilla.suse.com/1110279">SUSE bug 1110279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4372" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4373" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4375" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4376" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4378" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4382" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4386" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4416" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<bugzilla href="https://bugzilla.suse.com/1116998">SUSE bug 1116998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521678" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521679" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521681" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521682" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521683" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551385" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551386" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551387" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551388" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551389" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595444" comment="libjavascriptcoregtk-4_0-18-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595445" comment="libwebkit2gtk-4_0-37-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595446" comment="typelib-1_0-JavaScriptCore-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595447" comment="typelib-1_0-WebKit2-4_0-2.22.4-2.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595448" comment="webkit2gtk-4_0-injected-bundles-2.22.4-2.29.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4437" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530555" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530556" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551125" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551126" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551127" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551128" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551129" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551130" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551131" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594951" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594952" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594953" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594954" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594955" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594956" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594957" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4438" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<bugzilla href="https://bugzilla.suse.com/1119554">SUSE bug 1119554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530555" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530556" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551125" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551126" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551127" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551128" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551129" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551130" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551131" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594951" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594952" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594953" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594954" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594955" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594956" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594957" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4441" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<bugzilla href="https://bugzilla.suse.com/1119555">SUSE bug 1119555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530555" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530556" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551125" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551126" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551127" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551128" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551129" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551130" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551131" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594951" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594952" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594953" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594954" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594955" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594956" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594957" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4442" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<bugzilla href="https://bugzilla.suse.com/1119556">SUSE bug 1119556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530555" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530556" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551125" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551126" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551127" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551128" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551129" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551130" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551131" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594951" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594952" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594953" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594954" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594955" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594956" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594957" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4443" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<bugzilla href="https://bugzilla.suse.com/1119557">SUSE bug 1119557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530555" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530556" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551125" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551126" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551127" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551128" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551129" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551130" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551131" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594951" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594952" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594953" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594954" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594955" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594956" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594957" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4464" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0081-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<bugzilla href="https://bugzilla.suse.com/1119553">SUSE bug 1119553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119558">SUSE bug 1119558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521430" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521431" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521433" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521434" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530555" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521435" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530556" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551125" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551126" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551127" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551128" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551129" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551130" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551131" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594951" comment="libjavascriptcoregtk-4_0-18-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594952" comment="libwebkit2gtk-4_0-37-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521432" comment="libwebkit2gtk3-lang-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594953" comment="typelib-1_0-JavaScriptCore-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594954" comment="typelib-1_0-WebKit2-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594955" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594956" comment="webkit2gtk-4_0-injected-bundles-2.22.5-2.32.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594957" comment="webkit2gtk3-devel-2.22.5-2.32.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20184868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-4868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-4868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4868" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-4868" ref_url="https://www.suse.com/security/cve/CVE-2018-4868" source="SUSE CVE"/>
    <description>
    The Exiv2::Jp2Image::readMetadata function in jp2image.cpp in Exiv2 0.26 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4868/">CVE-2018-4868</cve>
	<bugzilla href="https://bugzilla.suse.com/1074502">SUSE bug 1074502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5089" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5091" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.6 and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5096" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.6 and Thunderbird &lt; 52.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5097" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5098" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5099" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5102" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5103" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5104" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5117" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-01/msg00077.html" source="SUSE-SU"/>
    <description>
    If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<bugzilla href="https://bugzilla.suse.com/1077291">SUSE bug 1077291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550607" comment="MozillaFirefox-52.6.0esr-109.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550608" comment="MozillaFirefox-translations-52.6.0esr-109.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5124" ref_url="https://www.suse.com/security/cve/CVE-2018-5124" source="SUSE CVE"/>
    <description>
    Unsanitized output in the browser UI leaves HTML tags in place and can result in arbitrary code execution in Firefox before version 58.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5124/">CVE-2018-5124</cve>
	<bugzilla href="https://bugzilla.suse.com/1078314">SUSE bug 1078314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333936" comment="MozillaFirefox is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5129" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
    <description>
    When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5131" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
    <description>
    Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5144" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5145" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0681-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<bugzilla href="https://bugzilla.suse.com/1085130">SUSE bug 1085130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0805-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0818-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0819-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00101.html" source="SUSE-SU"/>
    <description>
    An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox &lt; 59.0.1, Firefox ESR &lt; 52.7.2, and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180395">SUSE bug 1180395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533250" comment="libvorbis-doc-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550812" comment="libvorbis0-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550813" comment="libvorbis0-32bit-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550814" comment="libvorbisenc2-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550815" comment="libvorbisenc2-32bit-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550816" comment="libvorbisfile3-1.3.3-10.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550817" comment="libvorbisfile3-32bit-1.3.3-10.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5147" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
    <description>
    The libtremor library has the same flaw as CVE-2018-5146. This library is used by Firefox in place of libvorbis on Android and ARM platforms. This vulnerability affects Firefox ESR &lt; 52.7.2 and Firefox &lt; 59.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5148" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0843-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00109.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.7.3 and Firefox &lt; 59.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<bugzilla href="https://bugzilla.suse.com/1087059">SUSE bug 1087059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550908" comment="MozillaFirefox-52.7.3esr-109.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550909" comment="MozillaFirefox-translations-52.7.3esr-109.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5150" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5151" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5151" ref_url="https://www.suse.com/security/cve/CVE-2018-5151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs were reported in Firefox 59. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5151/">CVE-2018-5151</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5152" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5152" ref_url="https://www.suse.com/security/cve/CVE-2018-5152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5152/">CVE-2018-5152</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5153" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5153" ref_url="https://www.suse.com/security/cve/CVE-2018-5153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If websocket data is sent with mixed text and binary in a single message, the binary data can be corrupted. This can result in an out-of-bounds read with the read memory sent to the originating server in response. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5153/">CVE-2018-5153</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5154" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5155" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5157" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
    <description>
    Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5158" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
    <description>
    The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5159" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5160" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5160" ref_url="https://www.suse.com/security/cve/CVE-2018-5160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    WebRTC can use a "WrappedI420Buffer" pixel buffer but the owning image object can be freed while it is still in use. This can result in the WebRTC encoder using uninitialized memory, leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5160/">CVE-2018-5160</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5161" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5161" ref_url="https://www.suse.com/security/cve/CVE-2018-5161" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Crafted message headers can cause a Thunderbird process to hang on receiving the message. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5161/">CVE-2018-5161</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5162" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5162" ref_url="https://www.suse.com/security/cve/CVE-2018-5162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Plaintext of decrypted emails can leak through the src attribute of remote images, or links. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5162/">CVE-2018-5162</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093151">SUSE bug 1093151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5163" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5163" ref_url="https://www.suse.com/security/cve/CVE-2018-5163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5163/">CVE-2018-5163</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5164" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5164" ref_url="https://www.suse.com/security/cve/CVE-2018-5164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    Content Security Policy (CSP) is not applied correctly to all parts of multipart content sent with the "multipart/x-mixed-replace" MIME type. This could allow for script to run where CSP should block it, allowing for cross-site scripting (XSS) and other attacks. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5164/">CVE-2018-5164</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5165" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5165" ref_url="https://www.suse.com/security/cve/CVE-2018-5165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    In 32-bit versions of Firefox, the Adobe Flash plugin setting for "Enable Adobe Flash protected mode" is unchecked by default even though the Adobe Flash sandbox is actually enabled. The displayed state is the reverse of the true setting, resulting in user confusion. This could cause users to select this setting intending to activate it and inadvertently turn protections off. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5165/">CVE-2018-5165</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5166" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5166" ref_url="https://www.suse.com/security/cve/CVE-2018-5166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    WebExtensions can use request redirection and a "filterReponseData" filter to bypass host permission settings to redirect network traffic and access content from a host for which they do not have explicit user permission. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5166/">CVE-2018-5166</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5167" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5167" ref_url="https://www.suse.com/security/cve/CVE-2018-5167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    The web console and JavaScript debugger do not sanitize all output that can be hyperlinked. Both will display "chrome:" links as active, clickable hyperlinks in their output. Web sites should not be able to directly link to internal chrome pages. Additionally, the JavaScript debugger will display "javascript:" links, which users could be tricked into clicking by malicious sites. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5167/">CVE-2018-5167</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5168" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5169" ref_url="https://www.suse.com/security/cve/CVE-2018-5169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If manipulated hyperlinked text with "chrome:" URL contained in it is dragged and dropped on the "home" icon, the home page can be reset to include a normally-unlinkable chrome page as one of the home page tabs. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5169/">CVE-2018-5169</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5170" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5170" ref_url="https://www.suse.com/security/cve/CVE-2018-5170" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    It is possible to spoof the filename of an attachment and display an arbitrary attachment name. This could lead to a user opening a remote attachment which is a different file type than expected. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5170/">CVE-2018-5170</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5172" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5172" ref_url="https://www.suse.com/security/cve/CVE-2018-5172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    The Live Bookmarks page and the PDF viewer can run injected script content if a user pastes script from the clipboard into them while viewing RSS feeds or PDF files. This could allow a malicious site to socially engineer a user to copy and paste malicious script content that could then run with the context of either page but does not allow for privilege escalation. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5172/">CVE-2018-5172</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5173" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5173" ref_url="https://www.suse.com/security/cve/CVE-2018-5173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    The filename appearing in the "Downloads" panel improperly renders some Unicode characters, allowing for the file name to be spoofed. This can be used to obscure the file extension of potentially executable files from user view in the panel. Note: the dialog to open the file will show the full, correct filename and whether it is executable or not. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5173/">CVE-2018-5173</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5174" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    In the Windows 10 April 2018 Update, Windows Defender SmartScreen honors the "SEE_MASK_FLAG_NO_UI" flag associated with downloaded files and will not show any UI. Files that are unknown and potentially dangerous will be allowed to run because SmartScreen will not prompt the user for a decision, and if the user is offline all files will be allowed to be opened because Windows won't prompt the user to ask what to do. Firefox incorrectly sets this flag when downloading files, leading to less secure behavior from SmartScreen. Note: this issue only affects Windows 10 users running the April 2018 update or later. It does not affect other Windows users or other operating systems. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5175" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5175" ref_url="https://www.suse.com/security/cve/CVE-2018-5175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    A mechanism to bypass Content Security Policy (CSP) protections on sites that have a "script-src" policy of "'strict-dynamic'". If a target website contains an HTML injection flaw an attacker could inject a reference to a copy of the "require.js" library that is part of Firefox's Developer Tools, and then use a known technique using that library to bypass the CSP restrictions on executing injected scripts. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5175/">CVE-2018-5175</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5176" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5176" ref_url="https://www.suse.com/security/cve/CVE-2018-5176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including "javascript:" links. If a JSON file contains malicious JavaScript script embedded as "javascript:" links, users may be tricked into clicking and running this code in the context of the JSON Viewer. This can allow for the theft of cookies and authorization tokens which are accessible to that context. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5176/">CVE-2018-5176</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5177" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5177" ref_url="https://www.suse.com/security/cve/CVE-2018-5177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in XSLT during number formatting where a negative buffer size may be allocated in some instances, leading to a buffer overflow and crash if it occurs. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5177/">CVE-2018-5177</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5178" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5179" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5179" ref_url="https://www.suse.com/security/cve/CVE-2018-5179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3396-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3835-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00035.html" source="SUSE-SU"/>
    <description>
    A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5179/">CVE-2018-5179</cve>
	<bugzilla href="https://bugzilla.suse.com/1112111">SUSE bug 1112111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5180" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5180" ref_url="https://www.suse.com/security/cve/CVE-2018-5180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur during WebGL operations. While this results in a potentially exploitable crash, the vulnerability is limited because the memory is freed and reused in a brief window of time during the freeing of the same callstack. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5180/">CVE-2018-5180</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5181" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5181" ref_url="https://www.suse.com/security/cve/CVE-2018-5181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5181/">CVE-2018-5181</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5182" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5182" ref_url="https://www.suse.com/security/cve/CVE-2018-5182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
    <description>
    If a text string that happens to be a filename in the operating system's native format is dragged and dropped onto the addressbar the specified local file will be opened. This is contrary to policy and is what would happen if the string were the equivalent "file:" URL. This vulnerability affects Firefox &lt; 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5182/">CVE-2018-5182</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1334-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546207" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594752" comment="MozillaFirefox-translations-52.8.0esr-109.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5184" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5184" ref_url="https://www.suse.com/security/cve/CVE-2018-5184" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Using remote content in encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5184/">CVE-2018-5184</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093152">SUSE bug 1093152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5185" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5185" ref_url="https://www.suse.com/security/cve/CVE-2018-5185" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1359-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1361-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00089.html" source="SUSE-SU"/>
    <description>
    Plaintext of decrypted emails can leak through by user submitting an embedded form. This vulnerability affects Thunderbird ESR &lt; 52.8 and Thunderbird &lt; 52.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5185/">CVE-2018-5185</cve>
	<bugzilla href="https://bugzilla.suse.com/1092548">SUSE bug 1092548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092611">SUSE bug 1092611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093151">SUSE bug 1093151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093969">SUSE bug 1093969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093970">SUSE bug 1093970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093971">SUSE bug 1093971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093972">SUSE bug 1093972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093973">SUSE bug 1093973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1833-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1905-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2330-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2658-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2807-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00002.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<bugzilla href="https://bugzilla.suse.com/1098998">SUSE bug 1098998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519951" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530193" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545660" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545661" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545662" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594477" comment="MozillaFirefox-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594478" comment="MozillaFirefox-devel-52.9.0esr-109.38.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594479" comment="MozillaFirefox-translations-52.9.0esr-109.38.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5244" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5244" ref_url="https://www.suse.com/security/cve/CVE-2018-5244" source="SUSE CVE"/>
    <description>
    In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5244/">CVE-2018-5244</cve>
	<bugzilla href="https://bugzilla.suse.com/1073961">SUSE bug 1073961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074966">SUSE bug 1074966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5246" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5246" ref_url="https://www.suse.com/security/cve/CVE-2018-5246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadPATTERNImage in coders/pattern.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5246/">CVE-2018-5246</cve>
	<bugzilla href="https://bugzilla.suse.com/1074973">SUSE bug 1074973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5247" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5247" ref_url="https://www.suse.com/security/cve/CVE-2018-5247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003627.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0155-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00058.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadRLAImage in coders/rla.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5247/">CVE-2018-5247</cve>
	<bugzilla href="https://bugzilla.suse.com/1074969">SUSE bug 1074969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074975">SUSE bug 1074975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551002" comment="libMagickCore-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551003" comment="libMagickWand-6_Q16-1-6.8.8.1-71.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5248" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5248" ref_url="https://www.suse.com/security/cve/CVE-2018-5248" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.7-17 Q16, there is a heap-based buffer over-read in coders/sixel.c in the ReadSIXELImage function, related to the sixel_decode function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5248/">CVE-2018-5248</cve>
	<bugzilla href="https://bugzilla.suse.com/1074968">SUSE bug 1074968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<bugzilla href="https://bugzilla.suse.com/1075621">SUSE bug 1075621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00013.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<bugzilla href="https://bugzilla.suse.com/1075617">SUSE bug 1075617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550667" comment="kernel-default-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550668" comment="kernel-default-base-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550669" comment="kernel-default-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550670" comment="kernel-default-man-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518886" comment="kernel-devel-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518887" comment="kernel-macros-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518888" comment="kernel-source-4.4.114-92.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550671" comment="kernel-syms-4.4.114-92.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5334" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00034.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<bugzilla href="https://bugzilla.suse.com/1075737">SUSE bug 1075737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550430" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550431" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550432" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550433" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550434" comment="wireshark-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550435" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5335" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00034.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<bugzilla href="https://bugzilla.suse.com/1075738">SUSE bug 1075738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550430" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550431" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550432" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550433" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550434" comment="wireshark-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550435" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5336" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0090-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00034.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<bugzilla href="https://bugzilla.suse.com/1075739">SUSE bug 1075739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550430" comment="libwireshark8-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550431" comment="libwiretap6-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550432" comment="libwscodecs1-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550433" comment="libwsutil7-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550434" comment="wireshark-2.2.12-48.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550435" comment="wireshark-gtk-2.2.12-48.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5357" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5357" ref_url="https://www.suse.com/security/cve/CVE-2018-5357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-22 Q16 has memory leaks in the ReadDCMImage function in coders/dcm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5357/">CVE-2018-5357</cve>
	<bugzilla href="https://bugzilla.suse.com/1075821">SUSE bug 1075821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095726">SUSE bug 1095726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5358" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5358" ref_url="https://www.suse.com/security/cve/CVE-2018-5358" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.7-22 Q16 has memory leaks in the EncodeImageAttributes function in coders/json.c, as demonstrated by the ReadPSDLayersInternal function in coders/psd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5358/">CVE-2018-5358</cve>
	<bugzilla href="https://bugzilla.suse.com/1075819">SUSE bug 1075819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5378" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378</cve>
	<bugzilla href="https://bugzilla.suse.com/1079798">SUSE bug 1079798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550710" comment="libfpm_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550711" comment="libospf0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550712" comment="libospfapiclient0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550713" comment="libquagga_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550714" comment="libzebra1-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550715" comment="quagga-1.1.1-17.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5379" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379</cve>
	<bugzilla href="https://bugzilla.suse.com/1079799">SUSE bug 1079799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550710" comment="libfpm_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550711" comment="libospf0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550712" comment="libospfapiclient0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550713" comment="libquagga_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550714" comment="libzebra1-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550715" comment="quagga-1.1.1-17.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5380" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380</cve>
	<bugzilla href="https://bugzilla.suse.com/1079800">SUSE bug 1079800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550710" comment="libfpm_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550711" comment="libospf0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550712" comment="libospfapiclient0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550713" comment="libquagga_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550714" comment="libzebra1-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550715" comment="quagga-1.1.1-17.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5381" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0455-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0456-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0457-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0473-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00037.html" source="SUSE-SU"/>
    <description>
    The Quagga BGP daemon (bgpd) prior to version 1.2.3 has a bug in its parsing of "Capabilities" in BGP OPEN messages, in the bgp_packet.c:bgp_capability_msg_parse function. The parser can enter an infinite loop on invalid capabilities if a Multi-Protocol capability does not have a recognized AFI/SAFI, causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381</cve>
	<bugzilla href="https://bugzilla.suse.com/1079801">SUSE bug 1079801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550710" comment="libfpm_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550711" comment="libospf0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550712" comment="libospfapiclient0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550713" comment="libquagga_pb0-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550714" comment="libzebra1-1.1.1-17.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550715" comment="quagga-1.1.1-17.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5383" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5383" ref_url="https://www.suse.com/security/cve/CVE-2018-5383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0427-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00001.html" source="SUSE-SU"/>
    <description>
    Bluetooth firmware or operating system software drivers in macOS versions before 10.13, High Sierra and iOS versions before 11.4, and Android versions before the 2018-06-05 patch may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange, which may allow a remote attacker to obtain the encryption key used by the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5383/">CVE-2018-5383</cve>
	<bugzilla href="https://bugzilla.suse.com/1104301">SUSE bug 1104301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521632" comment="kernel-firmware-20170530-21.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521633" comment="ucode-amd-20170530-21.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006239.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00001.html" source="SUSE-SU"/>
    <description>
    In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<bugzilla href="https://bugzilla.suse.com/1094462">SUSE bug 1094462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101792">SUSE bug 1101792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522423" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552195" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522425" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522426" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548852" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548853" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548854" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548855" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595296" comment="strongswan-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522424" comment="strongswan-doc-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595297" comment="strongswan-hmac-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595298" comment="strongswan-ipsec-5.1.3-26.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595299" comment="strongswan-libs0-5.1.3-26.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390" source="SUSE CVE"/>
		<reference ref_id="BLOG-SEGMENTSMACK" ref_url="https://www.suse.com/c/suse-addresses-segmentsmack-attack/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2962-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182962-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="TID000019282" ref_url="https://www.suse.com/support/kb/doc/?id=000019282" source="SUSE-SU"/>
		<reference ref_id="TID7023243" ref_url="https://www.suse.com/support/kb/doc/?id=7023243" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2242-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
    <description>
    Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102682">SUSE bug 1102682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552439" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552440" comment="kgraft-patch-4_4_121-92_104-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552400" comment="kgraft-patch-4_4_121-92_109-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552406" comment="kgraft-patch-4_4_121-92_114-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552413" comment="kgraft-patch-4_4_121-92_117-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552416" comment="kgraft-patch-4_4_121-92_120-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552398" comment="kgraft-patch-4_4_121-92_95-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552399" comment="kgraft-patch-4_4_121-92_98-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536593" comment="kgraft-patch-4_4_103-92_53-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536592" comment="kgraft-patch-4_4_103-92_56-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536596" comment="kgraft-patch-4_4_114-92_64-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536595" comment="kgraft-patch-4_4_114-92_67-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536586" comment="kgraft-patch-4_4_120-92_70-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537370" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537409" comment="kgraft-patch-4_4_121-92_104-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536890" comment="kgraft-patch-4_4_121-92_109-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536978" comment="kgraft-patch-4_4_121-92_114-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537105" comment="kgraft-patch-4_4_121-92_117-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537162" comment="kgraft-patch-4_4_121-92_120-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536587" comment="kgraft-patch-4_4_121-92_73-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536588" comment="kgraft-patch-4_4_121-92_80-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536589" comment="kgraft-patch-4_4_121-92_85-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536585" comment="kgraft-patch-4_4_121-92_92-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536642" comment="kgraft-patch-4_4_121-92_95-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536662" comment="kgraft-patch-4_4_121-92_98-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536594" comment="kgraft-patch-4_4_74-92_38-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536591" comment="kgraft-patch-4_4_90-92_45-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536590" comment="kgraft-patch-4_4_90-92_50-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0645-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190645-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102340">SUSE bug 1102340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103097">SUSE bug 1103097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103098">SUSE bug 1103098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108654">SUSE bug 1108654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114071">SUSE bug 1114071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121102">SUSE bug 1121102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134140">SUSE bug 1134140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181460">SUSE bug 1181460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536668" comment="kgraft-patch-4_4_103-92_53-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536669" comment="kgraft-patch-4_4_103-92_56-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536663" comment="kgraft-patch-4_4_114-92_64-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536664" comment="kgraft-patch-4_4_114-92_67-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536667" comment="kgraft-patch-4_4_120-92_70-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536666" comment="kgraft-patch-4_4_121-92_73-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536665" comment="kgraft-patch-4_4_121-92_80-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536671" comment="kgraft-patch-4_4_121-92_85-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536670" comment="kgraft-patch-4_4_90-92_50-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536668" comment="kgraft-patch-4_4_103-92_53-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536669" comment="kgraft-patch-4_4_103-92_56-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536663" comment="kgraft-patch-4_4_114-92_64-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536664" comment="kgraft-patch-4_4_114-92_67-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536667" comment="kgraft-patch-4_4_120-92_70-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536666" comment="kgraft-patch-4_4_121-92_73-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536665" comment="kgraft-patch-4_4_121-92_80-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536671" comment="kgraft-patch-4_4_121-92_85-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536670" comment="kgraft-patch-4_4_90-92_50-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4050-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-12/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00052.html" source="SUSE-SU"/>
    <description>
    Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116195">SUSE bug 1116195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520373" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520374" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520375" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530330" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530331" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520376" comment="openssl-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550655" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550656" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550657" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550658" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550659" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550660" comment="openssl-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594665" comment="libopenssl-devel-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594666" comment="libopenssl1_0_0-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550657" comment="libopenssl1_0_0-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594667" comment="libopenssl1_0_0-hmac-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550659" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595376" comment="nodejs6-6.16.0-11.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594668" comment="openssl-1.0.2j-60.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530332" comment="openssl-doc-1.0.2j-60.46.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2018558213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-558213</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-558213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-558213" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-558213" ref_url="https://www.suse.com/security/cve/CVE-2018-558213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006815.html" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2018-15727. Reason: This candidate is a reservation duplicate of CVE-2018-15727. Notes: All CVE users should reference CVE-2018-15727 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-558213/">CVE-2018-558213</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595186" comment="crowbar-core-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595187" comment="crowbar-core-branding-upstream-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595188" comment="crowbar-openstack-4.0+git.1569429513.e7016b2b6-9.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595189" comment="grafana-4.6.5-1.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595190" comment="novnc-1.0.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595191" comment="openstack-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595192" comment="openstack-keystone-doc-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595193" comment="openstack-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595194" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595195" comment="openstack-neutron-doc-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595196" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595197" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595198" comment="openstack-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595199" comment="openstack-neutron-lbaas-agent-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595200" comment="openstack-neutron-lbaas-doc-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595201" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595202" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595203" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595204" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595205" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595206" comment="openstack-neutron-server-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595207" comment="openstack-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595208" comment="openstack-nova-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595209" comment="openstack-nova-cells-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595210" comment="openstack-nova-cert-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595211" comment="openstack-nova-compute-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595212" comment="openstack-nova-conductor-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595213" comment="openstack-nova-console-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595214" comment="openstack-nova-consoleauth-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595215" comment="openstack-nova-doc-14.0.11~dev13-4.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595216" comment="openstack-nova-novncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595217" comment="openstack-nova-placement-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595218" comment="openstack-nova-scheduler-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595219" comment="openstack-nova-serialproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595220" comment="openstack-nova-vncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595221" comment="openstack-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595222" comment="openstack-tempest-test-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595223" comment="python-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595224" comment="python-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595225" comment="python-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595226" comment="python-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595227" comment="python-pysaml2-4.0.2-3.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595228" comment="python-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595229" comment="python-urllib3-1.16-3.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595230" comment="ruby2.1-rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595231" comment="ruby2.1-rubygem-easy_diff-1.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595232" comment="rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595233" comment="sleshammer-aarch64-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595234" comment="sleshammer-ppc64le-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595235" comment="sleshammer-s390x-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595236" comment="sleshammer-x86_64-0.7.0-0.18.12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5683" ref_url="https://www.suse.com/security/cve/CVE-2018-5683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
    <description>
    The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5683/">CVE-2018-5683</cve>
	<bugzilla href="https://bugzilla.suse.com/1076114">SUSE bug 1076114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076116">SUSE bug 1076116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518951" comment="xen-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550721" comment="xen-doc-html-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518952" comment="xen-libs-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518953" comment="xen-libs-32bit-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550722" comment="xen-tools-4.7.4_06-43.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550723" comment="xen-tools-domU-4.7.4_06-43.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5685" ref_url="https://www.suse.com/security/cve/CVE-2018-5685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0328-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0396-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00025.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.3.27, there is an infinite loop and application hang in the ReadBMPImage function (coders/bmp.c). Remote attackers could leverage this vulnerability to cause a denial of service via an image file with a crafted bit-field mask value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5685/">CVE-2018-5685</cve>
	<bugzilla href="https://bugzilla.suse.com/1075939">SUSE bug 1075939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550590" comment="libMagickCore-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550591" comment="libMagickWand-6_Q16-1-6.8.8.1-71.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5703" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5703" ref_url="https://www.suse.com/security/cve/CVE-2018-5703" source="SUSE CVE"/>
    <description>
    The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.14.11 allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via vectors involving TLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5703/">CVE-2018-5703</cve>
	<bugzilla href="https://bugzilla.suse.com/1076200">SUSE bug 1076200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5709" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5709" ref_url="https://www.suse.com/security/cve/CVE-2018-5709" source="SUSE CVE"/>
    <description>
    An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry-&gt;n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5709/">CVE-2018-5709</cve>
	<bugzilla href="https://bugzilla.suse.com/1076229">SUSE bug 1076229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132051">SUSE bug 1132051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5710" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5710" ref_url="https://www.suse.com/security/cve/CVE-2018-5710" source="SUSE CVE"/>
    <description>
    An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The pre-defined function "strlen" is getting a "NULL" string as a parameter value in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the Key Distribution Center (KDC), which allows remote authenticated users to cause a denial of service (NULL pointer dereference) via a modified kadmin client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5710/">CVE-2018-5710</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333953" comment="krb5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0248-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0316-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00114.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0318-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00116.html" source="SUSE-SU"/>
    <description>
    gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<bugzilla href="https://bugzilla.suse.com/1076391">SUSE bug 1076391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550511" comment="gd-2.1.0-24.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5727" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727</cve>
	<bugzilla href="https://bugzilla.suse.com/1076314">SUSE bug 1076314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334148" comment="openjpeg2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0854-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00006.html" source="SUSE-SU"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550900" comment="krb5-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550901" comment="krb5-32bit-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550902" comment="krb5-client-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550903" comment="krb5-doc-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550904" comment="krb5-plugin-kdb-ldap-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550905" comment="krb5-plugin-preauth-otp-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550906" comment="krb5-plugin-preauth-pkinit-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550907" comment="krb5-server-1.12.5-40.23.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0854-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00116.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0139-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00006.html" source="SUSE-SU"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550900" comment="krb5-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550901" comment="krb5-32bit-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550902" comment="krb5-client-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550903" comment="krb5-doc-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550904" comment="krb5-plugin-kdb-ldap-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550905" comment="krb5-plugin-preauth-otp-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550906" comment="krb5-plugin-preauth-pkinit-1.12.5-40.23.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550907" comment="krb5-server-1.12.5-40.23.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0810-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0827-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00106.html" source="SUSE-SU"/>
    <description>
    Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -&gt; 4.1-ESV-R15, 4.2.0 -&gt; 4.2.8, 4.3.0 -&gt; 4.3.6, 4.4.0
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<bugzilla href="https://bugzilla.suse.com/1083302">SUSE bug 1083302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550824" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550825" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550826" comment="dhcp-relay-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550827" comment="dhcp-server-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0810-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003843.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0827-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00106.html" source="SUSE-SU"/>
    <description>
    A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -&gt; 4.1-ESV-R15, 4.2.0 -&gt; 4.2.8, 4.3.0 -&gt; 4.3.6, 4.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<bugzilla href="https://bugzilla.suse.com/1083303">SUSE bug 1083303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550824" comment="dhcp-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550825" comment="dhcp-client-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550826" comment="dhcp-relay-4.3.3-10.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550827" comment="dhcp-server-4.3.3-10.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5734" ref_url="https://www.suse.com/security/cve/CVE-2018-5734" source="SUSE CVE"/>
    <description>
    While handling a particular type of malformed packet BIND erroneously selects a SERVFAIL rcode instead of a FORMERR rcode. If the receiving view has the SERVFAIL cache feature enabled, this can trigger an assertion failure in badcache.c when the request doesn't contain all of the expected information. Affects BIND 9.10.5-S1 to 9.10.5-S4, 9.10.6-S1, 9.10.6-S2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5734/">CVE-2018-5734</cve>
	<bugzilla href="https://bugzilla.suse.com/1085417">SUSE bug 1085417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5735" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5735" ref_url="https://www.suse.com/security/cve/CVE-2018-5735" source="SUSE CVE"/>
    <description>
    The Debian backport of the fix for CVE-2017-3137 leads to assertion failure in validator.c:1858; Affects Debian versions 9.9.5.dfsg-9+deb8u15; 9.9.5.dfsg-9+deb8u18; 9.10.3.dfsg.P4-12.3+deb9u5; 9.11.5.P4+dfsg-5.1 No ISC releases are affected. Other packages from other distributions who did similar backports for the fix for 2017-3137 may also be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5735/">CVE-2018-5735</cve>
	<bugzilla href="https://bugzilla.suse.com/1018700">SUSE bug 1018700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018701">SUSE bug 1018701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018702">SUSE bug 1018702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033466">SUSE bug 1033466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081545">SUSE bug 1081545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5736" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5736" ref_url="https://www.suse.com/security/cve/CVE-2018-5736" source="SUSE CVE"/>
    <description>
    An error in zone database reference counting can lead to an assertion failure if a server which is running an affected version of BIND attempts several transfers of a slave zone in quick succession. This defect could be deliberately exercised by an attacker who is permitted to cause a vulnerable server to initiate zone transfers (for example: by sending valid NOTIFY messages), causing the named process to exit after failing the assertion test. Affects BIND 9.12.0 and 9.12.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5736/">CVE-2018-5736</cve>
	<bugzilla href="https://bugzilla.suse.com/1093448">SUSE bug 1093448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093449">SUSE bug 1093449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5737" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5737" ref_url="https://www.suse.com/security/cve/CVE-2018-5737" source="SUSE CVE"/>
    <description>
    A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off. Additionally, problematic interaction between the serve-stale feature and NSEC aggressive negative caching can in some cases cause undesirable behavior from named, such as a recursion loop or excessive logging. Deliberate exploitation of this condition could cause operational problems depending on the particular manifestation -- either degradation or denial of service. Affects BIND 9.12.0 and 9.12.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5737/">CVE-2018-5737</cve>
	<bugzilla href="https://bugzilla.suse.com/1093448">SUSE bug 1093448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093449">SUSE bug 1093449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    "deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0-&gt;9.8.8, 9.9.0-&gt;9.9.13, 9.10.0-&gt;9.10.8, 9.11.0-&gt;9.11.4, 9.12.0-&gt;9.12.2, 9.13.0-&gt;9.13.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<bugzilla href="https://bugzilla.suse.com/1104129">SUSE bug 1104129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530524" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530525" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548569" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548570" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548572" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548573" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594883" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594884" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594885" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594886" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5741" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    To provide fine-grained controls over the ability to use Dynamic DNS (DDNS) to update records in a zone, BIND 9 provides a feature called update-policy. Various rules can be configured to limit the types of updates that can be performed by a client, depending on the key used when sending the update request. Unfortunately, some rule types were not initially documented, and when documentation for them was added to the Administrator Reference Manual (ARM) in change #3112, the language that was added to the ARM at that time incorrectly described the behavior of two rule types, krb5-subdomain and ms-subdomain. This incorrect documentation could mislead operators into believing that policies they had configured were more restrictive than they actually were. This affects BIND versions prior to BIND 9.11.5 and BIND 9.12.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531096" comment="bind-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531097" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531099" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531100" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531101" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551531" comment="bind-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551532" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551533" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551534" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551535" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595659" comment="bind-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595660" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595661" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551534" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595662" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.6, 9.12.0 -&gt; 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -&gt; 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -&gt; 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<bugzilla href="https://bugzilla.suse.com/1133185">SUSE bug 1133185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530524" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530525" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548569" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548570" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548572" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548573" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594883" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594884" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594885" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594886" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5744" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5744" ref_url="https://www.suse.com/security/cve/CVE-2018-5744" source="SUSE CVE"/>
    <description>
    A failure to free memory can occur when processing messages having a specific combination of EDNS options. Versions affected are: BIND 9.10.7 -&gt; 9.10.8-P1, 9.11.3 -&gt; 9.11.5-P1, 9.12.0 -&gt; 9.12.3-P1, and versions 9.10.7-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5744/">CVE-2018-5744</cve>
	<bugzilla href="https://bugzilla.suse.com/1126066">SUSE bug 1126066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333958" comment="bind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    "managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P1, 9.12.0 -&gt; 9.12.3-P1, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<bugzilla href="https://bugzilla.suse.com/1126068">SUSE bug 1126068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177790">SUSE bug 1177790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333968" comment="bind is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530524" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530525" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548569" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548570" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548572" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548573" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594883" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594884" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594885" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594886" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0322-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00120.html" source="SUSE-SU"/>
    <description>
    qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550633" comment="libvirt-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550634" comment="libvirt-client-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550635" comment="libvirt-daemon-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550636" comment="libvirt-daemon-config-network-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550637" comment="libvirt-daemon-config-nwfilter-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550638" comment="libvirt-daemon-driver-interface-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518865" comment="libvirt-daemon-driver-libxl-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550639" comment="libvirt-daemon-driver-lxc-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550640" comment="libvirt-daemon-driver-network-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550641" comment="libvirt-daemon-driver-nodedev-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550642" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550643" comment="libvirt-daemon-driver-qemu-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550644" comment="libvirt-daemon-driver-secret-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550645" comment="libvirt-daemon-driver-storage-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550646" comment="libvirt-daemon-lxc-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550647" comment="libvirt-daemon-qemu-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518875" comment="libvirt-daemon-xen-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550648" comment="libvirt-doc-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550649" comment="libvirt-lock-sanlock-2.0.0-27.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550650" comment="libvirt-nss-2.0.0-27.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5750" ref_url="https://www.suse.com/security/cve/CVE-2018-5750" source="SUSE CVE"/>
    <description>
    The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5750/">CVE-2018-5750</cve>
	<bugzilla href="https://bugzilla.suse.com/1077892">SUSE bug 1077892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003619.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0643-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00026.html" source="SUSE-SU"/>
    <description>
    The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550416" comment="rsync-3.1.0-13.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5772" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5772" ref_url="https://www.suse.com/security/cve/CVE-2018-5772" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, there is a segmentation fault caused by uncontrolled recursion in the Exiv2::Image::printIFDStructure function in the image.cpp file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5772/">CVE-2018-5772</cve>
	<bugzilla href="https://bugzilla.suse.com/1076579">SUSE bug 1076579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1204-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00025.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, there is an uncontrolled resource consumption in the TIFFSetDirectory function of tif_dir.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tif file. This occurs because the declared number of directory entries is not validated against the actual number of directory entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784</cve>
	<bugzilla href="https://bugzilla.suse.com/1081690">SUSE bug 1081690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5785" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.0, there is an integer overflow caused by an out-of-bounds left shift in the opj_j2k_setup_encoder function (openjp2/j2k.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785</cve>
	<bugzilla href="https://bugzilla.suse.com/1076967">SUSE bug 1076967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334148" comment="openjpeg2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<bugzilla href="https://bugzilla.suse.com/1083900">SUSE bug 1083900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5814" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5814" ref_url="https://www.suse.com/security/cve/CVE-2018-5814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
    <description>
    In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5814/">CVE-2018-5814</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096480">SUSE bug 1096480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097356">SUSE bug 1097356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115339">SUSE bug 1115339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536699" comment="kgraft-patch-4_4_103-92_53-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536698" comment="kgraft-patch-4_4_103-92_56-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536701" comment="kgraft-patch-4_4_114-92_64-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536700" comment="kgraft-patch-4_4_114-92_67-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536695" comment="kgraft-patch-4_4_120-92_70-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536696" comment="kgraft-patch-4_4_121-92_73-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536697" comment="kgraft-patch-4_4_121-92_80-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536699" comment="kgraft-patch-4_4_103-92_53-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536698" comment="kgraft-patch-4_4_103-92_56-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536701" comment="kgraft-patch-4_4_114-92_64-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536700" comment="kgraft-patch-4_4_114-92_67-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536695" comment="kgraft-patch-4_4_120-92_70-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536696" comment="kgraft-patch-4_4_121-92_73-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536697" comment="kgraft-patch-4_4_121-92_80-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5950" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5950" ref_url="https://www.suse.com/security/cve/CVE-2018-5950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0800-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00090.html" source="SUSE-SU"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5950/">CVE-2018-5950</cve>
	<bugzilla href="https://bugzilla.suse.com/1077358">SUSE bug 1077358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530378" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546036" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594734" comment="mailman-2.1.17-3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5953" ref_url="https://www.suse.com/security/cve/CVE-2018-5953" source="SUSE CVE"/>
    <description>
    The swiotlb_print_info function in lib/swiotlb.c in the Linux kernel through 4.14.14 allows local users to obtain sensitive address information by reading dmesg data from a "software IO TLB" printk call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5953/">CVE-2018-5953</cve>
	<bugzilla href="https://bugzilla.suse.com/1104131">SUSE bug 1104131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5996" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5996" ref_url="https://www.suse.com/security/cve/CVE-2018-5996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0497-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00040.html" source="SUSE-SU"/>
    <description>
    Insufficient exception handling in the method NCompress::NRar3::CDecoder::Code of 7-Zip before 18.00 and p7zip can lead to multiple memory corruptions within the PPMd code, allows remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5996/">CVE-2018-5996</cve>
	<bugzilla href="https://bugzilla.suse.com/1077724">SUSE bug 1077724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550716" comment="p7zip-9.20.1-7.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0324-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-01/msg00122.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003</cve>
	<bugzilla href="https://bugzilla.suse.com/1076832">SUSE bug 1076832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334127" comment="libtasn1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1485-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2054-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00032.html" source="SUSE-SU"/>
    <description>
    A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<bugzilla href="https://bugzilla.suse.com/1095163">SUSE bug 1095163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096449">SUSE bug 1096449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519747" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530131" comment="MozillaFirefox-devel-52.8.1esr-109.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545538" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545539" comment="MozillaFirefox-devel-52.8.1esr-109.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545540" comment="MozillaFirefox-translations-52.8.1esr-109.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594430" comment="MozillaFirefox-52.8.1esr-109.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594431" comment="MozillaFirefox-devel-52.8.1esr-109.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594432" comment="MozillaFirefox-translations-52.8.1esr-109.34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6188</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6188" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6188" ref_url="https://www.suse.com/security/cve/CVE-2018-6188" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:0632-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00024.html" source="SUSE-SU"/>
    <description>
    django.contrib.auth.forms.AuthenticationForm in Django 2.0 before 2.0.2, and 1.11.8 and 1.11.9, allows remote attackers to obtain potentially sensitive information by leveraging data exposure from the confirm_login_allowed() method, as demonstrated by discovering whether a user account is inactive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6188/">CVE-2018-6188</cve>
	<bugzilla href="https://bugzilla.suse.com/1077714">SUSE bug 1077714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6196" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00028.html" source="SUSE-SU"/>
    <description>
    w3m through 0.5.3 is prone to an infinite recursion flaw in HTMLlineproc0 because the feed_table_block_tag function in table.c does not prevent a negative indent value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196</cve>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189667">SUSE bug 1189667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334559" comment="w3m is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6197" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00028.html" source="SUSE-SU"/>
    <description>
    w3m through 0.5.3 is prone to a NULL pointer dereference flaw in formUpdateBuffer in form.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197</cve>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077568">SUSE bug 1077568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189667">SUSE bug 1189667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334559" comment="w3m is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6198" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00028.html" source="SUSE-SU"/>
    <description>
    w3m through 0.5.3 does not properly handle temporary files when the ~/.w3m directory is unwritable, which allows a local attacker to craft a symlink attack to overwrite arbitrary files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198</cve>
	<bugzilla href="https://bugzilla.suse.com/1077559">SUSE bug 1077559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077572">SUSE bug 1077572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334559" comment="w3m is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6307" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0045-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0053-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00021.html" source="SUSE-SU"/>
    <description>
    LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<bugzilla href="https://bugzilla.suse.com/1120115">SUSE bug 1120115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530863" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530864" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546654" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546655" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595449" comment="libvncclient0-0.9.9-17.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595450" comment="libvncserver0-0.9.9-17.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The elf_object_p function in elfcode.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29.1, has an unsigned integer overflow because bfd_size_type multiplication is not used. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<bugzilla href="https://bugzilla.suse.com/1077745">SUSE bug 1077745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6405" ref_url="https://www.suse.com/security/cve/CVE-2018-6405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0621-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00015.html" source="SUSE-SU"/>
    <description>
    In the ReadDCMImage function in coders/dcm.c in ImageMagick before 7.0.7-23, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allows remote attackers to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6405/">CVE-2018-6405</cve>
	<bugzilla href="https://bugzilla.suse.com/1078433">SUSE bug 1078433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095726">SUSE bug 1095726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550745" comment="libMagickCore-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550746" comment="libMagickWand-6_Q16-1-6.8.8.1-71.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6412" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6412" ref_url="https://www.suse.com/security/cve/CVE-2018-6412" source="SUSE CVE"/>
    <description>
    In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6412/">CVE-2018-6412</cve>
	<bugzilla href="https://bugzilla.suse.com/1078500">SUSE bug 1078500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550701" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550702" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550703" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550704" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533165" comment="glibc-html-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533166" comment="glibc-info-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550705" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550706" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550707" comment="glibc-profile-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550708" comment="glibc-profile-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550709" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6543" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<bugzilla href="https://bugzilla.suse.com/1079103">SUSE bug 1079103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html" source="SUSE-SU"/>
    <description>
    The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550701" comment="glibc-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550702" comment="glibc-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550703" comment="glibc-devel-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550704" comment="glibc-devel-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533165" comment="glibc-html-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009518946" comment="glibc-i18ndata-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533166" comment="glibc-info-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550705" comment="glibc-locale-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550706" comment="glibc-locale-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550707" comment="glibc-profile-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550708" comment="glibc-profile-32bit-2.22-62.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550709" comment="nscd-2.22-62.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6554" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (memory consumption) by repeatedly binding an AF_IRDA socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6555" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/irda/net/af_irda.c in the Linux kernel before 4.17 allows local users to cause a denial of service (ias_object use-after-free and system crash) or possibly have unspecified other impact via an AF_IRDA socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<bugzilla href="https://bugzilla.suse.com/1106509">SUSE bug 1106509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106511">SUSE bug 1106511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6616" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.0, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<bugzilla href="https://bugzilla.suse.com/1079845">SUSE bug 1079845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334148" comment="openjpeg2 is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<bugzilla href="https://bugzilla.suse.com/1079741">SUSE bug 1079741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6764" ref_url="https://www.suse.com/security/cve/CVE-2018-6764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00011.html" source="SUSE-SU"/>
    <description>
    util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6764/">CVE-2018-6764</cve>
	<bugzilla href="https://bugzilla.suse.com/1080042">SUSE bug 1080042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550914" comment="libvirt-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550915" comment="libvirt-client-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550916" comment="libvirt-daemon-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550917" comment="libvirt-daemon-config-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550918" comment="libvirt-daemon-config-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550919" comment="libvirt-daemon-driver-interface-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519135" comment="libvirt-daemon-driver-libxl-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550920" comment="libvirt-daemon-driver-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550921" comment="libvirt-daemon-driver-network-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550922" comment="libvirt-daemon-driver-nodedev-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550923" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550924" comment="libvirt-daemon-driver-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550925" comment="libvirt-daemon-driver-secret-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550926" comment="libvirt-daemon-driver-storage-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550927" comment="libvirt-daemon-hooks-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550928" comment="libvirt-daemon-lxc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550929" comment="libvirt-daemon-qemu-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519145" comment="libvirt-daemon-xen-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550930" comment="libvirt-doc-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550931" comment="libvirt-lock-sanlock-2.0.0-27.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550932" comment="libvirt-nss-2.0.0-27.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6797" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6797" ref_url="https://www.suse.com/security/cve/CVE-2018-6797" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00075.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6797/">CVE-2018-6797</cve>
	<bugzilla href="https://bugzilla.suse.com/1082234">SUSE bug 1082234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334549" comment="perl is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545541" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545543" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594451" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594452" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00075.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798</cve>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334549" comment="perl is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545541" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545543" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594451" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594452" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6829" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6829" ref_url="https://www.suse.com/security/cve/CVE-2018-6829" source="SUSE CVE"/>
    <description>
    cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6829/">CVE-2018-6829</cve>
	<bugzilla href="https://bugzilla.suse.com/1081684">SUSE bug 1081684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334024" comment="libgcrypt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6836" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6836" ref_url="https://www.suse.com/security/cve/CVE-2018-6836" source="SUSE CVE"/>
    <description>
    The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6836/">CVE-2018-6836</cve>
	<bugzilla href="https://bugzilla.suse.com/1080229">SUSE bug 1080229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<bugzilla href="https://bugzilla.suse.com/1080556">SUSE bug 1080556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6876" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6876" ref_url="https://www.suse.com/security/cve/CVE-2018-6876" source="SUSE CVE"/>
    <description>
    The OLEProperty class in ole/oleprop.cpp in libfpx 1.3.1-10, as used in ImageMagick 7.0.7-22 Q16 and other products, allows remote attackers to cause a denial of service (stack-based buffer under-read) via a crafted bmp image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-6876/">CVE-2018-6876</cve>
	<bugzilla href="https://bugzilla.suse.com/1081305">SUSE bug 1081305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1095-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00075.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913</cve>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334549" comment="perl is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519792" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519793" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519794" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009545541" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545543" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594451" comment="perl-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545542" comment="perl-32bit-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594452" comment="perl-base-5.18.2-12.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519795" comment="perl-doc-5.18.2-12.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914</cve>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<bugzilla href="https://bugzilla.suse.com/1080757">SUSE bug 1080757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6930" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6930" ref_url="https://www.suse.com/security/cve/CVE-2018-6930" source="SUSE CVE"/>
    <description>
    A stack-based buffer over-read in the ComputeResizeImage function in the MagickCore/accelerate.c file of ImageMagick 7.0.7-22 allows a remote attacker to cause a denial of service (application crash) via a maliciously crafted pict file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6930/">CVE-2018-6930</cve>
	<bugzilla href="https://bugzilla.suse.com/1081303">SUSE bug 1081303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6942" ref_url="https://www.suse.com/security/cve/CVE-2018-6942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006839.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0704-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6942/">CVE-2018-6942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334128" comment="freetype2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" source="SUSE-SU"/>
    <description>
    systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530487" comment="libudev-devel-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551072" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551073" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551074" comment="libudev-devel-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551075" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551076" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551077" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551078" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551079" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551080" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594846" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551073" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594847" comment="libudev-devel-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594848" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551076" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594849" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551078" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594850" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594851" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7158</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7158" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0967-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00030.html" source="SUSE-SU"/>
    <description>
    The `'path'` module in the Node.js 4.x release line contains a potential regular expression denial of service (ReDoS) vector. The code in question was replaced in Node.js 6.x and later so this vulnerability only impacts all versions of Node.js 4.x. The regular expression, `splitPathRe`, used within the `'path'` module for the various path parsing functions, including `path.dirname()`, `path.extname()` and `path.parse()` was structured in such a way as to allow an attacker to craft a string, that when passed through one of these functions, could take a significant amount of time to evaluate, potentially leading to a full denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158</cve>
	<bugzilla href="https://bugzilla.suse.com/1087459">SUSE bug 1087459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594746" comment="nodejs6-6.14.1-11.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7159</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7159" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0967-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00030.html" source="SUSE-SU"/>
    <description>
    The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159</cve>
	<bugzilla href="https://bugzilla.suse.com/1087453">SUSE bug 1087453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594746" comment="nodejs6-6.14.1-11.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7160</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7160" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1209-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00030.html" source="SUSE-SU"/>
    <description>
    The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160</cve>
	<bugzilla href="https://bugzilla.suse.com/1087463">SUSE bug 1087463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182620">SUSE bug 1182620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594746" comment="nodejs6-6.14.1-11.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7161</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7161" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7161" ref_url="https://www.suse.com/security/cve/CVE-2018-7161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00021.html" source="SUSE-SU"/>
    <description>
    All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7161/">CVE-2018-7161</cve>
	<bugzilla href="https://bugzilla.suse.com/1097404">SUSE bug 1097404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7162</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7162" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7162" ref_url="https://www.suse.com/security/cve/CVE-2018-7162" source="SUSE CVE"/>
    <description>
    All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-7162/">CVE-2018-7162</cve>
	<bugzilla href="https://bugzilla.suse.com/1097538">SUSE bug 1097538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7164</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7164" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7164" ref_url="https://www.suse.com/security/cve/CVE-2018-7164" source="SUSE CVE"/>
    <description>
    Node.js versions 9.7.0 and later and 10.x are vulnerable and the severity is MEDIUM. A bug introduced in 9.7.0 increases the memory consumed when reading from the network into JavaScript using the net.Socket object directly as a stream. An attacker could use this cause a denial of service by sending tiny chunks of data in short succession. This vulnerability was restored by reverting to the prior behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-7164/">CVE-2018-7164</cve>
	<bugzilla href="https://bugzilla.suse.com/1097537">SUSE bug 1097537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7166</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7166" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7166" ref_url="https://www.suse.com/security/cve/CVE-2018-7166" source="SUSE CVE"/>
    <description>
    In all versions of Node.js 10 prior to 10.9.0, an argument processing flaw can cause `Buffer.alloc()` to return uninitialized memory. This method is intended to be safe and only return initialized, or cleared, memory. The third argument specifying `encoding` can be passed as a number, this is misinterpreted by `Buffer's` internal "fill" method as the `start` to a fill operation. This flaw may be abused where `Buffer.alloc()` arguments are derived from user input to return uncleared memory blocks that may contain sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7166/">CVE-2018-7166</cve>
	<bugzilla href="https://bugzilla.suse.com/1105018">SUSE bug 1105018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7167</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7167" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1962-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00021.html" source="SUSE-SU"/>
    <description>
    Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167</cve>
	<bugzilla href="https://bugzilla.suse.com/1097375">SUSE bug 1097375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594450" comment="nodejs6-6.14.3-11.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003805.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0667-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169</cve>
	<bugzilla href="https://bugzilla.suse.com/1081294">SUSE bug 1081294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550768" comment="shadow-4.2.1-27.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7170" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3342-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00069.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083424">SUSE bug 1083424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098531">SUSE bug 1098531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155513">SUSE bug 1155513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334545" comment="ntp is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009520262" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520263" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548351" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548352" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594619" comment="ntp-4.2.8p12-64.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594620" comment="ntp-doc-4.2.8p12-64.8.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083426">SUSE bug 1083426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334545" comment="ntp is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548186" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548187" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594428" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594429" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7183" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083417">SUSE bug 1083417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334545" comment="ntp is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548186" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548187" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594428" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594429" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7184" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083422">SUSE bug 1083422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334545" comment="ntp is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548186" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548187" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594428" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594429" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7185" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1765-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004720.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0970-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00045.html" source="SUSE-SU"/>
    <description>
    The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<bugzilla href="https://bugzilla.suse.com/1082210">SUSE bug 1082210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083420">SUSE bug 1083420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334545" comment="ntp is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519721" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519722" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548186" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548187" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594428" comment="ntp-4.2.8p11-64.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594429" comment="ntp-doc-4.2.8p11-64.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<bugzilla href="https://bugzilla.suse.com/1135603">SUSE bug 1135603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334047" comment="gdb is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7212</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7212" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7212" ref_url="https://www.suse.com/security/cve/CVE-2018-7212" source="SUSE CVE"/>
    <description>
    An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7212/">CVE-2018-7212</cve>
	<bugzilla href="https://bugzilla.suse.com/1165445">SUSE bug 1165445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009340772" comment="rubygem-sinatra is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7225" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0830-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0851-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00073.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225</cve>
	<bugzilla href="https://bugzilla.suse.com/1081493">SUSE bug 1081493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550844" comment="libvncclient0-0.9.9-17.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550845" comment="libvncserver0-0.9.9-17.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334129" comment="tigervnc is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7226" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7226" ref_url="https://www.suse.com/security/cve/CVE-2018-7226" source="SUSE CVE"/>
    <description>
    An issue was discovered in vcSetXCutTextProc() in VNConsole.c in LinuxVNC and VNCommand from the LibVNC/vncterm distribution through 0.9.10. Missing sanitization of the client-specified message length may cause integer overflow or possibly have unspecified other impact via a specially crafted VNC packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7226/">CVE-2018-7226</cve>
	<bugzilla href="https://bugzilla.suse.com/1082799">SUSE bug 1082799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334323" comment="LibVNCServer is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7253" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253</cve>
	<bugzilla href="https://bugzilla.suse.com/1081692">SUSE bug 1081692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7254" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254</cve>
	<bugzilla href="https://bugzilla.suse.com/1081693">SUSE bug 1081693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334120" comment="wavpack is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7320" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7321" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7322" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7324" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7325" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2188-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00005.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7326" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7327" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7328" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7329" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7330" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7331" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7332" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7333" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7334" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the UMTS MAC dissector could crash. This was addressed in epan/dissectors/packet-umts_mac.c by rejecting a certain reserved value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7335" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the IEEE 802.11 dissector could crash. This was addressed in epan/crypt/airpdcap.c by rejecting lengths that are too small.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7336" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the FCP protocol dissector could crash. This was addressed in epan/dissectors/packet-fcp.c by checking for a NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7337" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.4.0 to 2.4.4, the DOCSIS protocol dissector could crash. This was addressed in plugins/docsis/packet-docsis.c by removing the recursive algorithm that had been used for concatenated PDUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7408</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7408" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7408" ref_url="https://www.suse.com/security/cve/CVE-2018-7408" source="SUSE CVE"/>
    <description>
    An issue was discovered in an npm 5.7.0 2018-02-21 pre-release (marked as "next: 5.7.0" and therefore automatically installed by an "npm upgrade -g npm" command, and also announced in the vendor's blog without mention of pre-release status). It might allow local users to bypass intended filesystem access restrictions because ownerships of /etc and /usr directories are being changed unexpectedly, related to a "correctMkdir" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7408/">CVE-2018-7408</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334390" comment="nodejs6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7409" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00050.html" source="SUSE-SU"/>
    <description>
    In unixODBC before 2.3.5, there is a buffer overflow in the unicode_to_ansi_copy() function in DriverManager/__info.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409</cve>
	<bugzilla href="https://bugzilla.suse.com/1082290">SUSE bug 1082290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334562" comment="unixODBC is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7417" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the IPMI dissector could crash. This was addressed in epan/dissectors/packet-ipmi-picmg.c by adding support for crafted packets that lack an IPMI header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7419" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the NBAP dissector could crash. This was addressed in epan/dissectors/asn1/nbap/nbap.cnf by ensuring DCH ID initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7420" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the pcapng file parser could crash. This was addressed in wiretap/pcapng.c by adding a block-size check for sysdig event blocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7421" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003868.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0540-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-02/msg00104.html" source="SUSE-SU"/>
    <description>
    In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the DMP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dmp.c by correctly supporting a bounded number of Security Categories for a DMP Security Classification.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<bugzilla href="https://bugzilla.suse.com/1082692">SUSE bug 1082692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550828" comment="libwireshark8-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550829" comment="libwiretap6-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550830" comment="libwscodecs1-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550831" comment="libwsutil7-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550832" comment="wireshark-2.2.13-48.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550833" comment="wireshark-gtk-2.2.13-48.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7443" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7443" ref_url="https://www.suse.com/security/cve/CVE-2018-7443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-23 Q16 does not properly validate the amount of image data in a file, which allows remote attackers to cause a denial of service (memory allocation failure in the AcquireMagickMemory function in MagickCore/memory.c).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7443/">CVE-2018-7443</cve>
	<bugzilla href="https://bugzilla.suse.com/1075944">SUSE bug 1075944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082792">SUSE bug 1082792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7456" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
    <description>
    A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF information, a different vulnerability than CVE-2017-18013. (This affects an earlier part of the TIFFPrintDirectory function that was not addressed by the CVE-2017-18013 patch.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<bugzilla href="https://bugzilla.suse.com/1074317">SUSE bug 1074317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082825">SUSE bug 1082825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7470" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7470" ref_url="https://www.suse.com/security/cve/CVE-2018-7470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in ImageMagick 7.0.7-22 Q16. The IsWEBPImageLossless function in coders/webp.c allows attackers to cause a denial of service (segmentation violation) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7470/">CVE-2018-7470</cve>
	<bugzilla href="https://bugzilla.suse.com/1082837">SUSE bug 1082837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480</cve>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7485" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1845-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00050.html" source="SUSE-SU"/>
    <description>
    The SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c in unixODBC 2.3.5 has strncpy arguments in the wrong order, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485</cve>
	<bugzilla href="https://bugzilla.suse.com/1082484">SUSE bug 1082484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334562" comment="unixODBC is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<bugzilla href="https://bugzilla.suse.com/1082962">SUSE bug 1082962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530132" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530133" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530134" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530138" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550418" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550419" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550420" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550422" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594433" comment="kernel-default-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594434" comment="kernel-default-base-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594435" comment="kernel-default-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550421" comment="kernel-default-man-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530135" comment="kernel-devel-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530136" comment="kernel-macros-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530137" comment="kernel-source-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594436" comment="kernel-syms-4.4.121-92.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530139" comment="kgraft-patch-4_4_121-92_85-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7536</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7536" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7536" ref_url="https://www.suse.com/security/cve/CVE-2018-7536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004226.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0651-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7536/">CVE-2018-7536</cve>
	<bugzilla href="https://bugzilla.suse.com/1083304">SUSE bug 1083304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594740" comment="python-Django-1.8.19-3.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7537</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7537" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7537" ref_url="https://www.suse.com/security/cve/CVE-2018-7537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004226.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0651-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0824-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0826-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00105.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7537/">CVE-2018-7537</cve>
	<bugzilla href="https://bugzilla.suse.com/1083305">SUSE bug 1083305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594740" comment="python-Django-1.8.19-3.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550943" comment="xen-doc-html-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550944" comment="xen-tools-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550945" comment="xen-tools-domU-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009519157" comment="xen-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550943" comment="xen-doc-html-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519158" comment="xen-libs-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519159" comment="xen-libs-32bit-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550944" comment="xen-tools-4.7.5_02-43.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550945" comment="xen-tools-domU-4.7.5_02-43.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542</cve>
	<bugzilla href="https://bugzilla.suse.com/1080634">SUSE bug 1080634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7544" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5VK3H4AGK4ZRCLIB2D3IB7SS5RI4AZK/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544</cve>
	<bugzilla href="https://bugzilla.suse.com/1085803">SUSE bug 1085803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334565" comment="openvpn is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7548" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7548" ref_url="https://www.suse.com/security/cve/CVE-2018-7548" source="SUSE CVE"/>
    <description>
    In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7548/">CVE-2018-7548</cve>
	<bugzilla href="https://bugzilla.suse.com/1082981">SUSE bug 1082981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339511" comment="zsh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7549" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7549" ref_url="https://www.suse.com/security/cve/CVE-2018-7549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00073.html" source="SUSE-SU"/>
    <description>
    In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7549/">CVE-2018-7549</cve>
	<bugzilla href="https://bugzilla.suse.com/1082991">SUSE bug 1082991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334085" comment="zsh is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00060.html" source="SUSE-SU"/>
    <description>
    The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550846" comment="qemu-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009533289" comment="qemu-arm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550847" comment="qemu-block-curl-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550848" comment="qemu-block-rbd-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550849" comment="qemu-block-ssh-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550850" comment="qemu-guest-agent-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519065" comment="qemu-ipxe-1.0.0-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550851" comment="qemu-kvm-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550852" comment="qemu-lang-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550853" comment="qemu-ppc-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550854" comment="qemu-s390-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519067" comment="qemu-seabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519068" comment="qemu-sgabios-8-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550855" comment="qemu-tools-2.6.2-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519070" comment="qemu-vgabios-1.9.1-41.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519071" comment="qemu-x86-2.6.2-41.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0848-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0991-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0998-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1003-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1016-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1026-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1030-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1035-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<bugzilla href="https://bugzilla.suse.com/1083483">SUSE bug 1083483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083488">SUSE bug 1083488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009536741" comment="kgraft-patch-4_4_103-92_53-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536740" comment="kgraft-patch-4_4_103-92_56-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536736" comment="kgraft-patch-4_4_114-92_64-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536742" comment="kgraft-patch-4_4_114-92_67-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536735" comment="kgraft-patch-4_4_59-92_17-default-10-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536745" comment="kgraft-patch-4_4_59-92_20-default-10-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536734" comment="kgraft-patch-4_4_59-92_24-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536738" comment="kgraft-patch-4_4_74-92_29-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536739" comment="kgraft-patch-4_4_74-92_32-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536737" comment="kgraft-patch-4_4_74-92_35-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536746" comment="kgraft-patch-4_4_74-92_38-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536743" comment="kgraft-patch-4_4_90-92_45-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536744" comment="kgraft-patch-4_4_90-92_50-default-5-2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<bugzilla href="https://bugzilla.suse.com/1086788">SUSE bug 1086788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<bugzilla href="https://bugzilla.suse.com/1083532">SUSE bug 1083532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7570" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The assign_file_positions_for_non_load_sections function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an ELF file with a RELRO segment that lacks a matching LOAD segment, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<bugzilla href="https://bugzilla.suse.com/1083528">SUSE bug 1083528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<bugzilla href="https://bugzilla.suse.com/1086786">SUSE bug 1086786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128518">SUSE bug 1128518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<bugzilla href="https://bugzilla.suse.com/1086784">SUSE bug 1086784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7648" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7648" ref_url="https://www.suse.com/security/cve/CVE-2018-7648" source="SUSE CVE"/>
    <description>
    An issue was discovered in mj2/opj_mj2_extract.c in OpenJPEG 2.3.0. The output prefix was not checked for length, which could overflow a buffer, when providing a prefix with 50 or more characters on the command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7648/">CVE-2018-7648</cve>
	<bugzilla href="https://bugzilla.suse.com/1083901">SUSE bug 1083901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004582.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2739-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2881-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00079.html" source="SUSE-SU"/>
    <description>
    The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334131" comment="libzypp is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530245" comment="libzypp-16.17.20-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530246" comment="zypper-1.13.45-18.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550536" comment="libzypp-16.17.20-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550537" comment="zypper-1.13.45-18.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594560" comment="libzypp-16.17.20-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594561" comment="zypper-1.13.45-18.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530247" comment="zypper-log-1.13.45-18.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7728" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00064.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. XMPFiles/source/FileHandlers/TIFF_Handler.cpp mishandles a case of a zero length, leading to a heap-based buffer over-read in the MD5Update() function in third-party/zuid/interfaces/MD5.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728</cve>
	<bugzilla href="https://bugzilla.suse.com/1085297">SUSE bug 1085297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334563" comment="exempi is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7729" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7729" ref_url="https://www.suse.com/security/cve/CVE-2018-7729" source="SUSE CVE"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. There is a stack-based buffer over-read in the PostScript_MetaHandler::ParsePSFile() function in XMPFiles/source/FileHandlers/PostScript_Handler.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7729/">CVE-2018-7729</cve>
	<bugzilla href="https://bugzilla.suse.com/1085296">SUSE bug 1085296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334096" comment="exempi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7730" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004783.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0732-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-03/msg00064.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. A certain case of a 0xffffffff length is mishandled in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp, leading to a heap-based buffer over-read in the PSD_MetaHandler::CacheFileData() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<bugzilla href="https://bugzilla.suse.com/1085295">SUSE bug 1085295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103718">SUSE bug 1103718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334563" comment="exempi is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7731" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7731" ref_url="https://www.suse.com/security/cve/CVE-2018-7731" source="SUSE CVE"/>
    <description>
    An issue was discovered in Exempi through 2.4.4. XMPFiles/source/FormatSupport/WEBP_Support.cpp does not check whether a bitstream has a NULL value, leading to a NULL pointer dereference in the WEBP::VP8XChunk class.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7731/">CVE-2018-7731</cve>
	<bugzilla href="https://bugzilla.suse.com/1085294">SUSE bug 1085294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085585">SUSE bug 1085585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334096" comment="exempi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-08/msg00007.html" source="SUSE-SU"/>
    <description>
    In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530795" comment="libblkid1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530796" comment="libblkid1-32bit-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530797" comment="libfdisk1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530798" comment="libmount1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530799" comment="libmount1-32bit-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530800" comment="libsmartcols1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530801" comment="libuuid1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530802" comment="libuuid1-32bit-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530803" comment="python-libmount-2.28-44.18.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530804" comment="util-linux-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530805" comment="util-linux-lang-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530806" comment="util-linux-systemd-2.28-44.18.25 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530807" comment="uuidd-2.28-44.18.25 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551326" comment="libblkid1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551327" comment="libblkid1-32bit-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551328" comment="libfdisk1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551329" comment="libmount1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551330" comment="libmount1-32bit-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551331" comment="libsmartcols1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551332" comment="libuuid1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551333" comment="libuuid1-32bit-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551334" comment="python-libmount-2.28-44.18.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551335" comment="util-linux-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530805" comment="util-linux-lang-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551336" comment="util-linux-systemd-2.28-44.18.25 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551337" comment="uuidd-2.28-44.18.25 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595366" comment="libblkid1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551327" comment="libblkid1-32bit-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595367" comment="libfdisk1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595368" comment="libmount1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551330" comment="libmount1-32bit-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595369" comment="libsmartcols1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595370" comment="libuuid1-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551333" comment="libuuid1-32bit-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595371" comment="python-libmount-2.28-44.18.38 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595372" comment="util-linux-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530805" comment="util-linux-lang-2.28-44.18.18 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595373" comment="util-linux-systemd-2.28-44.18.25 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595374" comment="uuidd-2.28-44.18.25 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0972-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<bugzilla href="https://bugzilla.suse.com/1084353">SUSE bug 1084353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7750</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7750" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7750" ref_url="https://www.suse.com/security/cve/CVE-2018-7750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0873-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004596.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7750/">CVE-2018-7750</cve>
	<bugzilla href="https://bugzilla.suse.com/1085276">SUSE bug 1085276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111151">SUSE bug 1111151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594737" comment="python-paramiko-2.0.8-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7755" ref_url="https://www.suse.com/security/cve/CVE-2018-7755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7755/">CVE-2018-7755</cve>
	<bugzilla href="https://bugzilla.suse.com/1084513">SUSE bug 1084513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7757" ref_url="https://www.suse.com/security/cve/CVE-2018-7757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00033.html" source="SUSE-SU"/>
    <description>
    Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7757/">CVE-2018-7757</cve>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087209">SUSE bug 1087209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
    <description>
    Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530823" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530824" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530826" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530827" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530829" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530830" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530833" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551351" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551352" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551353" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551354" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551356" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537310" comment="qemu-ppc-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551358" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595404" comment="qemu-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595405" comment="qemu-block-curl-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530825" comment="qemu-block-rbd-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595406" comment="qemu-block-ssh-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595407" comment="qemu-guest-agent-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530828" comment="qemu-ipxe-1.0.0-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551355" comment="qemu-kvm-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595408" comment="qemu-lang-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551357" comment="qemu-s390-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530831" comment="qemu-seabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530832" comment="qemu-sgabios-8-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595409" comment="qemu-tools-2.6.2-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530834" comment="qemu-vgabios-1.9.1-41.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530835" comment="qemu-x86-2.6.2-41.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7999" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003860.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0883-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00002.html" source="SUSE-SU"/>
    <description>
    In libgraphite2 in graphite2 1.3.11, a NULL pointer dereference vulnerability was found in Segment.cpp during a dumbRendering operation, which may allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .ttf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999</cve>
	<bugzilla href="https://bugzilla.suse.com/1084850">SUSE bug 1084850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550912" comment="libgraphite2-3-1.3.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550913" comment="libgraphite2-3-32bit-1.3.1-10.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8007</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8007" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8007" ref_url="https://www.suse.com/security/cve/CVE-2018-8007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004569.html" source="SUSE-SU"/>
    <description>
    Apache CouchDB administrative users can configure the database server via HTTP(S). Due to insufficient validation of administrator-supplied configuration settings via the HTTP API, it is possible for a CouchDB administrator user to escalate their privileges to that of the operating system's user that CouchDB runs under, by bypassing the blacklist of configuration settings that are not allowed to be modified via the HTTP API. This privilege escalation effectively allows an existing CouchDB admin user to gain arbitrary remote code execution, bypassing already disclosed CVE-2017-12636. Mitigation: All users should upgrade to CouchDB releases 1.7.2 or 2.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8007/">CVE-2018-8007</cve>
	<bugzilla href="https://bugzilla.suse.com/1100973">SUSE bug 1100973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104204">SUSE bug 1104204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119720">SUSE bug 1119720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594494" comment="couchdb-1.7.2-2.8.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8019</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8019" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8019" ref_url="https://www.suse.com/security/cve/CVE-2018-8019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005314.html" source="SUSE-SU"/>
    <description>
    When using an OCSP responder Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 did not correctly handle invalid responses. This allowed for revoked client certificates to be incorrectly identified. It was therefore possible for users to authenticate with revoked certificates when using mutual TLS. Users not using OCSP checks are not affected by this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8019/">CVE-2018-8019</cve>
	<bugzilla href="https://bugzilla.suse.com/1103348">SUSE bug 1103348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334656" comment="libtcnative-1-0 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8020</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8020" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8020" ref_url="https://www.suse.com/security/cve/CVE-2018-8020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005314.html" source="SUSE-SU"/>
    <description>
    Apache Tomcat Native 1.2.0 to 1.2.16 and 1.1.23 to 1.1.34 has a flaw that does not properly check OCSP pre-produced responses, which are lists (multiple entries) of certificate statuses. Subsequently, revoked client certificates may not be properly identified, allowing for users to authenticate with revoked certificates to connections that require mutual TLS. Users not using OCSP checks are not affected by this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8020/">CVE-2018-8020</cve>
	<bugzilla href="https://bugzilla.suse.com/1103347">SUSE bug 1103347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334656" comment="libtcnative-1-0 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8032" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004668.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3218-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00038.html" source="SUSE-SU"/>
    <description>
    Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032</cve>
	<bugzilla href="https://bugzilla.suse.com/1103658">SUSE bug 1103658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334475" comment="axis is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8043" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0972-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<bugzilla href="https://bugzilla.suse.com/1084829">SUSE bug 1084829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8048</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8048" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8048" ref_url="https://www.suse.com/security/cve/CVE-2018-8048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005837.html" source="SUSE-SU"/>
    <description>
    In the Loofah gem through 2.2.0 for Ruby, non-whitelisted HTML attributes may occur in sanitized output by republishing a crafted HTML fragment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8048/">CVE-2018-8048</cve>
	<bugzilla href="https://bugzilla.suse.com/1085967">SUSE bug 1085967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086598">SUSE bug 1086598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595118" comment="ruby2.1-rubygem-loofah-2.0.2-3.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8086" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8086" ref_url="https://www.suse.com/security/cve/CVE-2018-8086" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-8086/">CVE-2018-8086</cve>
	<bugzilla href="https://bugzilla.suse.com/1085008">SUSE bug 1085008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0786-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0781-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00054.html" source="SUSE-SU"/>
    <description>
    Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087</cve>
	<bugzilla href="https://bugzilla.suse.com/1085053">SUSE bug 1085053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550818" comment="kernel-default-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550819" comment="kernel-default-base-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550820" comment="kernel-default-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550821" comment="kernel-default-man-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519042" comment="kernel-devel-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519043" comment="kernel-macros-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009519044" comment="kernel-source-4.4.120-92.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550822" comment="kernel-syms-4.4.120-92.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8518" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8518" ref_url="https://www.suse.com/security/cve/CVE-2018-8518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8480, CVE-2018-8488, CVE-2018-8498.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-8518/">CVE-2018-8518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8523" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8523" ref_url="https://www.suse.com/security/cve/CVE-2018-8523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-8523/">CVE-2018-8523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1426-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html" source="SUSE-SU"/>
    <description>
    In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740</cve>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8769" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8769" ref_url="https://www.suse.com/security/cve/CVE-2018-8769" source="SUSE CVE"/>
    <description>
    elfutils 0.170 has a buffer over-read in the ebl_dynamic_tag_name function of libebl/ebldynamictagname.c because SYMTAB_SHNDX is unsupported.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8769/">CVE-2018-8769</cve>
	<bugzilla href="https://bugzilla.suse.com/1085809">SUSE bug 1085809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777</cve>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778</cve>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779</cve>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780</cve>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090643">SUSE bug 1090643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090646">SUSE bug 1090646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536459" comment="kgraft-patch-4_4_103-92_53-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536458" comment="kgraft-patch-4_4_103-92_56-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536465" comment="kgraft-patch-4_4_114-92_64-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536464" comment="kgraft-patch-4_4_114-92_67-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536455" comment="kgraft-patch-4_4_120-92_70-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536466" comment="kgraft-patch-4_4_59-92_20-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536467" comment="kgraft-patch-4_4_59-92_24-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536461" comment="kgraft-patch-4_4_74-92_29-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536460" comment="kgraft-patch-4_4_74-92_32-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536463" comment="kgraft-patch-4_4_74-92_35-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536462" comment="kgraft-patch-4_4_74-92_38-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536457" comment="kgraft-patch-4_4_90-92_45-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536456" comment="kgraft-patch-4_4_90-92_50-default-7-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8804" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8804" ref_url="https://www.suse.com/security/cve/CVE-2018-8804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0893-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-04/msg00012.html" source="SUSE-SU"/>
    <description>
    WriteEPTImage in coders/ept.c in ImageMagick 7.0.7-25 Q16 allows remote attackers to cause a denial of service (MagickCore/memory.c double free and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8804/">CVE-2018-8804</cve>
	<bugzilla href="https://bugzilla.suse.com/1086011">SUSE bug 1086011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550910" comment="libMagickCore-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550911" comment="libMagickWand-6_Q16-1-6.8.8.1-71.47.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1048-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1217-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00099.html" source="SUSE-SU"/>
    <description>
    Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<bugzilla href="https://bugzilla.suse.com/1086162">SUSE bug 1086162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="TID000019188" ref_url="https://www.suse.com/support/kb/doc/?id=000019188" source="SUSE-SU"/>
		<reference ref_id="TID7022916" ref_url="https://www.suse.com/support/kb/doc/?id=7022916" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00059.html" source="SUSE-SU"/>
    <description>
    A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093522">SUSE bug 1093522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100835">SUSE bug 1100835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530379" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530380" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530381" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530385" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530387" comment="xen-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530388" comment="xen-doc-html-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530389" comment="xen-libs-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530390" comment="xen-libs-32bit-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530391" comment="xen-tools-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530392" comment="xen-tools-domU-4.7.5_02-43.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550970" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550971" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550972" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550974" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536459" comment="kgraft-patch-4_4_103-92_53-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536458" comment="kgraft-patch-4_4_103-92_56-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536465" comment="kgraft-patch-4_4_114-92_64-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536464" comment="kgraft-patch-4_4_114-92_67-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536455" comment="kgraft-patch-4_4_120-92_70-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536466" comment="kgraft-patch-4_4_59-92_20-default-12-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536467" comment="kgraft-patch-4_4_59-92_24-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536461" comment="kgraft-patch-4_4_74-92_29-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536460" comment="kgraft-patch-4_4_74-92_32-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536463" comment="kgraft-patch-4_4_74-92_35-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536462" comment="kgraft-patch-4_4_74-92_38-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536457" comment="kgraft-patch-4_4_90-92_45-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536456" comment="kgraft-patch-4_4_90-92_50-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530387" comment="xen-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530388" comment="xen-doc-html-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530389" comment="xen-libs-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530390" comment="xen-libs-32bit-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530391" comment="xen-tools-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530392" comment="xen-tools-domU-4.7.5_02-43.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594741" comment="kernel-default-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594742" comment="kernel-default-base-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594743" comment="kernel-default-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550973" comment="kernel-default-man-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530382" comment="kernel-devel-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530383" comment="kernel-macros-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530384" comment="kernel-source-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594744" comment="kernel-syms-4.4.121-92.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530386" comment="kgraft-patch-4_4_121-92_73-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530387" comment="xen-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530388" comment="xen-doc-html-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530389" comment="xen-libs-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530390" comment="xen-libs-32bit-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530391" comment="xen-tools-4.7.5_02-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530392" comment="xen-tools-domU-4.7.5_02-43.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8905" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1834-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00017.html" source="SUSE-SU"/>
    <description>
    In LibTIFF 4.0.9, a heap-based buffer overflow occurs in the function LZWDecodeCompat in tif_lzw.c via a crafted TIFF file, as demonstrated by tiff2ps.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<bugzilla href="https://bugzilla.suse.com/1086408">SUSE bug 1086408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3170-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3207-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3323-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
    <description>
    The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<bugzilla href="https://bugzilla.suse.com/1086608">SUSE bug 1086608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009520243" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009545846" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594618" comment="binutils-2.31-9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8956" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551502" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551503" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595639" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595640" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8960" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8960" ref_url="https://www.suse.com/security/cve/CVE-2018-8960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-26 Q16 does not properly restrict memory allocation, leading to a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8960/">CVE-2018-8960</cve>
	<bugzilla href="https://bugzilla.suse.com/1086782">SUSE bug 1086782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8976" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8976" ref_url="https://www.suse.com/security/cve/CVE-2018-8976" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, jpgimage.cpp allows remote attackers to cause a denial of service (image.cpp Exiv2::Internal::stringFormat out-of-bounds read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8976/">CVE-2018-8976</cve>
	<bugzilla href="https://bugzilla.suse.com/1086810">SUSE bug 1086810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9055" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005972.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1440-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-05/msg00108.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.14 allows denial of service via a reachable assertion in the function jpc_firstone in libjasper/jpc/jpc_math.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055</cve>
	<bugzilla href="https://bugzilla.suse.com/1087020">SUSE bug 1087020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334493" comment="jasper is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9056" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9056" ref_url="https://www.suse.com/security/cve/CVE-2018-9056" source="SUSE CVE"/>
    <description>
    Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-9056/">CVE-2018-9056</cve>
	<bugzilla href="https://bugzilla.suse.com/1087110">SUSE bug 1087110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9133" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9133" ref_url="https://www.suse.com/security/cve/CVE-2018-9133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1860-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00055.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.7-26 Q16 has excessive iteration in the DecodeLabImage and EncodeLabImage functions (coders/tiff.c), which results in a hang (tens of minutes) with a tiny PoC file. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted tiff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9133/">CVE-2018-9133</cve>
	<bugzilla href="https://bugzilla.suse.com/1087820">SUSE bug 1087820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9135" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1205-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.7-24 Q16, there is a heap-based buffer over-read in IsWEBPImageLossless in coders/webp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135</cve>
	<bugzilla href="https://bugzilla.suse.com/1087825">SUSE bug 1087825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9138" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9138" ref_url="https://www.suse.com/security/cve/CVE-2018-9138" source="SUSE CVE"/>
    <description>
    An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.29 and 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_nested_args, demangle_args, do_arg, and do_type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9138/">CVE-2018-9138</cve>
	<bugzilla href="https://bugzilla.suse.com/1088016">SUSE bug 1088016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9144" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9144" ref_url="https://www.suse.com/security/cve/CVE-2018-9144" source="SUSE CVE"/>
    <description>
    In Exiv2 0.26, there is an out-of-bounds read in Exiv2::Internal::binaryToString in image.cpp. It could result in denial of service or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9144/">CVE-2018-9144</cve>
	<bugzilla href="https://bugzilla.suse.com/1087877">SUSE bug 1087877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9145" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9145" ref_url="https://www.suse.com/security/cve/CVE-2018-9145" source="SUSE CVE"/>
    <description>
    In the DataBuf class in include/exiv2/types.hpp in Exiv2 0.26, an issue exists in the constructor with an initial buffer size. A large size value may lead to a SIGABRT during an attempt at memory allocation. NOTE: some third parties have been unable to reproduce the SIGABRT when using the 4-DataBuf-abort-1 PoC file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9145/">CVE-2018-9145</cve>
	<bugzilla href="https://bugzilla.suse.com/1087879">SUSE bug 1087879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9154" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1420-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00065.html" source="SUSE-SU"/>
    <description>
    There is a reachable abort in the function jpc_dec_process_sot in libjasper/jpc/jpc_dec.c of JasPer 2.0.14 that will lead to a remote denial of service attack by triggering an unexpected jas_alloc2 return value, a different vulnerability than CVE-2017-13745.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154</cve>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334493" comment="jasper is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9234" ref_url="https://www.suse.com/security/cve/CVE-2018-9234" source="SUSE CVE"/>
    <description>
    GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-9234/">CVE-2018-9234</cve>
	<bugzilla href="https://bugzilla.suse.com/1088255">SUSE bug 1088255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333951" comment="gpg2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9252" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1517-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00085.html" source="SUSE-SU"/>
    <description>
    JasPer 2.0.14 allows denial of service via a reachable assertion in the function jpc_abstorelstepsize in libjasper/jpc/jpc_enc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252</cve>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178702">SUSE bug 1178702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334493" comment="jasper is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9305" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0482-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00009.html" source="SUSE-SU"/>
    <description>
    In Exiv2 0.26, an out-of-bounds read in IptcData::printStructure in iptc.c could result in a crash or information leak, related to the "== 0x1c" case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305</cve>
	<bugzilla href="https://bugzilla.suse.com/1088424">SUSE bug 1088424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9306" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9306" ref_url="https://www.suse.com/security/cve/CVE-2018-9306" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2017-17724.  Reason: This candidate is a reservation duplicate of CVE-2017-17724.  Notes: All CVE users should reference CVE-2017-17724 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-9306/">CVE-2018-9306</cve>
	<bugzilla href="https://bugzilla.suse.com/1088425">SUSE bug 1088425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333963" comment="exiv2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9336" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9336" ref_url="https://www.suse.com/security/cve/CVE-2018-9336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00011.html" source="SUSE-SU"/>
    <description>
    openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9336/">CVE-2018-9336</cve>
	<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090839">SUSE bug 1090839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334133" comment="openvpn is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2738-1" ref_url="https://lists.opensuse.org/opensuse-updates/2018-09/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-10/msg00020.html" source="SUSE-SU"/>
    <description>
    In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105292">SUSE bug 1105292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105293">SUSE bug 1105293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530295" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530296" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530297" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530301" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550574" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550575" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550576" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550578" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536620" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594614" comment="kernel-default-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594615" comment="kernel-default-base-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594616" comment="kernel-default-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550577" comment="kernel-default-man-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530298" comment="kernel-devel-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530299" comment="kernel-macros-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530300" comment="kernel-source-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594617" comment="kernel-syms-4.4.121-92.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530302" comment="kgraft-patch-4_4_121-92_95-default-1-3.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530303" comment="lttng-modules-2.7.1-9.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530304" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.95-9.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9385" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-07/msg00036.html" source="SUSE-SU"/>
    <description>
    In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<bugzilla href="https://bugzilla.suse.com/1100491">SUSE bug 1100491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530195" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530196" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530197" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530201" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009550501" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550502" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550503" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550505" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594482" comment="kernel-default-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594483" comment="kernel-default-base-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594484" comment="kernel-default-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009550504" comment="kernel-default-man-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530198" comment="kernel-devel-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530199" comment="kernel-macros-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530200" comment="kernel-source-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594485" comment="kernel-syms-4.4.121-92.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530202" comment="kgraft-patch-4_4_121-92_92-default-1-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530203" comment="lttng-modules-2.7.1-9.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530204" comment="lttng-modules-kmp-default-2.7.1_k4.4.121_92.92-9.4.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9516" ref_url="https://www.suse.com/security/cve/CVE-2018-9516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3817-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html" source="SUSE-SU"/>
    <description>
    In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9516/">CVE-2018-9516</cve>
	<bugzilla href="https://bugzilla.suse.com/1108498">SUSE bug 1108498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9517" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9517" ref_url="https://www.suse.com/security/cve/CVE-2018-9517" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-9517/">CVE-2018-9517</cve>
	<bugzilla href="https://bugzilla.suse.com/1108488">SUSE bug 1108488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9568" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
    <description>
    In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<bugzilla href="https://bugzilla.suse.com/1118319">SUSE bug 1118319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118320">SUSE bug 1118320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9918" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9918" ref_url="https://www.suse.com/security/cve/CVE-2018-9918" source="SUSE CVE"/>
    <description>
    libqpdf.a in QPDF through 8.0.2 mishandles certain "expected dictionary key but found non-name object" cases, allowing remote attackers to cause a denial of service (stack exhaustion), related to the QPDFObjectHandle and QPDF_Dictionary classes, because nesting in direct objects is not restricted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9918/">CVE-2018-9918</cve>
	<bugzilla href="https://bugzilla.suse.com/1089090">SUSE bug 1089090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334502" comment="qpdf is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9996" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9996" ref_url="https://www.suse.com/security/cve/CVE-2018-9996" source="SUSE CVE"/>
    <description>
    An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9996/">CVE-2018-9996</cve>
	<bugzilla href="https://bugzilla.suse.com/1089050">SUSE bug 1089050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0136" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0136" ref_url="https://www.suse.com/security/cve/CVE-2019-0136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
    <description>
    Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0136/">CVE-2019-0136</cve>
	<bugzilla href="https://bugzilla.suse.com/1193157">SUSE bug 1193157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199615">SUSE bug 1199615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199616">SUSE bug 1199616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0154" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0196" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0196" ref_url="https://www.suse.com/security/cve/CVE-2019-0196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0196/">CVE-2019-0196</cve>
	<bugzilla href="https://bugzilla.suse.com/1131237">SUSE bug 1131237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530886" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530888" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530889" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530890" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530891" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551417" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551418" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551419" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551420" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551421" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595512" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595513" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595514" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595515" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595516" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0197" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0197" ref_url="https://www.suse.com/security/cve/CVE-2019-0197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set "H2Upgrade on" are unaffected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-0197/">CVE-2019-0197</cve>
	<bugzilla href="https://bugzilla.suse.com/1131245">SUSE bug 1131245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530886" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530888" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530889" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530890" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530891" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551417" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551418" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551419" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551420" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551421" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595512" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595513" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595514" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595515" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595516" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0201</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0201" ref_url="https://www.suse.com/security/cve/CVE-2019-0201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006781.html" source="SUSE-SU"/>
    <description>
    An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper’s getACL() command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0201/">CVE-2019-0201</cve>
	<bugzilla href="https://bugzilla.suse.com/1135773">SUSE bug 1135773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0202</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0202" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0202" ref_url="https://www.suse.com/security/cve/CVE-2019-0202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    The Apache Storm Logviewer daemon exposes HTTP-accessible endpoints to read/search log files on hosts running Storm. In Apache Storm versions 0.9.1-incubating to 1.2.2, it is possible to read files off the host's file system that were not intended to be accessible via these endpoints.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0202/">CVE-2019-0202</cve>
	<bugzilla href="https://bugzilla.suse.com/1142617">SUSE bug 1142617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334443" comment="storm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0211" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0211" ref_url="https://www.suse.com/security/cve/CVE-2019-0211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0211/">CVE-2019-0211</cve>
	<bugzilla href="https://bugzilla.suse.com/1131233">SUSE bug 1131233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530886" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530888" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530889" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530890" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530891" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551417" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551418" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551419" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551420" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551421" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595512" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595513" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595514" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595515" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595516" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0217" ref_url="https://www.suse.com/security/cve/CVE-2019-0217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005303.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-0217/">CVE-2019-0217</cve>
	<bugzilla href="https://bugzilla.suse.com/1131239">SUSE bug 1131239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530886" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530888" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530889" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530890" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530891" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551417" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551418" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551419" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551420" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551421" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595512" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595513" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595514" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595515" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595516" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0220" ref_url="https://www.suse.com/security/cve/CVE-2019-0220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0888-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005303.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1190-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0220/">CVE-2019-0220</cve>
	<bugzilla href="https://bugzilla.suse.com/1131241">SUSE bug 1131241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530886" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530888" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530889" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530890" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530891" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551417" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551418" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551419" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551420" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551421" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595512" comment="apache2-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530887" comment="apache2-doc-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595513" comment="apache2-example-pages-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595514" comment="apache2-prefork-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595515" comment="apache2-utils-2.4.23-29.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595516" comment="apache2-worker-2.4.23-29.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1673-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1808-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html" source="SUSE-SU"/>
    <description>
    The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<bugzilla href="https://bugzilla.suse.com/1136085">SUSE bug 1136085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10081" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10081" ref_url="https://www.suse.com/security/cve/CVE-2019-10081" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
    <description>
    HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10081/">CVE-2019-10081</cve>
	<bugzilla href="https://bugzilla.suse.com/1145742">SUSE bug 1145742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10082" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10082" ref_url="https://www.suse.com/security/cve/CVE-2019-10082" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10082/">CVE-2019-10082</cve>
	<bugzilla href="https://bugzilla.suse.com/1145741">SUSE bug 1145741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10086" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10086" ref_url="https://www.suse.com/security/cve/CVE-2019-10086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html" source="SUSE-SU"/>
    <description>
    In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10086/">CVE-2019-10086</cve>
	<bugzilla href="https://bugzilla.suse.com/1146657">SUSE bug 1146657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334567" comment="apache-commons-beanutils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10092" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092</cve>
	<bugzilla href="https://bugzilla.suse.com/1145740">SUSE bug 1145740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182703">SUSE bug 1182703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334235" comment="apache2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10097" ref_url="https://www.suse.com/security/cve/CVE-2019-10097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10097/">CVE-2019-10097</cve>
	<bugzilla href="https://bugzilla.suse.com/1145739">SUSE bug 1145739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333965" comment="apache2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00046.html" source="SUSE-SU"/>
    <description>
    Evince 3.26.0 is affected by buffer overflow. The impact is: DOS / Possible code execution. The component is: backend/tiff/tiff-document.c. The attack vector is: Victim must open a crafted PDF file. The issue occurs because of an incorrect integer overflow protection mechanism in tiff_document_render and tiff_document_get_thumbnail.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<bugzilla href="https://bugzilla.suse.com/1141619">SUSE bug 1141619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551199" comment="evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551200" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551201" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551202" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551203" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551204" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551205" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551206" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551207" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551208" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551209" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595059" comment="evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595060" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595061" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595062" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595063" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595064" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595065" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595066" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595067" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595068" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595069" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2650-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192650-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2780-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192780-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2415-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2494-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html" source="SUSE-SU"/>
    <description>
    GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<bugzilla href="https://bugzilla.suse.com/1142772">SUSE bug 1142772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530717" comment="binutils-devel-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530772" comment="gdb-8.3.1-1.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522248" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530772" comment="gdb-8.3.1-1.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548760" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548761" comment="binutils-devel-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548818" comment="gdb-8.3.1-1.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595181" comment="binutils-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595182" comment="binutils-devel-2.32-9.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595266" comment="gdb-8.3.1-1.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10125</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10125" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10125" ref_url="https://www.suse.com/security/cve/CVE-2019-10125" source="SUSE CVE"/>
    <description>
    An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10125/">CVE-2019-10125</cve>
	<bugzilla href="https://bugzilla.suse.com/1130695">SUSE bug 1130695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<bugzilla href="https://bugzilla.suse.com/1136935">SUSE bug 1136935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137944">SUSE bug 1137944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156330">SUSE bug 1156330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10130" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2012-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192012-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1578-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in PostgreSQL versions 11.x up to excluding 11.3, 10.x up to excluding 10.8, 9.6.x up to, excluding 9.6.13, 9.5.x up to, excluding 9.5.17. PostgreSQL maintains column statistics for tables. Certain statistics, such as histograms and lists of most common values, contain values taken from the column. PostgreSQL does not evaluate row security policies before consulting those statistics during query planning; an attacker can exploit this to read the most common values of certain columns. Affected columns are those for which the attacker has SELECT privilege and for which, in an ordinary query, row-level security prunes the set of rows visible to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<bugzilla href="https://bugzilla.suse.com/1134689">SUSE bug 1134689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334139" comment="postgresql96 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10131" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10131" ref_url="https://www.suse.com/security/cve/CVE-2019-10131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1427-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10131/">CVE-2019-10131</cve>
	<bugzilla href="https://bugzilla.suse.com/1134075">SUSE bug 1134075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10142" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10142" ref_url="https://www.suse.com/security/cve/CVE-2019-10142" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's freescale hypervisor manager implementation, kernel versions 5.0.x up to, excluding 5.0.17. A parameter passed to an ioctl was incorrectly validated and used in size calculations for the page size calculation. An attacker can use this flaw to crash the system, corrupt memory, or create other adverse security affects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10142/">CVE-2019-10142</cve>
	<bugzilla href="https://bugzilla.suse.com/1135955">SUSE bug 1135955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1906-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522072" comment="python-devel-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522067" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522068" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522041" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522069" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530623" comment="python-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522070" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530624" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522071" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530625" comment="python-demo-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530628" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530629" comment="python-idle-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522073" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522074" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522042" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522043" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522044" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548680" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548681" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548677" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548682" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548683" comment="python-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548684" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548685" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548686" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548687" comment="python-demo-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548688" comment="python-devel-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548689" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548690" comment="python-idle-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548691" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548692" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548678" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548679" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551198" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595071" comment="libpython2_7-1_0-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548681" comment="libpython2_7-1_0-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595054" comment="libpython3_4m1_0-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595072" comment="python-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548683" comment="python-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595073" comment="python-base-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548685" comment="python-base-32bit-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595074" comment="python-curses-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595075" comment="python-demo-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595076" comment="python-devel-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530626" comment="python-doc-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530627" comment="python-doc-pdf-2.7.13-28.31.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595077" comment="python-gdbm-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595078" comment="python-idle-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595079" comment="python-tk-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595080" comment="python-xml-2.7.13-28.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595055" comment="python3-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595056" comment="python3-base-3.4.6-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595057" comment="python3-curses-3.4.6-25.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530630" comment="libvirt-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530631" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530632" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530633" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530634" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530635" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530637" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530638" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530639" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530640" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530641" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530642" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530643" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530644" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530645" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530646" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530648" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530649" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530650" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551211" comment="libvirt-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551212" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551213" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551214" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551215" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551216" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551217" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551218" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551219" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551220" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551221" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551222" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551223" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551224" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551225" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551226" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551227" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551228" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551229" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595081" comment="libvirt-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595082" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595083" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595084" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595085" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595086" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595087" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595088" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595089" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595090" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595091" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595092" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595093" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595094" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595095" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595096" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595097" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595098" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595099" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1783-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2012-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192012-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1773-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00035.html" source="SUSE-SU"/>
    <description>
    PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user's own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<bugzilla href="https://bugzilla.suse.com/1138034">SUSE bug 1138034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521936" comment="libecpg6-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521937" comment="libpq5-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521938" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521939" comment="postgresql10-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530575" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530577" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530578" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530579" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530580" comment="postgresql10-server-10.9-1.12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546508" comment="libecpg6-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546509" comment="libpq5-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546510" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546511" comment="postgresql10-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546512" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546513" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546514" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546515" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546516" comment="postgresql10-server-10.9-1.12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594998" comment="libecpg6-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594999" comment="libpq5-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546510" comment="libpq5-32bit-10.9-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595000" comment="postgresql10-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595001" comment="postgresql10-contrib-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530576" comment="postgresql10-docs-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595002" comment="postgresql10-plperl-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595003" comment="postgresql10-plpython-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595004" comment="postgresql10-pltcl-10.9-1.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595005" comment="postgresql10-server-10.9-1.12.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00019.html" source="SUSE-SU"/>
    <description>
    The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530630" comment="libvirt-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530631" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530632" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530633" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530634" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530635" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530637" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530638" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530639" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530640" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530641" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530642" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530643" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530644" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530645" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530646" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530648" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530649" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530650" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551211" comment="libvirt-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551212" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551213" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551214" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551215" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551216" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551217" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551218" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551219" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551220" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551221" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551222" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551223" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551224" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551225" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551226" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551227" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551228" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551229" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595081" comment="libvirt-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595082" comment="libvirt-client-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595083" comment="libvirt-daemon-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595084" comment="libvirt-daemon-config-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595085" comment="libvirt-daemon-config-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595086" comment="libvirt-daemon-driver-interface-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530636" comment="libvirt-daemon-driver-libxl-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595087" comment="libvirt-daemon-driver-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595088" comment="libvirt-daemon-driver-network-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595089" comment="libvirt-daemon-driver-nodedev-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595090" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595091" comment="libvirt-daemon-driver-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595092" comment="libvirt-daemon-driver-secret-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595093" comment="libvirt-daemon-driver-storage-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595094" comment="libvirt-daemon-hooks-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595095" comment="libvirt-daemon-lxc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595096" comment="libvirt-daemon-qemu-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530647" comment="libvirt-daemon-xen-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595097" comment="libvirt-doc-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595098" comment="libvirt-lock-sanlock-2.0.0-27.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595099" comment="libvirt-nss-2.0.0-27.61.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10196</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10196" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10196" ref_url="https://www.suse.com/security/cve/CVE-2019-10196" source="SUSE CVE"/>
    <description>
    A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10196/">CVE-2019-10196</cve>
	<bugzilla href="https://bugzilla.suse.com/1140751">SUSE bug 1140751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334390" comment="nodejs6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10206</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10206" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10206" ref_url="https://www.suse.com/security/cve/CVE-2019-10206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
    <description>
    ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10206/">CVE-2019-10206</cve>
	<bugzilla href="https://bugzilla.suse.com/1142690">SUSE bug 1142690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154232">SUSE bug 1154232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<bugzilla href="https://bugzilla.suse.com/1123959">SUSE bug 1123959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142857">SUSE bug 1142857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in postgresql versions 9.4.x before 9.4.24, 9.5.x before 9.5.19, 9.6.x before 9.6.15, 10.x before 10.10 and 11.x before 11.5 where arbitrary SQL statements can be executed given a suitable SECURITY DEFINER function. An attacker, with EXECUTE permission on the function, can execute arbitrary SQL as the owner of the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<bugzilla href="https://bugzilla.suse.com/1145092">SUSE bug 1145092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530664" comment="postgresql94-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530665" comment="postgresql94-contrib-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530666" comment="postgresql94-docs-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530667" comment="postgresql94-plperl-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530668" comment="postgresql94-plpython-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530669" comment="postgresql94-pltcl-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530670" comment="postgresql94-server-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530671" comment="postgresql96-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530672" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530674" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530675" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530676" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530677" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548696" comment="postgresql94-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548697" comment="postgresql94-contrib-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530666" comment="postgresql94-docs-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548698" comment="postgresql94-plperl-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548699" comment="postgresql94-plpython-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548700" comment="postgresql94-pltcl-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548701" comment="postgresql94-server-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548702" comment="postgresql96-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548703" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548704" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548705" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548706" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548707" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595106" comment="postgresql94-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595107" comment="postgresql94-contrib-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530666" comment="postgresql94-docs-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530667" comment="postgresql94-plperl-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530668" comment="postgresql94-plpython-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530669" comment="postgresql94-pltcl-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595108" comment="postgresql94-server-9.4.24-21.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595109" comment="postgresql96-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595110" comment="postgresql96-contrib-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530673" comment="postgresql96-docs-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595111" comment="postgresql96-plperl-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595112" comment="postgresql96-plpython-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595113" comment="postgresql96-pltcl-9.6.15-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595114" comment="postgresql96-server-9.6.15-3.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10217</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10217" ref_url="https://www.suse.com/security/cve/CVE-2019-10217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
    <description>
    A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10217/">CVE-2019-10217</cve>
	<bugzilla href="https://bugzilla.suse.com/1144453">SUSE bug 1144453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2866-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192866-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2868-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192868-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2875-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192875-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2442-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2458-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530727" comment="libdcerpc-atsvc0-4.2.4-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530728" comment="libdcerpc-binding0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530729" comment="libdcerpc-binding0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530730" comment="libdcerpc0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530731" comment="libdcerpc0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530732" comment="libndr-krb5pac0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530733" comment="libndr-krb5pac0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530734" comment="libndr-nbt0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530735" comment="libndr-nbt0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530736" comment="libndr-standard0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530737" comment="libndr-standard0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530738" comment="libndr0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530739" comment="libndr0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530740" comment="libnetapi0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530741" comment="libnetapi0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530742" comment="libsamba-credentials0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530743" comment="libsamba-credentials0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530744" comment="libsamba-errors0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530745" comment="libsamba-errors0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530746" comment="libsamba-hostconfig0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530747" comment="libsamba-hostconfig0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530748" comment="libsamba-passdb0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530749" comment="libsamba-passdb0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530750" comment="libsamba-util0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530751" comment="libsamba-util0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530752" comment="libsamdb0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530753" comment="libsamdb0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530754" comment="libsmbclient0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530755" comment="libsmbclient0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530756" comment="libsmbconf0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530757" comment="libsmbconf0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530758" comment="libsmbldap0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530759" comment="libsmbldap0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530760" comment="libtevent-util0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530761" comment="libtevent-util0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530762" comment="libwbclient0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530763" comment="libwbclient0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530764" comment="samba-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530765" comment="samba-client-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530766" comment="samba-client-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530767" comment="samba-doc-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530768" comment="samba-libs-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530769" comment="samba-libs-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530770" comment="samba-winbind-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530771" comment="samba-winbind-32bit-4.4.2-38.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551274" comment="libdcerpc-atsvc0-4.2.4-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551275" comment="libdcerpc-binding0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551276" comment="libdcerpc-binding0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551277" comment="libdcerpc0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551278" comment="libdcerpc0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551279" comment="libndr-krb5pac0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551280" comment="libndr-krb5pac0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551281" comment="libndr-nbt0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551282" comment="libndr-nbt0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551283" comment="libndr-standard0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551284" comment="libndr-standard0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551285" comment="libndr0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551286" comment="libndr0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551287" comment="libnetapi0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551288" comment="libnetapi0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551289" comment="libsamba-credentials0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551290" comment="libsamba-credentials0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551291" comment="libsamba-errors0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551292" comment="libsamba-errors0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551293" comment="libsamba-hostconfig0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551294" comment="libsamba-hostconfig0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551295" comment="libsamba-passdb0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551296" comment="libsamba-passdb0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551297" comment="libsamba-util0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551298" comment="libsamba-util0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551299" comment="libsamdb0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551300" comment="libsamdb0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551301" comment="libsmbclient0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551302" comment="libsmbclient0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551303" comment="libsmbconf0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551304" comment="libsmbconf0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551305" comment="libsmbldap0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551306" comment="libsmbldap0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551307" comment="libtevent-util0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551308" comment="libtevent-util0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551309" comment="libwbclient0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551310" comment="libwbclient0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551311" comment="samba-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551312" comment="samba-client-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551313" comment="samba-client-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530767" comment="samba-doc-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551314" comment="samba-libs-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551315" comment="samba-libs-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551316" comment="samba-winbind-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551317" comment="samba-winbind-32bit-4.4.2-38.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595243" comment="libdcerpc-atsvc0-4.2.4-28.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595244" comment="libdcerpc-binding0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551276" comment="libdcerpc-binding0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595245" comment="libdcerpc0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551278" comment="libdcerpc0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595246" comment="libndr-krb5pac0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551280" comment="libndr-krb5pac0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595247" comment="libndr-nbt0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551282" comment="libndr-nbt0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595248" comment="libndr-standard0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551284" comment="libndr-standard0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595249" comment="libndr0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551286" comment="libndr0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595250" comment="libnetapi0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551288" comment="libnetapi0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595251" comment="libsamba-credentials0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551290" comment="libsamba-credentials0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595252" comment="libsamba-errors0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551292" comment="libsamba-errors0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595253" comment="libsamba-hostconfig0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551294" comment="libsamba-hostconfig0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595254" comment="libsamba-passdb0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551296" comment="libsamba-passdb0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595255" comment="libsamba-util0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551298" comment="libsamba-util0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595256" comment="libsamdb0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551300" comment="libsamdb0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595257" comment="libsmbclient0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551302" comment="libsmbclient0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595258" comment="libsmbconf0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551304" comment="libsmbconf0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595259" comment="libsmbldap0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551306" comment="libsmbldap0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595260" comment="libtevent-util0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551308" comment="libtevent-util0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595261" comment="libwbclient0-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551310" comment="libwbclient0-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595262" comment="samba-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595263" comment="samba-client-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551313" comment="samba-client-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530767" comment="samba-doc-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595264" comment="samba-libs-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551315" comment="samba-libs-32bit-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595265" comment="samba-winbind-4.4.2-38.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551317" comment="samba-winbind-32bit-4.4.2-38.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2859-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3019-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193019-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552429" comment="kgraft-patch-4_4_121-92_101-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552430" comment="kgraft-patch-4_4_121-92_104-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552431" comment="kgraft-patch-4_4_121-92_109-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552432" comment="kgraft-patch-4_4_121-92_114-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552433" comment="kgraft-patch-4_4_121-92_117-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552434" comment="kgraft-patch-4_4_121-92_120-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552422" comment="kgraft-patch-4_4_121-92_98-default-8-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537243" comment="kgraft-patch-4_4_121-92_101-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537244" comment="kgraft-patch-4_4_121-92_104-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537245" comment="kgraft-patch-4_4_121-92_109-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537246" comment="kgraft-patch-4_4_121-92_114-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537247" comment="kgraft-patch-4_4_121-92_117-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537248" comment="kgraft-patch-4_4_121-92_120-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537180" comment="kgraft-patch-4_4_121-92_98-default-8-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10245" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
    <description>
    In Eclipse OpenJ9 prior to the 0.14.0 release, the Java bytecode verifier incorrectly allows a method to execute past the end of bytecode array causing crashes. Eclipse OpenJ9 v0.14.0 correctly detects this case and rejects the attempted class load.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530510" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530512" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530513" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530570" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530572" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546364" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542012" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546365" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548612" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542060" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594866" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594985" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594986" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<bugzilla href="https://bugzilla.suse.com/1140575">SUSE bug 1140575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<bugzilla href="https://bugzilla.suse.com/1140577">SUSE bug 1140577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10649" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10649" ref_url="https://www.suse.com/security/cve/CVE-2019-10649" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-10649/">CVE-2019-10649</cve>
	<bugzilla href="https://bugzilla.suse.com/1131154">SUSE bug 1131154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<bugzilla href="https://bugzilla.suse.com/1131317">SUSE bug 1131317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10876</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10876" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10876" ref_url="https://www.suse.com/security/cve/CVE-2019-10876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005772.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes where those security groups are present, because of an Open vSwitch (OVS) firewall KeyError. All Neutron deployments utilizing neutron-openvswitch-agent are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10876/">CVE-2019-10876</cve>
	<bugzilla href="https://bugzilla.suse.com/1131712">SUSE bug 1131712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334446" comment="openstack-neutron is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10906</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10906" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906</cve>
	<bugzilla href="https://bugzilla.suse.com/1132323">SUSE bug 1132323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530065" comment="python-Jinja2-2.8-22.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11005" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11005" ref_url="https://www.suse.com/security/cve/CVE-2019-11005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a stack-based buffer overflow in the function SVGStartElement of coders/svg.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a quoted font family value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11005/">CVE-2019-11005</cve>
	<bugzilla href="https://bugzilla.suse.com/1132058">SUSE bug 1132058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11006" ref_url="https://www.suse.com/security/cve/CVE-2019-11006" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadMIFFImage of coders/miff.c, which allows attackers to cause a denial of service or information disclosure via an RLE packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11006/">CVE-2019-11006</cve>
	<bugzilla href="https://bugzilla.suse.com/1132061">SUSE bug 1132061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11007" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the ReadMNGImage function of coders/png.c, which allows attackers to cause a denial of service or information disclosure via an image colormap.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<bugzilla href="https://bugzilla.suse.com/1132060">SUSE bug 1132060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer overflow in the function WriteXWDImage of coders/xwd.c, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<bugzilla href="https://bugzilla.suse.com/1132054">SUSE bug 1132054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11009" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11009" ref_url="https://www.suse.com/security/cve/CVE-2019-11009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a heap-based buffer over-read in the function ReadXWDImage of coders/xwd.c, which allows attackers to cause a denial of service or information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11009/">CVE-2019-11009</cve>
	<bugzilla href="https://bugzilla.suse.com/1132053">SUSE bug 1132053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11010" ref_url="https://www.suse.com/security/cve/CVE-2019-11010" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1272-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1295-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00107.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190322 Q8, there is a memory leak in the function ReadMPCImage of coders/mpc.c, which allows attackers to cause a denial of service via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11010/">CVE-2019-11010</cve>
	<bugzilla href="https://bugzilla.suse.com/1132055">SUSE bug 1132055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization. This issue was corrected by changing the way livestreams are downloaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<bugzilla href="https://bugzilla.suse.com/1132196">SUSE bug 1132196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" source="SUSE-SU"/>
    <description>
    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135394">SUSE bug 1135394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551106" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551107" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551108" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551109" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551110" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551111" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551112" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551113" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551114" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551115" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551116" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551117" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551118" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551119" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551120" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551121" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551122" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551123" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551124" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551081" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551082" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551083" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551084" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551086" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536858" comment="qemu-ppc-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551088" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594887" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594888" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594889" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594890" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594891" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594892" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594893" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594894" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594895" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594896" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594897" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594898" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594899" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594900" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594901" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594902" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594903" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594904" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594905" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594852" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594853" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594854" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594855" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594856" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594857" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521994" comment="ucode-intel-20190618-13.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530515" comment="xen-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530516" comment="xen-doc-html-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530517" comment="xen-libs-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530518" comment="xen-libs-32bit-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530519" comment="xen-tools-4.7.6_06-43.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530520" comment="xen-tools-domU-4.7.6_06-43.51.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2958-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="TID000019563" ref_url="https://www.suse.com/support/kb/doc/?id=000019563" source="SUSE-SU"/>
		<reference ref_id="TID7024251" ref_url="https://www.suse.com/support/kb/doc/?id=7024251" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html" source="SUSE-SU"/>
    <description>
    TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152506">SUSE bug 1152506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11139" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2958-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006195.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2504-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2509-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2528-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html" source="SUSE-SU"/>
    <description>
    Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522383" comment="ucode-intel-20191112a-13.56.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11190" ref_url="https://www.suse.com/security/cve/CVE-2019-11190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs (such as /bin/su) because install_exec_creds() is called too late in load_elf_binary() in fs/binfmt_elf.c, and thus the ptrace_may_access() check has a race condition when reading /proc/pid/stat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11190/">CVE-2019-11190</cve>
	<bugzilla href="https://bugzilla.suse.com/1131543">SUSE bug 1131543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132472">SUSE bug 1132472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005429.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00105.html" source="SUSE-SU"/>
    <description>
    FreeRADIUS before 3.0.19 does not prevent use of reflection for authentication spoofing, aka a "Dragonblood" issue, a similar issue to CVE-2019-9497.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234</cve>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530416" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530417" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530418" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530419" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530420" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530421" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530422" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530423" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530424" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530425" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530426" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546261" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546262" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546263" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546264" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546265" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546266" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546267" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546268" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546269" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546270" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546271" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594787" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594788" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594789" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594790" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594791" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594792" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594793" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594794" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594795" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594796" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594797" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11235" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005429.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1394-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0542-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00105.html" source="SUSE-SU"/>
    <description>
    FreeRADIUS before 3.0.19 mishandles the "each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used" protection mechanism, aka a "Dragonblood" issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235</cve>
	<bugzilla href="https://bugzilla.suse.com/1132549">SUSE bug 1132549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132664">SUSE bug 1132664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530416" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530417" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530418" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530419" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530420" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530421" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530422" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530423" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530424" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530425" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530426" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546261" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546262" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546263" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546264" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546265" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546266" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546267" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546268" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546269" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546270" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546271" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594787" comment="freeradius-server-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594788" comment="freeradius-server-doc-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594789" comment="freeradius-server-krb5-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594790" comment="freeradius-server-ldap-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594791" comment="freeradius-server-libs-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594792" comment="freeradius-server-mysql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594793" comment="freeradius-server-perl-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594794" comment="freeradius-server-postgresql-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594795" comment="freeradius-server-python-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594796" comment="freeradius-server-sqlite-3.0.3-17.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594797" comment="freeradius-server-utils-3.0.3-17.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11236</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11236" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236</cve>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595152" comment="python-urllib3-1.16-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="TID000019474" ref_url="https://www.suse.com/support/kb/doc/?id=000019474" source="SUSE-SU"/>
		<reference ref_id="TID7023930" ref_url="https://www.suse.com/support/kb/doc/?id=7023930" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<bugzilla href="https://bugzilla.suse.com/1139358">SUSE bug 1139358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11281</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11281" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11281" ref_url="https://www.suse.com/security/cve/CVE-2019-11281" source="SUSE CVE"/>
    <description>
    Pivotal RabbitMQ, versions prior to v3.7.18, and RabbitMQ for PCF, versions 1.15.x prior to 1.15.13, versions 1.16.x prior to 1.16.6, and versions 1.17.x prior to 1.17.3, contain two components, the virtual host limits page, and the federation management UI, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack that would gain access to virtual hosts and policy management information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11281/">CVE-2019-11281</cve>
	<bugzilla href="https://bugzilla.suse.com/1154481">SUSE bug 1154481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334397" comment="rabbitmq-server is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11291</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11291" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11291" ref_url="https://www.suse.com/security/cve/CVE-2019-11291" source="SUSE CVE"/>
    <description>
    Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative access could craft a cross site scripting attack via the vhost or node name fields that could grant access to virtual hosts and policy management information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11291/">CVE-2019-11291</cve>
	<bugzilla href="https://bugzilla.suse.com/1157664">SUSE bug 1157664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334397" comment="rabbitmq-server is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11323</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11323" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11323" ref_url="https://www.suse.com/security/cve/CVE-2019-11323" source="SUSE CVE"/>
    <description>
    HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11323/">CVE-2019-11323</cve>
	<bugzilla href="https://bugzilla.suse.com/1134676">SUSE bug 1134676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11365" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11365" ref_url="https://www.suse.com/security/cve/CVE-2019-11365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005410.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11365/">CVE-2019-11365</cve>
	<bugzilla href="https://bugzilla.suse.com/1133114">SUSE bug 1133114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521120" comment="atftp-0.7.0-160.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546275" comment="atftp-0.7.0-160.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594800" comment="atftp-0.7.0-160.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11366" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11366" ref_url="https://www.suse.com/security/cve/CVE-2019-11366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005410.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in atftpd in atftp 0.7.1. It does not lock the thread_list_mutex mutex before assigning the current thread data structure. As a result, the daemon is vulnerable to a denial of service attack due to a NULL pointer dereference. If thread_data is NULL when assigned to current, and modified by another thread before a certain tftpd_list.c check, there is a crash when dereferencing current-&gt;next.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11366/">CVE-2019-11366</cve>
	<bugzilla href="https://bugzilla.suse.com/1133145">SUSE bug 1133145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521120" comment="atftp-0.7.0-160.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546275" comment="atftp-0.7.0-160.8.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594800" comment="atftp-0.7.0-160.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1667-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00089.html" source="SUSE-SU"/>
    <description>
    The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<bugzilla href="https://bugzilla.suse.com/1133037">SUSE bug 1133037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522052" comment="evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522053" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522055" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522056" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522057" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522058" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522059" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522060" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522061" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522062" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522063" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551199" comment="evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551200" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551201" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551202" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551203" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551204" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551205" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551206" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551207" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551208" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551209" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595059" comment="evince-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595060" comment="evince-browser-plugin-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522054" comment="evince-lang-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595061" comment="evince-plugin-djvudocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595062" comment="evince-plugin-dvidocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595063" comment="evince-plugin-pdfdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595064" comment="evince-plugin-psdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595065" comment="evince-plugin-tiffdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595066" comment="evince-plugin-xpsdocument-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595067" comment="libevdocument3-4-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595068" comment="libevview3-3-3.20.2-6.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595069" comment="nautilus-evince-3.20.2-6.27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<bugzilla href="https://bugzilla.suse.com/1133205">SUSE bug 1133205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11473" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11473" ref_url="https://www.suse.com/security/cve/CVE-2019-11473" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (out-of-bounds read and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-11473/">CVE-2019-11473</cve>
	<bugzilla href="https://bugzilla.suse.com/1133203">SUSE bug 1133203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11474" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11474" ref_url="https://www.suse.com/security/cve/CVE-2019-11474" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
    <description>
    coders/xwd.c in GraphicsMagick 1.3.31 allows attackers to cause a denial of service (floating-point exception and application crash) by crafting an XWD image file, a different vulnerability than CVE-2019-11008 and CVE-2019-11009.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-11474/">CVE-2019-11474</cve>
	<bugzilla href="https://bugzilla.suse.com/1133202">SUSE bug 1133202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133204">SUSE bug 1133204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552409" comment="kgraft-patch-4_4_121-92_101-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552410" comment="kgraft-patch-4_4_121-92_104-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552411" comment="kgraft-patch-4_4_121-92_109-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537013" comment="kgraft-patch-4_4_121-92_92-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552407" comment="kgraft-patch-4_4_121-92_95-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552408" comment="kgraft-patch-4_4_121-92_98-default-6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537016" comment="kgraft-patch-4_4_121-92_101-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537017" comment="kgraft-patch-4_4_121-92_104-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537018" comment="kgraft-patch-4_4_121-92_109-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537013" comment="kgraft-patch-4_4_121-92_92-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537014" comment="kgraft-patch-4_4_121-92_95-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537015" comment="kgraft-patch-4_4_121-92_98-default-6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552409" comment="kgraft-patch-4_4_121-92_101-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552410" comment="kgraft-patch-4_4_121-92_104-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552411" comment="kgraft-patch-4_4_121-92_109-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552412" comment="kgraft-patch-4_4_121-92_114-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537013" comment="kgraft-patch-4_4_121-92_92-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552407" comment="kgraft-patch-4_4_121-92_95-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552408" comment="kgraft-patch-4_4_121-92_98-default-6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537016" comment="kgraft-patch-4_4_121-92_101-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537017" comment="kgraft-patch-4_4_121-92_104-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537018" comment="kgraft-patch-4_4_121-92_109-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537019" comment="kgraft-patch-4_4_121-92_114-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537013" comment="kgraft-patch-4_4_121-92_92-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537014" comment="kgraft-patch-4_4_121-92_95-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537015" comment="kgraft-patch-4_4_121-92_98-default-6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<bugzilla href="https://bugzilla.suse.com/1133188">SUSE bug 1133188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173667">SUSE bug 1173667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.1-rc5 allows page-&gt;_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<bugzilla href="https://bugzilla.suse.com/1133190">SUSE bug 1133190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133191">SUSE bug 1133191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552405" comment="kgraft-patch-4_4_121-92_101-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552404" comment="kgraft-patch-4_4_121-92_104-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552403" comment="kgraft-patch-4_4_121-92_109-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552406" comment="kgraft-patch-4_4_121-92_114-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536962" comment="kgraft-patch-4_4_121-92_92-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552401" comment="kgraft-patch-4_4_121-92_95-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552402" comment="kgraft-patch-4_4_121-92_98-default-5-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536968" comment="kgraft-patch-4_4_121-92_101-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536967" comment="kgraft-patch-4_4_121-92_104-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536966" comment="kgraft-patch-4_4_121-92_109-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536978" comment="kgraft-patch-4_4_121-92_114-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536962" comment="kgraft-patch-4_4_121-92_92-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536964" comment="kgraft-patch-4_4_121-92_95-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536965" comment="kgraft-patch-4_4_121-92_98-default-5-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11500" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00026.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500</cve>
	<bugzilla href="https://bugzilla.suse.com/1145559">SUSE bug 1145559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530710" comment="dovecot22-2.2.31-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530711" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530712" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530713" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548746" comment="dovecot22-2.2.31-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548747" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548748" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548749" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595165" comment="dovecot22-2.2.31-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595166" comment="dovecot22-backend-mysql-2.2.31-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595167" comment="dovecot22-backend-pgsql-2.2.31-19.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595168" comment="dovecot22-backend-sqlite-2.2.31-19.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11505" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1354-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1355-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1437-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick from version 1.3.8 to 1.4 snapshot-20190403 Q8, there is a heap-based buffer overflow in the function WritePDBImage of coders/pdb.c, which allows an attacker to cause a denial of service or possibly have unspecified other impact via a crafted image file. This is related to MagickBitStreamMSBWrite in magick/bit_stream.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<bugzilla href="https://bugzilla.suse.com/1133501">SUSE bug 1133501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11596</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11596" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11596" ref_url="https://www.suse.com/security/cve/CVE-2019-11596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html" source="SUSE-SU"/>
    <description>
    In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11596/">CVE-2019-11596</cve>
	<bugzilla href="https://bugzilla.suse.com/1133817">SUSE bug 1133817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005670.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1795-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00043.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<bugzilla href="https://bugzilla.suse.com/1138464">SUSE bug 1138464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005633.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1603-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1683-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<bugzilla href="https://bugzilla.suse.com/1136732">SUSE bug 1136732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<bugzilla href="https://bugzilla.suse.com/1131645">SUSE bug 1131645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133738">SUSE bug 1133738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157905">SUSE bug 1157905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11683" ref_url="https://www.suse.com/security/cve/CVE-2019-11683" source="SUSE CVE"/>
    <description>
    udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of death" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11683/">CVE-2019-11683</cve>
	<bugzilla href="https://bugzilla.suse.com/1134021">SUSE bug 1134021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when working with XMLHttpRequest (XHR) in an event loop, causing the XHR main thread to be called after it has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when listeners are removed from the event listener manager while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    The bufferdata function in WebGL is vulnerable to a buffer overflow with specific graphics drivers on Linux. This could result in malicious content freezing a tab or triggering a potentially exploitable crash. *Note: this issue only occurs on Linux. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11694" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in the Windows sandbox where an uninitialized value in memory can be leaked to a renderer from a broker when making a call to access an otherwise unavailable file. This results in the potential leaking of information stored at that memory location. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    If a crafted hyperlink is dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop event data. This allows for the theft of browser history by a malicious site. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1593-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 60.7.1, Firefox &lt; 67.0.3, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<bugzilla href="https://bugzilla.suse.com/1138614">SUSE bug 1138614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009562509" comment="MozillaFirefox-60.7.1-109.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562511" comment="MozillaFirefox-devel-60.7.1-109.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562510" comment="MozillaFirefox-translations-common-60.7.1-109.77.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009562512" comment="MozillaFirefox-60.7.1-109.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562513" comment="MozillaFirefox-devel-60.7.1-109.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562514" comment="MozillaFirefox-translations-common-60.7.1-109.77.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596501" comment="MozillaFirefox-60.7.1-109.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596502" comment="MozillaFirefox-devel-60.7.1-109.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596503" comment="MozillaFirefox-translations-common-60.7.1-109.77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005624.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1594-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR &lt; 60.7.2, Firefox &lt; 67.0.4, and Thunderbird &lt; 60.7.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<bugzilla href="https://bugzilla.suse.com/1138872">SUSE bug 1138872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521537" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530574" comment="MozillaFirefox-devel-60.7.2-109.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521538" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546473" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546474" comment="MozillaFirefox-devel-60.7.2-109.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546475" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594987" comment="MozillaFirefox-60.7.2-109.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594988" comment="MozillaFirefox-devel-60.7.2-109.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594989" comment="MozillaFirefox-translations-common-60.7.2-109.80.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11714" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11716" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11718" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11720" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11721" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The unicode latin 'kra' character can be used to spoof a standard 'k' character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11723" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different "containers" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11724" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11725" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141322">SUSE bug 1141322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11728" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox &lt; 68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11733" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox &lt; 68.0.2 and Firefox ESR &lt; 68.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<bugzilla href="https://bugzilla.suse.com/1145665">SUSE bug 1145665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<bugzilla href="https://bugzilla.suse.com/1149293">SUSE bug 1149293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11736" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. &lt;br&gt;*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<bugzilla href="https://bugzilla.suse.com/1149292">SUSE bug 1149292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11738" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<bugzilla href="https://bugzilla.suse.com/1149302">SUSE bug 1149302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<bugzilla href="https://bugzilla.suse.com/1149299">SUSE bug 1149299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a &amp;lt;canvas&amp;gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<bugzilla href="https://bugzilla.suse.com/1149303">SUSE bug 1149303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Navigation events were not fully adhering to the W3C's "Navigation-Timing Level 2" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<bugzilla href="https://bugzilla.suse.com/1149298">SUSE bug 1149298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Some HTML elements, such as &amp;lt;title&amp;gt; and &amp;lt;textarea&amp;gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<bugzilla href="https://bugzilla.suse.com/1149304">SUSE bug 1149304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html" source="SUSE-SU"/>
    <description>
    When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522675" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522676" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531795" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531796" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522677" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522678" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531797" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531798" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522679" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522680" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522681" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522682" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522683" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522684" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522685" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522686" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522687" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548857" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548858" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548859" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549126" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549127" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549128" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549129" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549130" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549131" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549132" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549133" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549134" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549135" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549137" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549138" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549139" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549140" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549142" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549143" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549144" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595351" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595352" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595353" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596287" comment="libfreebl3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549127" comment="libfreebl3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596288" comment="libfreebl3-hmac-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549129" comment="libfreebl3-hmac-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596289" comment="libsoftokn3-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549131" comment="libsoftokn3-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596290" comment="libsoftokn3-hmac-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549133" comment="libsoftokn3-hmac-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596291" comment="mozilla-nspr-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549135" comment="mozilla-nspr-32bit-4.23-19.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596292" comment="mozilla-nss-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549138" comment="mozilla-nss-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596293" comment="mozilla-nss-certs-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549140" comment="mozilla-nss-certs-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596294" comment="mozilla-nss-sysinit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549143" comment="mozilla-nss-sysinit-32bit-3.47.1-58.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596295" comment="mozilla-nss-tools-3.47.1-58.34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<bugzilla href="https://bugzilla.suse.com/1149297">SUSE bug 1149297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11747" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The "Forget about this site" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site's HSTS setting will be restored. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<bugzilla href="https://bugzilla.suse.com/1149301">SUSE bug 1149301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11748" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<bugzilla href="https://bugzilla.suse.com/1149291">SUSE bug 1149291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11749" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<bugzilla href="https://bugzilla.suse.com/1149290">SUSE bug 1149290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11750" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<bugzilla href="https://bugzilla.suse.com/1149289">SUSE bug 1149289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11751" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows 'Startup' folder. &lt;br&gt;*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox &lt; 69 and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<bugzilla href="https://bugzilla.suse.com/1149286">SUSE bug 1149286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.1, Thunderbird &lt; 60.9, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<bugzilla href="https://bugzilla.suse.com/1149296">SUSE bug 1149296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150940">SUSE bug 1150940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11753" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. &lt;br&gt;*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox &lt; 69, Firefox ESR &lt; 60.9, and Firefox ESR &lt; 68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<bugzilla href="https://bugzilla.suse.com/1149295">SUSE bug 1149295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    When following the value's prototype chain, it was possible to retain a reference to a locale, delete it, and subsequently reference it. This resulted in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11758" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla community member Philipp reported a memory safety bug present in Firefox 68 when 360 Total Security was installed. This bug showed evidence of memory corruption in the accessibility engine and we presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 69, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    An attacker could have caused 4 bytes of HMAC output to be written past the end of a buffer stored on the stack. This could be used by an attacker to execute arbitrary code or more likely lead to a crash. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    A fixed-size stack buffer could overflow in nrappkit when doing WebRTC signaling. This resulted in a potentially exploitable crash in some instances. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    If two same-origin documents set document.domain differently to become cross-origin, it was possible for them to call arbitrary DOM methods/getters/setters on the now-cross-origin window. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Failure to correctly handle null bytes when processing HTML entities resulted in Firefox incorrectly parsing these entities. This could have led to HTML comment text being treated as HTML which could have led to XSS in a web application under certain conditions. It could have also led to HTML entities being masked from filters - enabling the use of entities to mask the actual characters of interest from filters. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 69 and Firefox ESR 68.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 70, Thunderbird &lt; 68.2, and Firefox ESR &lt; 68.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11771" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
    <description>
    AIX builds of Eclipse OpenJ9 before 0.15.0 contain unused RPATHs which may facilitate code injection and privilege elevation by local users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542250" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595131" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595132" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595133" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11772" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
    <description>
    In Eclipse OpenJ9 prior to 0.15, the String.getBytes(int, int, byte[], int) method does not verify that the provided byte array is non-null nor that the provided index is in bounds when compiled by the JIT. This allows arbitrary writes to any 32-bit address or beyond the end of a byte array within Java code run under a SecurityManager.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772</cve>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11775" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
    <description>
    All builds of Eclipse OpenJ9 prior to 0.15 contain a bug where the loop versioner may fail to privatize a value that is pulled out of the loop by versioning - for example if there is a condition that is moved out of the loop that reads a field we may not privatize the value of that field in the modified copy of the loop allowing the test to see one value of the field and subsequently the loop to see a modified field value without retesting the condition moved out of the loop. This can lead to a variety of different issues but read out of array bounds is one major consequence of these problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542250" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595131" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595132" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595133" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<bugzilla href="https://bugzilla.suse.com/1134399">SUSE bug 1134399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11811</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11811" ref_url="https://www.suse.com/security/cve/CVE-2019-11811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11811/">CVE-2019-11811</cve>
	<bugzilla href="https://bugzilla.suse.com/1134397">SUSE bug 1134397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<bugzilla href="https://bugzilla.suse.com/1134537">SUSE bug 1134537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    fs/ext4/extents.c in the Linux kernel through 5.1.2 does not zero out the unused memory region in the extent tree block, which might allow local users to obtain sensitive information by reading uninitialized data in the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<bugzilla href="https://bugzilla.suse.com/1135281">SUSE bug 1135281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<bugzilla href="https://bugzilla.suse.com/1134848">SUSE bug 1134848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139868">SUSE bug 1139868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12067" ref_url="https://www.suse.com/security/cve/CVE-2019-12067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad-&gt;cur_cmd' is null.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12067/">CVE-2019-12067</cve>
	<bugzilla href="https://bugzilla.suse.com/1145642">SUSE bug 1145642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145652">SUSE bug 1145652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
    <description>
    In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's-&gt;dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530990" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530991" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530993" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530994" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530996" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530997" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531000" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551454" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551455" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551456" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551457" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551459" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537488" comment="qemu-ppc-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551461" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595592" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595593" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595594" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595595" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595596" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595597" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html" source="SUSE-SU"/>
    <description>
    interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530651" comment="qemu-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530652" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530654" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530655" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530657" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530658" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530661" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551230" comment="qemu-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551231" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551232" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551233" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551234" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551235" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537091" comment="qemu-ppc-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551236" comment="qemu-s390-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551237" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595100" comment="qemu-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595101" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595102" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595103" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551234" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595104" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551236" comment="qemu-s390-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595105" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12308</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12308" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12308" ref_url="https://www.suse.com/security/cve/CVE-2019-12308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12308/">CVE-2019-12308</cve>
	<bugzilla href="https://bugzilla.suse.com/1136468">SUSE bug 1136468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the code touched by the referenced commit runs only at boot, before any user processes are started. Therefore, there is no possibility for an unprivileged user to control it.”.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<bugzilla href="https://bugzilla.suse.com/1136598">SUSE bug 1136598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155298">SUSE bug 1155298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in drm_load_edid_firmware in drivers/gpu/drm/drm_edid_load.c in the Linux kernel through 5.1.5. There is an unchecked kstrdup of fwstr, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: The vendor disputes this issues as not being a vulnerability because kstrdup() returning NULL is handled sufficiently and there is no chance for a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<bugzilla href="https://bugzilla.suse.com/1136586">SUSE bug 1136586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155298">SUSE bug 1155298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12387</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12387" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12387" ref_url="https://www.suse.com/security/cve/CVE-2019-12387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1760-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00042.html" source="SUSE-SU"/>
    <description>
    In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12387/">CVE-2019-12387</cve>
	<bugzilla href="https://bugzilla.suse.com/1137825">SUSE bug 1137825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595058" comment="python-Twisted-15.2.1-9.5.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12399</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12399" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12399" ref_url="https://www.suse.com/security/cve/CVE-2019-12399" source="SUSE CVE"/>
    <description>
    When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issue a request to the same Connect cluster to obtain the connector's task configuration and the response will contain the plaintext secret rather than the externalized secrets variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12399/">CVE-2019-12399</cve>
	<bugzilla href="https://bugzilla.suse.com/1160854">SUSE bug 1160854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339374" comment="kafka is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12418" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0226-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html" source="SUSE-SU"/>
    <description>
    When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<bugzilla href="https://bugzilla.suse.com/1159723">SUSE bug 1159723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12420" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0551-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXHYC7MWI2M6Y32ROZZBS5HOZOAF2HAN/" source="SUSE-SU"/>
    <description>
    In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420</cve>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186513">SUSE bug 1186513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334005" comment="spamassassin is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552206" comment="perl-Mail-SpamAssassin-3.4.5-44.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552207" comment="spamassassin-3.4.5-44.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1650-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00076.html" source="SUSE-SU"/>
    <description>
    file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142126">SUSE bug 1142126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521549" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521550" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521551" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521553" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521554" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521555" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521556" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521557" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521558" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521559" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521560" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551161" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551162" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551163" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551164" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551165" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551166" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551167" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551168" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551169" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551170" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551171" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521548" comment="glib2-lang-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594991" comment="glib2-tools-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594992" comment="libgio-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551163" comment="libgio-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594993" comment="libglib-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551165" comment="libglib-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594994" comment="libgmodule-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551167" comment="libgmodule-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594995" comment="libgobject-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551169" comment="libgobject-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594996" comment="libgthread-2_0-0-2.48.2-12.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551171" comment="libgthread-2_0-0-32bit-2.48.2-12.12.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12455</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12455" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12455" ref_url="https://www.suse.com/security/cve/CVE-2019-12455" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue because “The memory allocation that was not checked is part of a code that only runs at boot time, before user processes are started. Therefore, there is no possibility for an unprivileged user to control it, and no denial of service.”.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12455/">CVE-2019-12455</cve>
	<bugzilla href="https://bugzilla.suse.com/1136946">SUSE bug 1136946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12456" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in the MPT3COMMAND case in _ctl_ioctl_main in drivers/scsi/mpt3sas/mpt3sas_ctl.c in the Linux kernel through 5.1.5. It allows local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a "double fetch" vulnerability. NOTE: a third party reports that this is unexploitable because the doubly fetched value is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<bugzilla href="https://bugzilla.suse.com/1136922">SUSE bug 1136922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136993">SUSE bug 1136993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12519" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expression, it could either evaluate the top of the stack, or add a new member to the stack. When adding a new member, there is no check to ensure that the stack won't overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551443" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595569" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12520" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12520" ref_url="https://www.suse.com/security/cve/CVE-2019-12520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.7 and 5. When receiving a request, Squid checks its cache to see if it can serve up a response. It does this by making a MD5 hash of the absolute URL of the request. If found, it servers the request. The absolute URL can include the decoded UserInfo (username and password) for certain protocols. This decoded info is prepended to the domain. This allows an attacker to provide a username that has special characters to delimit the domain, and treat the rest of the URL as a path or query string. An attacker could first make a request to their domain using an encoded username, then when a request for the target domain comes in that decodes to the exact URL, it will serve the attacker's HTML instead of the real HTML. On Squid servers that also act as reverse proxies, this allows an attacker to gain access to features that only reverse proxies can use, such as ESI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12520/">CVE-2019-12520</cve>
	<bugzilla href="https://bugzilla.suse.com/1169666">SUSE bug 1169666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551443" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595569" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12521" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addStackElement has a check for the number of elements in this buffer, but it's off by 1, leading to a Heap Overflow of 1 element. The overflow is within the same structure so it can't affect adjacent memory blocks, and thus just leads to a crash while processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<bugzilla href="https://bugzilla.suse.com/1169659">SUSE bug 1169659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551443" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595569" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12523" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165586">SUSE bug 1165586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12524" ref_url="https://www.suse.com/security/cve/CVE-2019-12524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.7. When handling requests from users, Squid checks its rules to see if the request should be denied. Squid by default comes with rules to block access to the Cache Manager, which serves detailed server information meant for the maintainer. This rule is implemented via url_regex. The handler for url_regex rules URL decodes an incoming request. This allows an attacker to encode their URL to bypass the url_regex check, and gain access to the blocked resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12524/">CVE-2019-12524</cve>
	<bugzilla href="https://bugzilla.suse.com/1169666">SUSE bug 1169666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170423">SUSE bug 1170423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551443" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595569" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12525" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2089-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 3.3.9 through 3.5.28 and 4.x through 4.7. When Squid is configured to use Digest authentication, it parses the header Proxy-Authorization. It searches for certain tokens such as domain, uri, and qop. Squid checks if this token's value starts with a quote and ends with one. If so, it performs a memcpy of its length minus 2. Squid never checks whether the value is just a single quote (which would satisfy its requirements), leading to a memcpy of its length minus 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<bugzilla href="https://bugzilla.suse.com/1141332">SUSE bug 1141332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530622" comment="squid-3.5.21-26.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551210" comment="squid-3.5.21-26.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595070" comment="squid-3.5.21-26.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12526" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<bugzilla href="https://bugzilla.suse.com/1156326">SUSE bug 1156326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12528" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<bugzilla href="https://bugzilla.suse.com/1162689">SUSE bug 1162689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12529" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2089-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 2.x through 2.7.STABLE9, 3.x through 3.5.28, and 4.x through 4.7. When Squid is configured to use Basic Authentication, the Proxy-Authorization header is parsed via uudecode. uudecode determines how many bytes will be decoded by iterating over the input and checking its table. The length is then used to start decoding the string. There are no checks to ensure that the length it calculates isn't greater than the input buffer. This leads to adjacent memory being decoded as well. An attacker would not be able to retrieve the decoded data unless the Squid maintainer had configured the display of usernames on error pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<bugzilla href="https://bugzilla.suse.com/1141329">SUSE bug 1141329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530622" comment="squid-3.5.21-26.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551210" comment="squid-3.5.21-26.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595070" comment="squid-3.5.21-26.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-&gt;name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<bugzilla href="https://bugzilla.suse.com/1137194">SUSE bug 1137194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12625" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522401" comment="clamav-0.100.3-33.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548845" comment="clamav-0.100.3-33.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595286" comment="clamav-0.100.3-33.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1551-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1561-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1562-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1759-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1796-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1997-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00075.html" source="SUSE-SU"/>
    <description>
    getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521427" comment="gvim-7.4.326-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521428" comment="vim-7.4.326-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546416" comment="gvim-7.4.326-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546417" comment="vim-7.4.326-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594949" comment="gvim-7.4.326-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594950" comment="vim-7.4.326-17.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521429" comment="vim-data-7.4.326-17.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006978.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1604-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1671-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1750-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html" source="SUSE-SU"/>
    <description>
    dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530566" comment="dbus-1-1.8.22-24.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530567" comment="dbus-1-x11-1.8.22-24.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530568" comment="libdbus-1-3-1.8.22-24.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530569" comment="libdbus-1-3-32bit-1.8.22-24.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546447" comment="dbus-1-1.8.22-24.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546448" comment="dbus-1-x11-1.8.22-24.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546449" comment="libdbus-1-3-1.8.22-24.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546450" comment="libdbus-1-3-32bit-1.8.22-24.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594967" comment="dbus-1-1.8.22-24.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594968" comment="dbus-1-x11-1.8.22-24.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594969" comment="libdbus-1-3-1.8.22-24.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546450" comment="libdbus-1-3-32bit-1.8.22-24.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12781</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12781" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12781" ref_url="https://www.suse.com/security/cve/CVE-2019-12781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12781/">CVE-2019-12781</cve>
	<bugzilla href="https://bugzilla.suse.com/1124991">SUSE bug 1124991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139945">SUSE bug 1139945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595146" comment="python-Django-1.8.19-3.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12817</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12817" ref_url="https://www.suse.com/security/cve/CVE-2019-12817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-12817/">CVE-2019-12817</cve>
	<bugzilla href="https://bugzilla.suse.com/1138263">SUSE bug 1138263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138264">SUSE bug 1138264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12818" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<bugzilla href="https://bugzilla.suse.com/1138293">SUSE bug 1138293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1823-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1852-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191852-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<bugzilla href="https://bugzilla.suse.com/1138291">SUSE bug 1138291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530581" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530582" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530583" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530587" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551172" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551173" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551174" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551176" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536991" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595006" comment="kernel-default-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595007" comment="kernel-default-base-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595008" comment="kernel-default-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551175" comment="kernel-default-man-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530584" comment="kernel-devel-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530585" comment="kernel-macros-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530586" comment="kernel-source-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595009" comment="kernel-syms-4.4.121-92.117.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530588" comment="kgraft-patch-4_4_121-92_117-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12855</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12855" ref_url="https://www.suse.com/security/cve/CVE-2019-12855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2068-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2110-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00028.html" source="SUSE-SU"/>
    <description>
    In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12855/">CVE-2019-12855</cve>
	<bugzilla href="https://bugzilla.suse.com/1138461">SUSE bug 1138461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595164" comment="python-Twisted-15.2.1-9.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2004-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192004-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1781-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1918-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522027" comment="bzip2-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522028" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522029" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548657" comment="bzip2-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552011" comment="clamav-0.103.0-33.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548658" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548659" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595038" comment="bzip2-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530613" comment="bzip2-doc-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596164" comment="clamav-0.103.0-33.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595039" comment="libbz2-1-1.0.6-30.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548659" comment="libbz2-1-32bit-1.0.6-30.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972</cve>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<bugzilla href="https://bugzilla.suse.com/1140359">SUSE bug 1140359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334148" comment="openjpeg2 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548750" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548751" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595169" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595170" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974</cve>
	<bugzilla href="https://bugzilla.suse.com/1140111">SUSE bug 1140111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975</cve>
	<bugzilla href="https://bugzilla.suse.com/1140106">SUSE bug 1140106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976</cve>
	<bugzilla href="https://bugzilla.suse.com/1140110">SUSE bug 1140110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12977" ref_url="https://www.suse.com/security/cve/CVE-2019-12977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12977/">CVE-2019-12977</cve>
	<bugzilla href="https://bugzilla.suse.com/1139884">SUSE bug 1139884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978</cve>
	<bugzilla href="https://bugzilla.suse.com/1139885">SUSE bug 1139885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979</cve>
	<bugzilla href="https://bugzilla.suse.com/1139886">SUSE bug 1139886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13012" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13012" ref_url="https://www.suse.com/security/cve/CVE-2019-13012" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1830-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1749-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00022.html" source="SUSE-SU"/>
    <description>
    The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb-&gt;dir, NULL, NULL) and files using g_file_replace_contents (kfsb-&gt;file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13012/">CVE-2019-13012</cve>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142126">SUSE bug 1142126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521944" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521945" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521946" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521948" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521949" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521950" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521951" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521952" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521953" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521954" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521955" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551177" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551178" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551179" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551180" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551181" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551182" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551183" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551184" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551185" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551186" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551187" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521943" comment="glib2-lang-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595010" comment="glib2-tools-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595011" comment="libgio-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551179" comment="libgio-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595012" comment="libglib-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551181" comment="libglib-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595013" comment="libgmodule-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551183" comment="libgmodule-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595014" comment="libgobject-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551185" comment="libgobject-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595015" comment="libgthread-2_0-0-2.48.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551187" comment="libgthread-2_0-0-32bit-2.48.2-12.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13117</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html" source="SUSE-SU"/>
    <description>
    In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117</cve>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596252" comment="crowbar-core-4.0+git.1574788924.e4a6aeb0c-9.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596253" comment="crowbar-core-branding-upstream-4.0+git.1574788924.e4a6aeb0c-9.60.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596254" comment="crowbar-openstack-4.0+git.1574869671.9c7bade2d-9.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596255" comment="grafana-monasca-ui-drilldown-1.5.5~dev3-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596256" comment="openstack-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596257" comment="openstack-monasca-api-1.7.1~dev18-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596258" comment="openstack-monasca-log-api-1.4.3~dev3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596259" comment="openstack-neutron-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596260" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596261" comment="openstack-neutron-doc-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596262" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596263" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596264" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596265" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596266" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596267" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596268" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596269" comment="openstack-neutron-server-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596270" comment="python-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596271" comment="python-monasca-api-1.7.1~dev18-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596272" comment="python-monasca-log-api-1.4.3~dev3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596273" comment="python-neutron-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596274" comment="ruby2.1-rubygem-puma-2.16.0-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadBMPImage in coders/bmp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133</cve>
	<bugzilla href="https://bugzilla.suse.com/1140100">SUSE bug 1140100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13134" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134</cve>
	<bugzilla href="https://bugzilla.suse.com/1140102">SUSE bug 1140102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135</cve>
	<bugzilla href="https://bugzilla.suse.com/1140103">SUSE bug 1140103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13136" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13136" ref_url="https://www.suse.com/security/cve/CVE-2019-13136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13136/">CVE-2019-13136</cve>
	<bugzilla href="https://bugzilla.suse.com/1140104">SUSE bug 1140104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13137" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13137" ref_url="https://www.suse.com/security/cve/CVE-2019-13137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13137/">CVE-2019-13137</cve>
	<bugzilla href="https://bugzilla.suse.com/1140105">SUSE bug 1140105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html" source="SUSE-SU"/>
    <description>
    qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530651" comment="qemu-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530652" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530654" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530655" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530657" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530658" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530661" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551230" comment="qemu-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551231" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551232" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551233" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551234" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551235" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537091" comment="qemu-ppc-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551236" comment="qemu-s390-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551237" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595100" comment="qemu-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595101" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595102" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595103" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551234" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595104" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551236" comment="qemu-s390-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595105" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13173</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1846-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1907-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html" source="SUSE-SU"/>
    <description>
    fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173</cve>
	<bugzilla href="https://bugzilla.suse.com/1140290">SUSE bug 1140290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595116" comment="nodejs6-6.17.0-11.27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13233" ref_url="https://www.suse.com/security/cve/CVE-2019-13233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html" source="SUSE-SU"/>
    <description>
    In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13233/">CVE-2019-13233</cve>
	<bugzilla href="https://bugzilla.suse.com/1140454">SUSE bug 1140454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144502">SUSE bug 1144502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13272" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13272" ref_url="https://www.suse.com/security/cve/CVE-2019-13272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006246.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13272/">CVE-2019-13272</cve>
	<bugzilla href="https://bugzilla.suse.com/1140671">SUSE bug 1140671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156321">SUSE bug 1156321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198122">SUSE bug 1198122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552429" comment="kgraft-patch-4_4_121-92_101-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552430" comment="kgraft-patch-4_4_121-92_104-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552431" comment="kgraft-patch-4_4_121-92_109-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552432" comment="kgraft-patch-4_4_121-92_114-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552433" comment="kgraft-patch-4_4_121-92_117-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552434" comment="kgraft-patch-4_4_121-92_120-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537243" comment="kgraft-patch-4_4_121-92_101-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537244" comment="kgraft-patch-4_4_121-92_104-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537245" comment="kgraft-patch-4_4_121-92_109-default-7-2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537246" comment="kgraft-patch-4_4_121-92_114-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537247" comment="kgraft-patch-4_4_121-92_117-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537248" comment="kgraft-patch-4_4_121-92_120-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295</cve>
	<bugzilla href="https://bugzilla.suse.com/1140664">SUSE bug 1140664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13296" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13296" ref_url="https://www.suse.com/security/cve/CVE-2019-13296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13296/">CVE-2019-13296</cve>
	<bugzilla href="https://bugzilla.suse.com/1140665">SUSE bug 1140665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297</cve>
	<bugzilla href="https://bugzilla.suse.com/1140666">SUSE bug 1140666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13298" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13298" ref_url="https://www.suse.com/security/cve/CVE-2019-13298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13298/">CVE-2019-13298</cve>
	<bugzilla href="https://bugzilla.suse.com/1140667">SUSE bug 1140667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13299" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13299" ref_url="https://www.suse.com/security/cve/CVE-2019-13299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13299/">CVE-2019-13299</cve>
	<bugzilla href="https://bugzilla.suse.com/1140668">SUSE bug 1140668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300</cve>
	<bugzilla href="https://bugzilla.suse.com/1140669">SUSE bug 1140669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301</cve>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13302" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13302" ref_url="https://www.suse.com/security/cve/CVE-2019-13302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13302/">CVE-2019-13302</cve>
	<bugzilla href="https://bugzilla.suse.com/1140552">SUSE bug 1140552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13303" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13303" ref_url="https://www.suse.com/security/cve/CVE-2019-13303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13303/">CVE-2019-13303</cve>
	<bugzilla href="https://bugzilla.suse.com/1140549">SUSE bug 1140549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304</cve>
	<bugzilla href="https://bugzilla.suse.com/1140547">SUSE bug 1140547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305</cve>
	<bugzilla href="https://bugzilla.suse.com/1140545">SUSE bug 1140545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306</cve>
	<bugzilla href="https://bugzilla.suse.com/1140543">SUSE bug 1140543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307</cve>
	<bugzilla href="https://bugzilla.suse.com/1140538">SUSE bug 1140538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13308" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308</cve>
	<bugzilla href="https://bugzilla.suse.com/1140534">SUSE bug 1140534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310</cve>
	<bugzilla href="https://bugzilla.suse.com/1140501">SUSE bug 1140501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140520">SUSE bug 1140520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311</cve>
	<bugzilla href="https://bugzilla.suse.com/1140513">SUSE bug 1140513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140554">SUSE bug 1140554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13345" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2089-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1963-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    The cachemgr.cgi web module of Squid through 4.7 has XSS via the user_name or auth parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<bugzilla href="https://bugzilla.suse.com/1140738">SUSE bug 1140738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530622" comment="squid-3.5.21-26.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551210" comment="squid-3.5.21-26.17.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595070" comment="squid-3.5.21-26.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13391" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13391" ref_url="https://www.suse.com/security/cve/CVE-2019-13391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13391/">CVE-2019-13391</cve>
	<bugzilla href="https://bugzilla.suse.com/1140673">SUSE bug 1140673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2010-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192010-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454</cve>
	<bugzilla href="https://bugzilla.suse.com/1141171">SUSE bug 1141171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13456" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007316.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html" source="SUSE-SU"/>
    <description>
    In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragonblood" attack and CVE-2019-9494.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456</cve>
	<bugzilla href="https://bugzilla.suse.com/1144524">SUSE bug 1144524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166858">SUSE bug 1166858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531242" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531243" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531244" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531245" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531246" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531247" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531248" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531249" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531250" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531251" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531252" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551653" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551654" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551655" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551656" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551657" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551658" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551659" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551660" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551661" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551662" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551663" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595743" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595744" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595745" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595746" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595747" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595748" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595749" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595750" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595751" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595752" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595753" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it allows overwriting arbitrary paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1350" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158788">SUSE bug 1158788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1351" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158789">SUSE bug 1158789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1352" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158787">SUSE bug 1158787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158790">SUSE bug 1158790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1353" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as "WSL") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158791">SUSE bug 1158791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1354" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158792">SUSE bug 1158792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006291.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0022-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00018.html" source="SUSE-SU"/>
    <description>
    It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522236" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522237" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530714" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530715" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548752" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548753" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548754" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548755" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595175" comment="libgcrypt20-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548753" comment="libgcrypt20-32bit-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595176" comment="libgcrypt20-hmac-1.6.1-16.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548755" comment="libgcrypt20-hmac-32bit-1.6.1-16.68.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In parse_hid_report_descriptor in drivers/input/tablet/gtco.c in the Linux kernel through 5.2.1, a malicious USB device can send an HID report that triggers an out-of-bounds write during generation of debugging messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<bugzilla href="https://bugzilla.suse.com/1142023">SUSE bug 1142023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13722" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548857" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548858" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548859" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595351" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595352" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595353" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1387" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158793">SUSE bug 1158793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14232</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14232" ref_url="https://www.suse.com/security/cve/CVE-2019-14232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14232/">CVE-2019-14232</cve>
	<bugzilla href="https://bugzilla.suse.com/1142880">SUSE bug 1142880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595115" comment="python-Django-1.8.19-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14233</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14233" ref_url="https://www.suse.com/security/cve/CVE-2019-14233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14233/">CVE-2019-14233</cve>
	<bugzilla href="https://bugzilla.suse.com/1142882">SUSE bug 1142882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595115" comment="python-Django-1.8.19-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14234</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14234" ref_url="https://www.suse.com/security/cve/CVE-2019-14234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14234/">CVE-2019-14234</cve>
	<bugzilla href="https://bugzilla.suse.com/1142883">SUSE bug 1142883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595115" comment="python-Django-1.8.19-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14235</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14235" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14235" ref_url="https://www.suse.com/security/cve/CVE-2019-14235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2257-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192257-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005894.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1839-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14235/">CVE-2019-14235</cve>
	<bugzilla href="https://bugzilla.suse.com/1142885">SUSE bug 1142885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595115" comment="python-Django-1.8.19-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14241</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14241" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14241" ref_url="https://www.suse.com/security/cve/CVE-2019-14241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2556-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00062.html" source="SUSE-SU"/>
    <description>
    HAProxy through 2.0.2 allows attackers to cause a denial of service (ha_panic) via vectors related to htx_manage_client_side_cookies in proto_htx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-14241/">CVE-2019-14241</cve>
	<bugzilla href="https://bugzilla.suse.com/1142529">SUSE bug 1142529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.32. simple_object_elf_match in simple-object-elf.c does not check for a zero shstrndx value, leading to an integer overflow and resultant heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531700" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531702" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531704" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531706" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531708" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531710" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531712" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531717" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531719" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531721" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549030" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549031" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549032" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549033" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549034" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549035" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549036" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549037" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549038" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549039" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549040" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549041" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549042" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549043" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537986" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537987" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549044" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549045" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549046" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537990" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549047" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549048" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596172" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549031" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596173" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549033" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596174" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549035" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596175" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549037" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596176" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549039" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596177" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549041" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596178" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549043" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596179" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549045" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596180" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596181" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549048" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531700" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531702" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531704" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531706" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531708" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531710" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531712" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531717" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531719" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531721" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1923-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1924-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be called. It can be triggered by an unprivileged local user even when a floppy disk has not been inserted. NOTE: QEMU creates the floppy device by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<bugzilla href="https://bugzilla.suse.com/1143189">SUSE bug 1143189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143191">SUSE bug 1143191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2656-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192656-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2316-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2333-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00047.html" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156093">SUSE bug 1156093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530718" comment="sudo-1.8.10p3-10.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551270" comment="sudo-1.8.10p3-10.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595183" comment="sudo-1.8.10p3-10.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14293" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14293" ref_url="https://www.suse.com/security/cve/CVE-2019-14293" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xpdf 4.01.01. There is an out of bounds read in the function GfxPatchMeshShading::parse at GfxState.cc for typeA!=6 case 2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14293/">CVE-2019-14293</cve>
	<bugzilla href="https://bugzilla.suse.com/1143571">SUSE bug 1143571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
    <description>
    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530651" comment="qemu-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530652" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530654" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530655" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530657" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530658" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530661" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551230" comment="qemu-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551231" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551232" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551233" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551234" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551235" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537091" comment="qemu-ppc-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551236" comment="qemu-s390-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551237" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595100" comment="qemu-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595101" comment="qemu-block-curl-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530653" comment="qemu-block-rbd-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595102" comment="qemu-block-ssh-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595103" comment="qemu-guest-agent-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530656" comment="qemu-ipxe-1.0.0-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551234" comment="qemu-kvm-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595104" comment="qemu-lang-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551236" comment="qemu-s390-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530659" comment="qemu-seabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530660" comment="qemu-sgabios-8-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595105" comment="qemu-tools-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530662" comment="qemu-vgabios-1.9.1-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530663" comment="qemu-x86-2.6.2-41.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14444" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    apply_relocations in readelf.c in GNU Binutils 2.32 contains an integer overflow that allows attackers to trigger a write access violation (in byte_put_little_endian function in elfcomm.c) via an ELF file, as demonstrated by readelf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444</cve>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14513</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14513" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14513" ref_url="https://www.suse.com/security/cve/CVE-2019-14513" source="SUSE CVE"/>
    <description>
    Improper bounds checking in Dnsmasq before 2.76 allows an attacker controlled DNS server to send large DNS packets that result in a read operation beyond the buffer allocated for the packet, a different vulnerability than CVE-2017-14491.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14513/">CVE-2019-14513</cve>
	<bugzilla href="https://bugzilla.suse.com/1143944">SUSE bug 1143944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338972" comment="dnsmasq is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0622-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00020.html" source="SUSE-SU"/>
    <description>
    Uncontrolled resource consumption in EDK II may allow an unauthenticated user to potentially enable denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<bugzilla href="https://bugzilla.suse.com/1163927">SUSE bug 1163927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531453" comment="ovmf-2015+git1462940744.321151f-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531454" comment="ovmf-tools-2015+git1462940744.321151f-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531455" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14562" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1525-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00091.html" source="SUSE-SU"/>
    <description>
    Integer overflow in DxeImageVerificationHandler() EDK II may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562</cve>
	<bugzilla href="https://bugzilla.suse.com/1175476">SUSE bug 1175476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531453" comment="ovmf-2015+git1462940744.321151f-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531454" comment="ovmf-tools-2015+git1462940744.321151f-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531455" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006617.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563</cve>
	<bugzilla href="https://bugzilla.suse.com/1163959">SUSE bug 1163959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009538002" comment="ovmf-2015+git1462940744.321151f-19.10.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538003" comment="ovmf-tools-2015+git1462940744.321151f-19.10.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538004" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.10.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14575" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006617.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0314-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00014.html" source="SUSE-SU"/>
    <description>
    Logic issue in DxeImageVerificationHandler() for EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575</cve>
	<bugzilla href="https://bugzilla.suse.com/1163969">SUSE bug 1163969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009538002" comment="ovmf-2015+git1462940744.321151f-19.10.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538003" comment="ovmf-tools-2015+git1462940744.321151f-19.10.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538004" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.10.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14584" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2314-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7TLVCW5VHXA7SSOSARLTBRZWC5MH642/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7Y57O2IBBHBOVJBEVV6JAOZWLGF53QFS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2IF5TPLLS7U2RNC42HXIHTRUMS4Q6YV/" source="SUSE-SU"/>
    <description>
    Null pointer dereference in Tianocore EDK2 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584</cve>
	<bugzilla href="https://bugzilla.suse.com/1177789">SUSE bug 1177789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334152" comment="ovmf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552383" comment="ovmf-2015+git1462940744.321151f-19.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552384" comment="ovmf-tools-2015+git1462940744.321151f-19.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552385" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14763" ref_url="https://www.suse.com/security/cve/CVE-2019-14763" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14763/">CVE-2019-14763</cve>
	<bugzilla href="https://bugzilla.suse.com/1144918">SUSE bug 1144918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548750" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548751" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595169" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595170" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548750" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548751" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595169" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595170" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548750" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548751" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595169" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595170" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173664">SUSE bug 1173664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173666">SUSE bug 1173666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<bugzilla href="https://bugzilla.suse.com/1146882">SUSE bug 1146882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146884">SUSE bug 1146884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548750" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548751" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595169" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595170" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-&gt;first' and 'ring-&gt;last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<bugzilla href="https://bugzilla.suse.com/1151350">SUSE bug 1151350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2199-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00074.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<bugzilla href="https://bugzilla.suse.com/1150011">SUSE bug 1150011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334576" comment="ibus is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522144" comment="ibus-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522145" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522146" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522149" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522152" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551255" comment="ibus-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551256" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551257" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551258" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551259" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595147" comment="ibus-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595148" comment="ibus-gtk-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595149" comment="ibus-gtk3-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522148" comment="ibus-lang-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595150" comment="libibus-1_0-5-1.5.13-15.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595151" comment="typelib-1_0-IBus-1_0-1.5.13-15.11.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14834</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14834" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2669-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00027.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834</cve>
	<bugzilla href="https://bugzilla.suse.com/1154849">SUSE bug 1154849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596183" comment="dnsmasq-utils-2.78-18.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<bugzilla href="https://bugzilla.suse.com/1150112">SUSE bug 1150112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151021">SUSE bug 1151021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552421" comment="kgraft-patch-4_4_121-92_101-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552420" comment="kgraft-patch-4_4_121-92_104-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552419" comment="kgraft-patch-4_4_121-92_109-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552418" comment="kgraft-patch-4_4_121-92_114-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552417" comment="kgraft-patch-4_4_121-92_117-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552416" comment="kgraft-patch-4_4_121-92_120-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552414" comment="kgraft-patch-4_4_121-92_95-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552415" comment="kgraft-patch-4_4_121-92_98-default-7-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537167" comment="kgraft-patch-4_4_121-92_101-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537166" comment="kgraft-patch-4_4_121-92_104-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537165" comment="kgraft-patch-4_4_121-92_109-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537164" comment="kgraft-patch-4_4_121-92_114-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537163" comment="kgraft-patch-4_4_121-92_117-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537162" comment="kgraft-patch-4_4_121-92_120-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537160" comment="kgraft-patch-4_4_121-92_95-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537161" comment="kgraft-patch-4_4_121-92_98-default-7-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14853</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14853" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00023.html" source="SUSE-SU"/>
    <description>
    An error-handling flaw was found in python-ecdsa before version 0.13.3. During signature decoding, malformed DER signatures could raise unexpected exceptions (or no exceptions at all), which could lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853</cve>
	<bugzilla href="https://bugzilla.suse.com/1153165">SUSE bug 1153165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525259" comment="python-ecdsa-0.13.3-5.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14859</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14859" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2472-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2474-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00023.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859</cve>
	<bugzilla href="https://bugzilla.suse.com/1154217">SUSE bug 1154217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525259" comment="python-ecdsa-0.13.3-5.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14864</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14864" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14864" ref_url="https://www.suse.com/security/cve/CVE-2019-14864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0523-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html" source="SUSE-SU"/>
    <description>
    Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14864/">CVE-2019-14864</cve>
	<bugzilla href="https://bugzilla.suse.com/1154830">SUSE bug 1154830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2535-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00050.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<bugzilla href="https://bugzilla.suse.com/1156275">SUSE bug 1156275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522381" comment="ghostscript-9.27-23.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522382" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548836" comment="ghostscript-9.27-23.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548837" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595275" comment="ghostscript-9.27-23.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595276" comment="ghostscript-x11-9.27-23.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173660">SUSE bug 1173660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552460" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537678" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14896" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552458" comment="kgraft-patch-4_4_121-92_101-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552457" comment="kgraft-patch-4_4_121-92_104-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552456" comment="kgraft-patch-4_4_121-92_109-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552455" comment="kgraft-patch-4_4_121-92_114-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552454" comment="kgraft-patch-4_4_121-92_117-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552453" comment="kgraft-patch-4_4_121-92_120-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552452" comment="kgraft-patch-4_4_121-92_125-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537569" comment="kgraft-patch-4_4_121-92_101-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537568" comment="kgraft-patch-4_4_121-92_104-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537567" comment="kgraft-patch-4_4_121-92_109-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537566" comment="kgraft-patch-4_4_121-92_114-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537565" comment="kgraft-patch-4_4_121-92_117-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537562" comment="kgraft-patch-4_4_121-92_120-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537561" comment="kgraft-patch-4_4_121-92_125-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14897" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552458" comment="kgraft-patch-4_4_121-92_101-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552457" comment="kgraft-patch-4_4_121-92_104-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552456" comment="kgraft-patch-4_4_121-92_109-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552455" comment="kgraft-patch-4_4_121-92_114-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552454" comment="kgraft-patch-4_4_121-92_117-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552453" comment="kgraft-patch-4_4_121-92_120-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552452" comment="kgraft-patch-4_4_121-92_125-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537569" comment="kgraft-patch-4_4_121-92_101-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537568" comment="kgraft-patch-4_4_121-92_104-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537567" comment="kgraft-patch-4_4_121-92_109-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537566" comment="kgraft-patch-4_4_121-92_114-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537565" comment="kgraft-patch-4_4_121-92_117-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537562" comment="kgraft-patch-4_4_121-92_120-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537561" comment="kgraft-patch-4_4_121-92_125-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552460" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537678" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14980" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980</cve>
	<bugzilla href="https://bugzilla.suse.com/1146068">SUSE bug 1146068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981</cve>
	<bugzilla href="https://bugzilla.suse.com/1146065">SUSE bug 1146065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15026</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15026" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15026" ref_url="https://www.suse.com/security/cve/CVE-2019-15026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0721-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html" source="SUSE-SU"/>
    <description>
    memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15026/">CVE-2019-15026</cve>
	<bugzilla href="https://bugzilla.suse.com/1149110">SUSE bug 1149110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15031" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15034" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15034" ref_url="https://www.suse.com/security/cve/CVE-2019-15034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15034/">CVE-2019-15034</cve>
	<bugzilla href="https://bugzilla.suse.com/1166379">SUSE bug 1166379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15043</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15043" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15043" ref_url="https://www.suse.com/security/cve/CVE-2019-15043" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html" source="SUSE-SU"/>
    <description>
    In Grafana 2.x through 6.x before 6.3.4, parts of the HTTP API allow unauthenticated use. This makes it possible to run a denial of service attack against the server running Grafana.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15043/">CVE-2019-15043</cve>
	<bugzilla href="https://bugzilla.suse.com/1148383">SUSE bug 1148383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595190" comment="novnc-1.0.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595191" comment="openstack-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595192" comment="openstack-keystone-doc-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595198" comment="openstack-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595199" comment="openstack-neutron-lbaas-agent-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595200" comment="openstack-neutron-lbaas-doc-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595223" comment="python-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595225" comment="python-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595229" comment="python-urllib3-1.16-3.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595230" comment="ruby2.1-rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595231" comment="ruby2.1-rubygem-easy_diff-1.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595232" comment="rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595233" comment="sleshammer-aarch64-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595234" comment="sleshammer-ppc64le-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595235" comment="sleshammer-s390x-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595236" comment="sleshammer-x86_64-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15090" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15090" ref_url="https://www.suse.com/security/cve/CVE-2019-15090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/scsi/qedi/qedi_dbg.c in the Linux kernel before 5.1.12. In the qedi_dbg_* family of functions, there is an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15090/">CVE-2019-15090</cve>
	<bugzilla href="https://bugzilla.suse.com/1146399">SUSE bug 1146399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15099" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<bugzilla href="https://bugzilla.suse.com/1146368">SUSE bug 1146368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<bugzilla href="https://bugzilla.suse.com/1145920">SUSE bug 1145920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173934">SUSE bug 1173934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<bugzilla href="https://bugzilla.suse.com/1145922">SUSE bug 1145922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<bugzilla href="https://bugzilla.suse.com/1146213">SUSE bug 1146213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<bugzilla href="https://bugzilla.suse.com/1146212">SUSE bug 1146212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15141" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_dirwrite.c of LibTIFF. NOTE: this occurs because of an incomplete fix for CVE-2019-11597.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<bugzilla href="https://bugzilla.suse.com/1146211">SUSE bug 1146211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15165" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2343-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html" source="SUSE-SU"/>
    <description>
    sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<bugzilla href="https://bugzilla.suse.com/1153332">SUSE bug 1153332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522250" comment="libpcap1-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522252" comment="tcpdump-4.9.2-14.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548763" comment="libpcap1-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548764" comment="tcpdump-4.9.2-14.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595184" comment="libpcap1-1.8.1-10.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595185" comment="tcpdump-4.9.2-14.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15211" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15212" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<bugzilla href="https://bugzilla.suse.com/1146391">SUSE bug 1146391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146544">SUSE bug 1146544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146550">SUSE bug 1146550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15215" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<bugzilla href="https://bugzilla.suse.com/1146425">SUSE bug 1146425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15216" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<bugzilla href="https://bugzilla.suse.com/1146361">SUSE bug 1146361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146547">SUSE bug 1146547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<bugzilla href="https://bugzilla.suse.com/1146413">SUSE bug 1146413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15219" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146524">SUSE bug 1146524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146526">SUSE bug 1146526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146529">SUSE bug 1146529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15222" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15222" ref_url="https://www.suse.com/security/cve/CVE-2019-15222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15222/">CVE-2019-15222</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146531">SUSE bug 1146531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15224</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15224" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15224" ref_url="https://www.suse.com/security/cve/CVE-2019-15224" source="SUSE CVE"/>
    <description>
    The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions &lt;=1.6.9 and &gt;=1.6.14 are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15224/">CVE-2019-15224</cve>
	<bugzilla href="https://bugzilla.suse.com/1146313">SUSE bug 1146313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009340774" comment="rubygem-rest-client is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239</cve>
	<bugzilla href="https://bugzilla.suse.com/1146589">SUSE bug 1146589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156317">SUSE bug 1156317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15290" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15292" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a use-after-free in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292</cve>
	<bugzilla href="https://bugzilla.suse.com/1146678">SUSE bug 1146678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173939">SUSE bug 1173939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" source="SUSE-SU"/>
    <description>
    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154166">SUSE bug 1154166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161085">SUSE bug 1161085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334018" comment="openssl is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530702" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530703" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530704" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530705" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530706" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530707" comment="openssl-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551260" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551261" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551262" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551263" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551264" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551265" comment="openssl-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595153" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595154" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551262" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595155" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551264" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595156" comment="openssl-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
    <description>
    OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549</cve>
	<bugzilla href="https://bugzilla.suse.com/1150247">SUSE bug 1150247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15504" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504" source="SUSE CVE"/>
    <description>
    drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504</cve>
	<bugzilla href="https://bugzilla.suse.com/1147116">SUSE bug 1147116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185852">SUSE bug 1185852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15505" ref_url="https://www.suse.com/security/cve/CVE-2019-15505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
    <description>
    drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15505/">CVE-2019-15505</cve>
	<bugzilla href="https://bugzilla.suse.com/1147122">SUSE bug 1147122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html" source="SUSE-SU"/>
    <description>
    There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334018" comment="openssl is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531729" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531730" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531731" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531732" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531733" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531734" comment="openssl-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552026" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552027" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552028" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552029" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552030" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552031" comment="openssl-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596188" comment="libopenssl-devel-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596189" comment="libopenssl1_0_0-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552028" comment="libopenssl1_0_0-32bit-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596190" comment="libopenssl1_0_0-hmac-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552030" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596191" comment="openssl-1.0.2j-60.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531735" comment="openssl-doc-1.0.2j-60.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1552" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1552" ref_url="https://www.suse.com/security/cve/CVE-2019-1552" source="SUSE CVE"/>
    <description>
    OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-1552/">CVE-2019-1552</cve>
	<bugzilla href="https://bugzilla.suse.com/1143552">SUSE bug 1143552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1432-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1637-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00173.html" source="SUSE-SU"/>
    <description>
    If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<bugzilla href="https://bugzilla.suse.com/1127080">SUSE bug 1127080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521711" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521712" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521713" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530874" comment="libopenssl1_0_0-hmac-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530875" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521714" comment="openssl-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530876" comment="openssl-doc-1.0.2j-60.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551390" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551391" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551392" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551393" comment="libopenssl1_0_0-hmac-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551394" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551395" comment="openssl-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530876" comment="openssl-doc-1.0.2j-60.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595486" comment="libopenssl-devel-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595487" comment="libopenssl1_0_0-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551392" comment="libopenssl1_0_0-32bit-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595488" comment="libopenssl1_0_0-hmac-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551394" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595502" comment="nodejs6-6.17.0-11.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595489" comment="openssl-1.0.2j-60.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530876" comment="openssl-doc-1.0.2j-60.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15604</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15604" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15604" ref_url="https://www.suse.com/security/cve/CVE-2019-15604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html" source="SUSE-SU"/>
    <description>
    Improper Certificate Validation in Node.js 10, 12, and 13 causes the process to abort when sending a crafted X.509 certificate
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15604/">CVE-2019-15604</cve>
	<bugzilla href="https://bugzilla.suse.com/1163104">SUSE bug 1163104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596192" comment="nodejs6-6.17.1-11.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15605</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html" source="SUSE-SU"/>
    <description>
    HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605</cve>
	<bugzilla href="https://bugzilla.suse.com/1163102">SUSE bug 1163102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596192" comment="nodejs6-6.17.1-11.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15606</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15606" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15606" ref_url="https://www.suse.com/security/cve/CVE-2019-15606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006531.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html" source="SUSE-SU"/>
    <description>
    Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15606/">CVE-2019-15606</cve>
	<bugzilla href="https://bugzilla.suse.com/1163103">SUSE bug 1163103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596192" comment="nodejs6-6.17.1-11.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2269-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" source="SUSE-SU"/>
    <description>
    In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334018" comment="openssl is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530702" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530703" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530704" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530705" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530706" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530707" comment="openssl-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551260" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551261" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551262" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551263" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551264" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551265" comment="openssl-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595153" comment="libopenssl-devel-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595154" comment="libopenssl1_0_0-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551262" comment="libopenssl1_0_0-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595155" comment="libopenssl1_0_0-hmac-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551264" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595156" comment="openssl-1.0.2j-60.55.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530708" comment="openssl-doc-1.0.2j-60.55.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15635</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15635" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15635" ref_url="https://www.suse.com/security/cve/CVE-2019-15635" source="SUSE CVE"/>
    <description>
    An issue was discovered in Grafana 5.4.0. Passwords for data sources used by Grafana (e.g., MySQL) are not encrypted. An admin user can reveal passwords for any data source by pressing the "Save and test" button within a data source's settings menu. When watching the transaction with Burp Proxy, the password for the data source is revealed and sent to the server. From a browser, a prompt to save the credentials is generated, and the password can be revealed by simply checking the "Show password" box.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15635/">CVE-2019-15635</cve>
	<bugzilla href="https://bugzilla.suse.com/1151804">SUSE bug 1151804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334411" comment="grafana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<bugzilla href="https://bugzilla.suse.com/1148394">SUSE bug 1148394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172140">SUSE bug 1172140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552451" comment="kgraft-patch-4_4_121-92_114-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552450" comment="kgraft-patch-4_4_121-92_117-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552449" comment="kgraft-patch-4_4_121-92_120-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537533" comment="kgraft-patch-4_4_121-92_114-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537532" comment="kgraft-patch-4_4_121-92_117-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537531" comment="kgraft-patch-4_4_121-92_120-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15681" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1164-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1071-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00073.html" source="SUSE-SU"/>
    <description>
    LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<bugzilla href="https://bugzilla.suse.com/1155419">SUSE bug 1155419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530919" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530920" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548967" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548968" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595546" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595547" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1164-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<bugzilla href="https://bugzilla.suse.com/1160471">SUSE bug 1160471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530919" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530920" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548967" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548968" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595546" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595547" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to stack use-after-return, which occurs due to incorrect usage of stack memory in ZRLEDecoder. If decoding routine would throw an exception, ZRLEDecoder may try to access stack variable, which has been already freed during the process of stack unwinding. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691</cve>
	<bugzilla href="https://bugzilla.suse.com/1159856">SUSE bug 1159856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551477" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551478" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551479" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595614" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595615" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595616" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow. Vulnerability could be triggered from CopyRectDecoder due to incorrect value checks. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692</cve>
	<bugzilla href="https://bugzilla.suse.com/1160250">SUSE bug 1160250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551477" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551478" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551479" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595614" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595615" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595616" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693</cve>
	<bugzilla href="https://bugzilla.suse.com/1159858">SUSE bug 1159858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551477" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551478" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551479" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595614" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595615" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595616" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which could be triggered from DecodeManager::decodeRect. Vulnerability occurs due to the signdness error in processing MemOutStream. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694</cve>
	<bugzilla href="https://bugzilla.suse.com/1160251">SUSE bug 1160251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551477" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551478" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551479" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595614" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595615" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595616" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0087-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00039.html" source="SUSE-SU"/>
    <description>
    TigerVNC version prior to 1.10.1 is vulnerable to stack buffer overflow, which could be triggered from CMsgReader::readSetCursor. This vulnerability occurs due to insufficient sanitization of PixelFormat. Since remote attacker can choose offset from start of the buffer to start writing his values, exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695</cve>
	<bugzilla href="https://bugzilla.suse.com/1159860">SUSE bug 1159860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531021" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531022" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531023" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551477" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551478" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551479" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595614" comment="libXvnc1-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595615" comment="tigervnc-1.6.0-18.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595616" comment="xorg-x11-Xvnc-1.6.0-18.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15753</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15753" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15753" ref_url="https://www.suse.com/security/cve/CVE-2019-15753" source="SUSE CVE"/>
    <description>
    In OpenStack os-vif 1.15.x before 1.15.2, and 1.16.0, a hard-coded MAC aging time of 0 disables MAC learning in linuxbridge, forcing obligatory Ethernet flooding of non-local destinations, which both impedes network performance and allows users to possibly view the content of packets for instances belonging to other tenants sharing the same network. Only deployments using the linuxbridge backend are affected. This occurs in PyRoute2.add() in internal/command/ip/linux/impl_pyroute2.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15753/">CVE-2019-15753</cve>
	<bugzilla href="https://bugzilla.suse.com/1148706">SUSE bug 1148706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339412" comment="python-os-vif is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15794</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15794" ref_url="https://www.suse.com/security/cve/CVE-2019-15794" source="SUSE CVE"/>
    <description>
    Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma-&gt;vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15794/">CVE-2019-15794</cve>
	<bugzilla href="https://bugzilla.suse.com/1158156">SUSE bug 1158156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15807" ref_url="https://www.suse.com/security/cve/CVE-2019-15807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15807/">CVE-2019-15807</cve>
	<bugzilla href="https://bugzilla.suse.com/1148938">SUSE bug 1148938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845</cve>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15847" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006488.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2364-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0716-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html" source="SUSE-SU"/>
    <description>
    The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<bugzilla href="https://bugzilla.suse.com/1149145">SUSE bug 1149145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531700" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531701" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531702" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531703" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531704" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531705" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531706" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531707" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531708" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531709" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531710" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531711" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531712" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531713" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531717" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531718" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531719" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531721" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531722" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549030" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549031" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549032" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549033" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549034" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549035" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549036" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549037" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549038" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549039" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549040" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549041" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549042" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549043" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537986" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537987" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549044" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549045" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549046" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537990" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549047" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549048" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596172" comment="libasan5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549031" comment="libasan5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596173" comment="libatomic1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549033" comment="libatomic1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596174" comment="libgcc_s1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549035" comment="libgcc_s1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596175" comment="libgfortran5-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549037" comment="libgfortran5-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596176" comment="libgo14-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549039" comment="libgo14-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596177" comment="libgomp1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549041" comment="libgomp1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596178" comment="libitm1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549043" comment="libitm1-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531714" comment="liblsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531715" comment="libquadmath0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531716" comment="libquadmath0-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596179" comment="libstdc++6-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549045" comment="libstdc++6-32bit-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596180" comment="libstdc++6-locale-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531720" comment="libtsan0-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596181" comment="libubsan1-9.2.1+r275327-1.3.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549048" comment="libubsan1-32bit-9.2.1+r275327-1.3.9 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530990" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530991" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530993" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530994" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530996" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530997" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531000" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551454" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551455" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551456" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551457" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551459" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537488" comment="qemu-ppc-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551461" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595592" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595593" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595594" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595595" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595596" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595597" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream "x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<bugzilla href="https://bugzilla.suse.com/1149376">SUSE bug 1149376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2204-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522293" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530726" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522294" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548768" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548769" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548770" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595240" comment="MozillaFirefox-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595241" comment="MozillaFirefox-devel-68.2.0-109.95.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595242" comment="MozillaFirefox-translations-common-68.2.0-109.95.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15917</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917</cve>
	<bugzilla href="https://bugzilla.suse.com/1149539">SUSE bug 1149539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156334">SUSE bug 1156334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15919</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15919" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15919" ref_url="https://www.suse.com/security/cve/CVE-2019-15919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15919/">CVE-2019-15919</cve>
	<bugzilla href="https://bugzilla.suse.com/1149552">SUSE bug 1149552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172957">SUSE bug 1172957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15920</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15920" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15920" ref_url="https://www.suse.com/security/cve/CVE-2019-15920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.10. SMB2_read in fs/cifs/smb2pdu.c has a use-after-free. NOTE: this was not fixed correctly in 5.0.10; see the 5.0.11 ChangeLog, which documents a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15920/">CVE-2019-15920</cve>
	<bugzilla href="https://bugzilla.suse.com/1149626">SUSE bug 1149626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156335">SUSE bug 1156335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15921</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15921" ref_url="https://www.suse.com/security/cve/CVE-2019-15921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15921/">CVE-2019-15921</cve>
	<bugzilla href="https://bugzilla.suse.com/1149602">SUSE bug 1149602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15922</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15922" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15922" ref_url="https://www.suse.com/security/cve/CVE-2019-15922" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a NULL pointer dereference for a pf data structure if alloc_disk fails in drivers/block/paride/pf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15922/">CVE-2019-15922</cve>
	<bugzilla href="https://bugzilla.suse.com/1149607">SUSE bug 1149607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15923</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15923" ref_url="https://www.suse.com/security/cve/CVE-2019-15923" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a NULL pointer dereference for a cd data structure if alloc_disk fails in drivers/block/paride/pf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15923/">CVE-2019-15923</cve>
	<bugzilla href="https://bugzilla.suse.com/1149609">SUSE bug 1149609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<bugzilla href="https://bugzilla.suse.com/1149612">SUSE bug 1149612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15925" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15925" ref_url="https://www.suse.com/security/cve/CVE-2019-15925" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. An out of bounds access exists in the function hclge_tm_schd_mode_vnet_base_cfg in the file drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15925/">CVE-2019-15925</cve>
	<bugzilla href="https://bugzilla.suse.com/1149532">SUSE bug 1149532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15926" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<bugzilla href="https://bugzilla.suse.com/1149527">SUSE bug 1149527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15927" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<bugzilla href="https://bugzilla.suse.com/1149522">SUSE bug 1149522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15961" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2668-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180082">SUSE bug 1180082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552011" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596164" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551688" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551689" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551690" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551691" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551692" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595786" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595787" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595788" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595789" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595790" comment="python3-devel-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334164" comment="python is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16088" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16088" ref_url="https://www.suse.com/security/cve/CVE-2019-16088" source="SUSE CVE"/>
    <description>
    Xpdf 3.04 has a SIGSEGV in XRef::fetch in XRef.cc after many recursive calls to Catalog::countPageTree in Catalog.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16088/">CVE-2019-16088</cve>
	<bugzilla href="https://bugzilla.suse.com/1150205">SUSE bug 1150205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16089" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16089" ref_url="https://www.suse.com/security/cve/CVE-2019-16089" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 5.2.13. nbd_genl_status in drivers/block/nbd.c does not check the nla_nest_start_noflag return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16089/">CVE-2019-16089</cve>
	<bugzilla href="https://bugzilla.suse.com/1150004">SUSE bug 1150004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16115" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16115" ref_url="https://www.suse.com/security/cve/CVE-2019-16115" source="SUSE CVE"/>
    <description>
    In Xpdf 4.01.01, a stack-based buffer under-read could be triggered in IdentityFunction::transform in Function.cc, used by GfxAxialShading::getColor. It can, for example, be triggered by sending a crafted PDF document to the pdftoppm tool. It allows an attacker to use a crafted PDF file to cause Denial of Service or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16115/">CVE-2019-16115</cve>
	<bugzilla href="https://bugzilla.suse.com/1150039">SUSE bug 1150039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334072" comment="poppler is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2298-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2300-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00033.html" source="SUSE-SU"/>
    <description>
    In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a "severe division by zero in the query planner."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168</cve>
	<bugzilla href="https://bugzilla.suse.com/1150137">SUSE bug 1150137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333982" comment="sqlite3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201</cve>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16229" ref_url="https://www.suse.com/security/cve/CVE-2019-16229" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: The security community disputes this issues as not being serious enough to be deserving a CVE id.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16229/">CVE-2019-16229</cve>
	<bugzilla href="https://bugzilla.suse.com/1150469">SUSE bug 1150469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16230" ref_url="https://www.suse.com/security/cve/CVE-2019-16230" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** drivers/gpu/drm/radeon/radeon_display.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: A third-party software maintainer states that the work queue allocation is happening during device initialization, which for a graphics card occurs during boot. It is not attacker controllable and OOM at that time is highly unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16230/">CVE-2019-16230</cve>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150468">SUSE bug 1150468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
    <description>
    drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254</cve>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165402">SUSE bug 1165402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255</cve>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334078" comment="ruby is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334051" comment="ruby2.1 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16275" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0545-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GHTARPJSUMITH7M3ESWRIZUIYW5UAM6/" source="SUSE-SU"/>
    <description>
    hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531899" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552105" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596372" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16413" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16413" ref_url="https://www.suse.com/security/cve/CVE-2019-16413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16413/">CVE-2019-16413</cve>
	<bugzilla href="https://bugzilla.suse.com/1151347">SUSE bug 1151347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708</cve>
	<bugzilla href="https://bugzilla.suse.com/1151781">SUSE bug 1151781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2317-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2321-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709</cve>
	<bugzilla href="https://bugzilla.suse.com/1151782">SUSE bug 1151782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-35 has a memory leak in coders/dot.c, as demonstrated by AcquireMagickMemory in MagickCore/memory.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710</cve>
	<bugzilla href="https://bugzilla.suse.com/1151783">SUSE bug 1151783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-40 has a memory leak in Huffman2DEncodeImage in coders/ps2.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711</cve>
	<bugzilla href="https://bugzilla.suse.com/1151784">SUSE bug 1151784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-43 has a memory leak in Huffman2DEncodeImage in coders/ps3.c, as demonstrated by WritePS3Image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712</cve>
	<bugzilla href="https://bugzilla.suse.com/1151785">SUSE bug 1151785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2515-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2519-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00042.html" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713</cve>
	<bugzilla href="https://bugzilla.suse.com/1151786">SUSE bug 1151786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<bugzilla href="https://bugzilla.suse.com/1152107">SUSE bug 1152107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173659">SUSE bug 1173659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552460" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552461" comment="kgraft-patch-4_4_121-92_129-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552462" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552463" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551682" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551683" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551684" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551686" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537678" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537679" comment="kgraft-patch-4_4_121-92_129-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537680" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537681" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537689" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595775" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595776" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595777" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595778" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16770</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16770" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma before versions 3.12.2 and 4.3.1, a poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. This vulnerability is patched in Puma 4.3.1 and 3.12.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770</cve>
	<bugzilla href="https://bugzilla.suse.com/1158675">SUSE bug 1158675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188527">SUSE bug 1188527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595983" comment="crowbar-core-4.0+git.1578392992.fabfd186c-9.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595984" comment="crowbar-core-branding-upstream-4.0+git.1578392992.fabfd186c-9.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595985" comment="crowbar-openstack-4.0+git.1579171175.d53ab6363-9.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596255" comment="grafana-monasca-ui-drilldown-1.5.5~dev3-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596256" comment="openstack-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596257" comment="openstack-monasca-api-1.7.1~dev18-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596258" comment="openstack-monasca-log-api-1.4.3~dev3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596259" comment="openstack-neutron-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596260" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596261" comment="openstack-neutron-doc-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595986" comment="openstack-neutron-fwaas-9.0.2~dev5-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595987" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596262" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596263" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596264" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596265" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596266" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596267" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596268" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596269" comment="openstack-neutron-server-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596270" comment="python-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596271" comment="python-monasca-api-1.7.1~dev18-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596272" comment="python-monasca-log-api-1.4.3~dev3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596273" comment="python-neutron-9.4.2~dev21-7.38.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595988" comment="python-neutron-fwaas-9.0.2~dev5-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595989" comment="ruby2.1-rubygem-crowbar-client-3.9.1-7.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596274" comment="ruby2.1-rubygem-puma-2.16.0-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16775</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16775" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16775" ref_url="https://www.suse.com/security/cve/CVE-2019-16775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0104-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200104-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html" source="SUSE-SU"/>
    <description>
    Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16775/">CVE-2019-16775</cve>
	<bugzilla href="https://bugzilla.suse.com/1159352">SUSE bug 1159352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595765" comment="nodejs6-6.17.1-11.30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16776</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16776" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16776" ref_url="https://www.suse.com/security/cve/CVE-2019-16776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0104-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200104-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html" source="SUSE-SU"/>
    <description>
    Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain access to arbitrary files on a user's system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16776/">CVE-2019-16776</cve>
	<bugzilla href="https://bugzilla.suse.com/1159352">SUSE bug 1159352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595765" comment="nodejs6-6.17.1-11.30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16777</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16777" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16777" ref_url="https://www.suse.com/security/cve/CVE-2019-16777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0104-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200104-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0059-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html" source="SUSE-SU"/>
    <description>
    Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16777/">CVE-2019-16777</cve>
	<bugzilla href="https://bugzilla.suse.com/1159352">SUSE bug 1159352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595765" comment="nodejs6-6.17.1-11.30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16782</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16782" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16782" ref_url="https://www.suse.com/security/cve/CVE-2019-16782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html" source="SUSE-SU"/>
    <description>
    There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16782/">CVE-2019-16782</cve>
	<bugzilla href="https://bugzilla.suse.com/1159548">SUSE bug 1159548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183174">SUSE bug 1183174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596310" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595784" comment="ruby2.1-rubygem-rack-1.6.13-3.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348061" comment="rubygem-activerecord-session_store is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16785</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16785" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16785" ref_url="https://www.suse.com/security/cve/CVE-2019-16785" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    Waitress through version 1.3.1 implemented a "MAY" part of the RFC7230 which states: "Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR." Unfortunately if a front-end server does not parse header fields with an LF the same way as it does those with a CRLF it can lead to the front-end and the back-end server parsing the same HTTP message in two different ways. This can lead to a potential for HTTP request smuggling/splitting whereby Waitress may see two requests while the front-end server only sees a single HTTP message. This issue is fixed in Waitress 1.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16785/">CVE-2019-16785</cve>
	<bugzilla href="https://bugzilla.suse.com/1161088">SUSE bug 1161088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16786</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16786" ref_url="https://www.suse.com/security/cve/CVE-2019-16786" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    Waitress through version 1.3.1 would parse the Transfer-Encoding header and only look for a single string value, if that value was not chunked it would fall through and use the Content-Length header instead. According to the HTTP standard Transfer-Encoding should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with chunked. Requests sent with: "Transfer-Encoding: gzip, chunked" would incorrectly get ignored, and the request would use a Content-Length header instead to determine the body size of the HTTP message. This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. This issue is fixed in Waitress 1.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16786/">CVE-2019-16786</cve>
	<bugzilla href="https://bugzilla.suse.com/1161089">SUSE bug 1161089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16789</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16789" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16789" ref_url="https://www.suse.com/security/cve/CVE-2019-16789" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    In Waitress through version 1.4.0, if a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. Specially crafted requests containing special whitespace characters in the Transfer-Encoding header would get parsed by Waitress as being a chunked request, but a front-end server would use the Content-Length instead as the Transfer-Encoding header is considered invalid due to containing invalid characters. If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. This issue is fixed in Waitress 1.4.1 through more strict HTTP field validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16789/">CVE-2019-16789</cve>
	<bugzilla href="https://bugzilla.suse.com/1160790">SUSE bug 1160790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16792</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16792" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16792" ref_url="https://www.suse.com/security/cve/CVE-2019-16792" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1911-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJJZZBFM5QXR7M5AN4LQ7NPOLQIU3QCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1922-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QEMGI3N3BFQA6DBGNM4O7UZIWW6BEPWJ/" source="SUSE-SU"/>
    <description>
    Waitress through version 1.3.1 allows request smuggling by sending the Content-Length header twice. Waitress would header fold a double Content-Length header and due to being unable to cast the now comma separated value to an integer would set the Content-Length to 0 internally. If two Content-Length headers are sent in a single request, Waitress would treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. This issue is fixed in Waitress 1.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16792/">CVE-2019-16792</cve>
	<bugzilla href="https://bugzilla.suse.com/1161670">SUSE bug 1161670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16865</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16865" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16865" ref_url="https://www.suse.com/security/cve/CVE-2019-16865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16865/">CVE-2019-16865</cve>
	<bugzilla href="https://bugzilla.suse.com/1153191">SUSE bug 1153191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16921" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16921" ref_url="https://www.suse.com/security/cve/CVE-2019-16921" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-16921/">CVE-2019-16921</cve>
	<bugzilla href="https://bugzilla.suse.com/1152516">SUSE bug 1152516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16927" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16927" ref_url="https://www.suse.com/security/cve/CVE-2019-16927" source="SUSE CVE"/>
    <description>
    Xpdf 4.01.01 has an out-of-bounds write in the vertProfile part of the TextPage::findGaps function in TextOutputDev.cc, a different vulnerability than CVE-2019-9877.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16927/">CVE-2019-16927</cve>
	<bugzilla href="https://bugzilla.suse.com/1154829">SUSE bug 1154829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551688" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551689" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551690" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551691" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551692" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595786" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595787" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595788" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595789" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595790" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16995" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995</cve>
	<bugzilla href="https://bugzilla.suse.com/1152685">SUSE bug 1152685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    The plain text serializer used a fixed-size array for the number of &lt;ol&gt; elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548857" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548858" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548859" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595351" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595352" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595353" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00047.html" source="SUSE-SU"/>
    <description>
    In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531068" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531070" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531072" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531074" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531076" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531078" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531080" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531082" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531084" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551504" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551505" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551506" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551507" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551508" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551509" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551510" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551511" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551512" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551513" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551514" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551515" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551516" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551517" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551518" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551519" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551520" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595641" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551505" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595642" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551507" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595643" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551509" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595644" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551511" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595645" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551513" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595646" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551515" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595647" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551517" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595648" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551519" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595649" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548857" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548858" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548859" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595351" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595352" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595353" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17009" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548857" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548858" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548859" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595351" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595352" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595353" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548857" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548858" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548859" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595351" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595352" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595353" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548857" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548858" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548859" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595351" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595352" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595353" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522433" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530789" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522434" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548857" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548858" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548859" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595351" comment="MozillaFirefox-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595352" comment="MozillaFirefox-devel-68.3.0-109.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595353" comment="MozillaFirefox-translations-common-68.3.0-109.98.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17015" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    During the initialization of a new content process, a pointer offset can be manipulated leading to memory corruption and a potentially exploitable crash in the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531764" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549099" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549100" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549101" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596233" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596234" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596235" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    When pasting a &amp;lt;style&amp;gt; tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531764" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549099" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549100" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549101" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596233" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596234" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596235" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531764" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549099" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549100" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549101" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596233" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596234" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596235" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17021" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    During the initialization of a new content process, a race condition occurs that can allow a content process to disclose heap addresses from the parent process. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531764" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549099" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549100" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549101" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596233" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596234" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596235" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    When pasting a &amp;lt;style&amp;gt; tag from the clipboard into a rich text editor, the CSS sanitizer does not escape &amp;lt; and &amp;gt; characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531764" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549099" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549100" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549101" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596233" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596234" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596235" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.4 and Firefox &lt; 72.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<bugzilla href="https://bugzilla.suse.com/1160305">SUSE bug 1160305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531764" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549099" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549100" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549101" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596233" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596234" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596235" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0060-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0094-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html" source="SUSE-SU"/>
    <description>
    Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR &lt; 68.4.1, Thunderbird &lt; 68.4.1, and Firefox &lt; 72.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<bugzilla href="https://bugzilla.suse.com/1160498">SUSE bug 1160498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522668" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531764" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522669" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549099" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549100" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549101" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596233" comment="MozillaFirefox-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596234" comment="MozillaFirefox-devel-68.4.1-109.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596235" comment="MozillaFirefox-translations-common-68.4.1-109.101.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17041" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17041" ref_url="https://www.suse.com/security/cve/CVE-2019-17041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rsyslog v8.1908.0. contrib/pmaixforwardedfrom/pmaixforwardedfrom.c has a heap overflow in the parser for AIX log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon) but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17041/">CVE-2019-17041</cve>
	<bugzilla href="https://bugzilla.suse.com/1153451">SUSE bug 1153451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198831">SUSE bug 1198831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552032" comment="rsyslog-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552033" comment="rsyslog-diag-tools-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552034" comment="rsyslog-doc-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552035" comment="rsyslog-module-gssapi-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552036" comment="rsyslog-module-gtls-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552037" comment="rsyslog-module-mysql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552038" comment="rsyslog-module-pgsql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552039" comment="rsyslog-module-relp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552040" comment="rsyslog-module-snmp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552041" comment="rsyslog-module-udpspoof-8.4.0-18.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552196" comment="rsyslog-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552197" comment="rsyslog-diag-tools-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552198" comment="rsyslog-doc-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552199" comment="rsyslog-module-gssapi-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552200" comment="rsyslog-module-gtls-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552201" comment="rsyslog-module-mysql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552202" comment="rsyslog-module-pgsql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552203" comment="rsyslog-module-relp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552204" comment="rsyslog-module-snmp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552205" comment="rsyslog-module-udpspoof-8.4.0-18.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596207" comment="rsyslog-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596208" comment="rsyslog-diag-tools-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596209" comment="rsyslog-doc-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596210" comment="rsyslog-module-gssapi-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596211" comment="rsyslog-module-gtls-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596212" comment="rsyslog-module-mysql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596213" comment="rsyslog-module-pgsql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596214" comment="rsyslog-module-relp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596215" comment="rsyslog-module-snmp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596216" comment="rsyslog-module-udpspoof-8.4.0-18.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17042" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17042" ref_url="https://www.suse.com/security/cve/CVE-2019-17042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006547.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17042/">CVE-2019-17042</cve>
	<bugzilla href="https://bugzilla.suse.com/1153459">SUSE bug 1153459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198831">SUSE bug 1198831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552032" comment="rsyslog-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552033" comment="rsyslog-diag-tools-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552034" comment="rsyslog-doc-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552035" comment="rsyslog-module-gssapi-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552036" comment="rsyslog-module-gtls-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552037" comment="rsyslog-module-mysql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552038" comment="rsyslog-module-pgsql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552039" comment="rsyslog-module-relp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552040" comment="rsyslog-module-snmp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552041" comment="rsyslog-module-udpspoof-8.4.0-18.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552196" comment="rsyslog-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552197" comment="rsyslog-diag-tools-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552198" comment="rsyslog-doc-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552199" comment="rsyslog-module-gssapi-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552200" comment="rsyslog-module-gtls-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552201" comment="rsyslog-module-mysql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552202" comment="rsyslog-module-pgsql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552203" comment="rsyslog-module-relp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552204" comment="rsyslog-module-snmp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552205" comment="rsyslog-module-udpspoof-8.4.0-18.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596207" comment="rsyslog-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596208" comment="rsyslog-diag-tools-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596209" comment="rsyslog-doc-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596210" comment="rsyslog-module-gssapi-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596211" comment="rsyslog-module-gtls-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596212" comment="rsyslog-module-mysql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596213" comment="rsyslog-module-pgsql-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596214" comment="rsyslog-module-relp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596215" comment="rsyslog-module-snmp-8.4.0-18.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596216" comment="rsyslog-module-udpspoof-8.4.0-18.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
    <description>
    ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053</cve>
	<bugzilla href="https://bugzilla.suse.com/1152789">SUSE bug 1152789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17054" ref_url="https://www.suse.com/security/cve/CVE-2019-17054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
    <description>
    atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17054/">CVE-2019-17054</cve>
	<bugzilla href="https://bugzilla.suse.com/1152786">SUSE bug 1152786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<bugzilla href="https://bugzilla.suse.com/1152782">SUSE bug 1152782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<bugzilla href="https://bugzilla.suse.com/1152788">SUSE bug 1152788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17064" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17064" ref_url="https://www.suse.com/security/cve/CVE-2019-17064" source="SUSE CVE"/>
    <description>
    Catalog.cc in Xpdf 4.02 has a NULL pointer dereference because Catalog.pageLabels is initialized too late in the Catalog constructor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17064/">CVE-2019-17064</cve>
	<bugzilla href="https://bugzilla.suse.com/1152783">SUSE bug 1152783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17075" ref_url="https://www.suse.com/security/cve/CVE-2019-17075" source="SUSE CVE"/>
    <description>
    An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable. This could allow an attacker to trigger a Denial of Service, exploitable if this driver is used on an architecture for which this stack/DMA interaction has security relevance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17075/">CVE-2019-17075</cve>
	<bugzilla href="https://bugzilla.suse.com/1152790">SUSE bug 1152790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2859-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552423" comment="kgraft-patch-4_4_121-92_101-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552424" comment="kgraft-patch-4_4_121-92_104-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552425" comment="kgraft-patch-4_4_121-92_109-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552426" comment="kgraft-patch-4_4_121-92_114-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552427" comment="kgraft-patch-4_4_121-92_117-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552428" comment="kgraft-patch-4_4_121-92_120-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552422" comment="kgraft-patch-4_4_121-92_98-default-8-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537181" comment="kgraft-patch-4_4_121-92_101-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537182" comment="kgraft-patch-4_4_121-92_104-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537183" comment="kgraft-patch-4_4_121-92_109-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537184" comment="kgraft-patch-4_4_121-92_114-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537185" comment="kgraft-patch-4_4_121-92_117-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537186" comment="kgraft-patch-4_4_121-92_120-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537180" comment="kgraft-patch-4_4_121-92_98-default-8-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17134</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17134" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17134" ref_url="https://www.suse.com/security/cve/CVE-2019-17134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006182.html" source="SUSE-SU"/>
    <description>
    Amphora Images in OpenStack Octavia &gt;=0.10.0 &lt;2.1.2, &gt;=3.0.0 &lt;3.2.0, &gt;=4.0.0 &lt;4.1.0 allows anyone with access to the management network to bypass client-certificate based authentication and retrieve information or issue configuration commands via simple HTTP requests to the Agent on port https/9443, because the cmd/agent.py gunicorn cert_reqs option is True but is supposed to be ssl.CERT_REQUIRED.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17134/">CVE-2019-17134</cve>
	<bugzilla href="https://bugzilla.suse.com/1153304">SUSE bug 1153304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334447" comment="openstack-octavia is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17185" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007316.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0553-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html" source="SUSE-SU"/>
    <description>
    In FreeRADIUS 3.0.x before 3.0.20, the EAP-pwd module used a global OpenSSL BN_CTX instance to handle all handshakes. This mean multiple threads use the same BN_CTX instance concurrently, resulting in crashes when concurrent EAP-pwd handshakes are initiated. This can be abused by an adversary as a Denial-of-Service (DoS) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185</cve>
	<bugzilla href="https://bugzilla.suse.com/1166847">SUSE bug 1166847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531242" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531243" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531244" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531245" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531246" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531247" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531248" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531249" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531250" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531251" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531252" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551653" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551654" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551655" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551656" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551657" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551658" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551659" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551660" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551661" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551662" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551663" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595743" comment="freeradius-server-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595744" comment="freeradius-server-doc-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595745" comment="freeradius-server-krb5-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595746" comment="freeradius-server-ldap-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595747" comment="freeradius-server-libs-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595748" comment="freeradius-server-mysql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595749" comment="freeradius-server-perl-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595750" comment="freeradius-server-postgresql-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595751" comment="freeradius-server-python-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595752" comment="freeradius-server-sqlite-3.0.3-17.15.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595753" comment="freeradius-server-utils-3.0.3-17.15.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17340" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17340" ref_url="https://www.suse.com/security/cve/CVE-2019-17340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17340/">CVE-2019-17340</cve>
	<bugzilla href="https://bugzilla.suse.com/1126140">SUSE bug 1126140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17341" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17341" ref_url="https://www.suse.com/security/cve/CVE-2019-17341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17341/">CVE-2019-17341</cve>
	<bugzilla href="https://bugzilla.suse.com/1126141">SUSE bug 1126141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17342" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17342" ref_url="https://www.suse.com/security/cve/CVE-2019-17342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17342/">CVE-2019-17342</cve>
	<bugzilla href="https://bugzilla.suse.com/1126192">SUSE bug 1126192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17343" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17343" ref_url="https://www.suse.com/security/cve/CVE-2019-17343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17343/">CVE-2019-17343</cve>
	<bugzilla href="https://bugzilla.suse.com/1126195">SUSE bug 1126195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17344" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17344" ref_url="https://www.suse.com/security/cve/CVE-2019-17344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17344/">CVE-2019-17344</cve>
	<bugzilla href="https://bugzilla.suse.com/1126196">SUSE bug 1126196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17346" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346</cve>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17347" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347</cve>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348</cve>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530720" comment="xen-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530721" comment="xen-doc-html-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530722" comment="xen-libs-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530723" comment="xen-libs-32bit-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530724" comment="xen-tools-4.7.6_06-43.54.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530725" comment="xen-tools-domU-4.7.6_06-43.54.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    find_abstract_instance in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32, allows remote attackers to cause a denial of service (infinite recursion and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450</cve>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an integer overflow leading to a SEGV in _bfd_dwarf2_find_nearest_line in dwarf2.c, as demonstrated by nm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451</cve>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14226-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522350" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522351" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548819" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548820" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595268" comment="libssh2-1-1.4.3-20.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548820" comment="libssh2-1-32bit-1.4.3-20.14.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17514" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17514" ref_url="https://www.suse.com/security/cve/CVE-2019-17514" source="SUSE CVE"/>
    <description>
    library/glob.html in the Python 2 and 3 documentation before 2016 has potentially misleading information about whether sorting occurs, as demonstrated by irreproducible cancer-research results. NOTE: the effects of this documentation cross application domains, and thus it is likely that security-relevant code elsewhere is affected. This issue is not a Python implementation bug, and there are no reports that NMR researchers were specifically relying on library/glob.html. In other words, because the older documentation stated "finds all the pathnames matching a specified pattern according to the rules used by the Unix shell," one might have incorrectly inferred that the sorting that occurs in a Unix shell also occurred for glob.glob. There is a workaround in newer versions of Willoughby nmr-data_compilation-p2.py and nmr-data_compilation-p3.py, which call sort() directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17514/">CVE-2019-17514</cve>
	<bugzilla href="https://bugzilla.suse.com/1154297">SUSE bug 1154297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17540" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17540" ref_url="https://www.suse.com/security/cve/CVE-2019-17540" source="SUSE CVE"/>
    <description>
    ImageMagick before 7.0.8-54 has a heap-based buffer overflow in ReadPSInfo in coders/ps.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17540/">CVE-2019-17540</cve>
	<bugzilla href="https://bugzilla.suse.com/1153866">SUSE bug 1153866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17541" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17541" ref_url="https://www.suse.com/security/cve/CVE-2019-17541" source="SUSE CVE"/>
    <description>
    ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17541/">CVE-2019-17541</cve>
	<bugzilla href="https://bugzilla.suse.com/1153867">SUSE bug 1153867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17546" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17547" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17547" ref_url="https://www.suse.com/security/cve/CVE-2019-17547" source="SUSE CVE"/>
    <description>
    In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17547/">CVE-2019-17547</cve>
	<bugzilla href="https://bugzilla.suse.com/1153868">SUSE bug 1153868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0226-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0038-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html" source="SUSE-SU"/>
    <description>
    When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563</cve>
	<bugzilla href="https://bugzilla.suse.com/1159729">SUSE bug 1159729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17569" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html" source="SUSE-SU"/>
    <description>
    The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569</cve>
	<bugzilla href="https://bugzilla.suse.com/1164825">SUSE bug 1164825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17571" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0053-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200053-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0054-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200054-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006321.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html" source="SUSE-SU"/>
    <description>
    Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<bugzilla href="https://bugzilla.suse.com/1159646">SUSE bug 1159646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531752" comment="log4j-1.2.15-126.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17582</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17582" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17582" ref_url="https://www.suse.com/security/cve/CVE-2019-17582" source="SUSE CVE"/>
    <description>
    A use-after-free in the _zip_dirent_read function of zip_dirent.c in libzip 1.2.0 allows attackers to have an unspecified impact by attempting to unzip a malformed ZIP archive. NOTE: the discoverer states "This use-after-free is triggered prior to the double free reported in CVE-2017-12858."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17582/">CVE-2019-17582</cve>
	<bugzilla href="https://bugzilla.suse.com/1184178">SUSE bug 1184178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334034" comment="libzip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17631" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
    <description>
    From Eclipse OpenJ9 0.15 to 0.16, access to diagnostic operations such as causing a GC or creating a diagnostic file are permitted without any privilege checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631</cve>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17639" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
    <description>
    In Eclipse OpenJ9 prior to version 0.21 on Power platforms, calling the System.arraycopy method with a length longer than the length of the source or destination array can, in certain specially crafted code patterns, cause the current method to return prematurely with an undefined return value. This allows whatever value happens to be in the return register at that time to be used as if it matches the method's declared return type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551677" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542900" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551678" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595769" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595770" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595771" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html" source="SUSE-SU"/>
    <description>
    rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1787" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546692" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595517" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Object Linking &amp; Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546692" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595517" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521756" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546692" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595517" comment="clamav-0.100.3-33.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html" source="SUSE-SU"/>
    <description>
    In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190108">SUSE bug 1190108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531799" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531800" comment="libxslt1-1.1.28-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531801" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552049" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552050" comment="libxslt1-1.1.28-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552051" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596296" comment="libxslt-tools-1.1.28-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596297" comment="libxslt1-1.1.28-17.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552051" comment="libxslt1-32bit-1.1.28-17.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18198" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198</cve>
	<bugzilla href="https://bugzilla.suse.com/1154617">SUSE bug 1154617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00044.html" source="SUSE-SU"/>
    <description>
    cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218</cve>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190368">SUSE bug 1190368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191838">SUSE bug 1191838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009628151" comment="file-5.22-10.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628152" comment="file-magic-5.22-10.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628153" comment="libmagic1-5.22-10.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628154" comment="libmagic1-32bit-5.22-10.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18277</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18277" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18277" ref_url="https://www.suse.com/security/cve/CVE-2019-18277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2626-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00019.html" source="SUSE-SU"/>
    <description>
    A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it could be used to help construct an HTTP request smuggling attack against a vulnerable component employing a lenient parser that would ignore the content-length header as soon as it saw a transfer-encoding one (even if not entirely valid according to the specification).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18277/">CVE-2019-18277</cve>
	<bugzilla href="https://bugzilla.suse.com/1154980">SUSE bug 1154980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595349" comment="haproxy-1.6.11-11.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18282" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18282" ref_url="https://www.suse.com/security/cve/CVE-2019-18282" source="SUSE CVE"/>
    <description>
    The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18282/">CVE-2019-18282</cve>
	<bugzilla href="https://bugzilla.suse.com/1161121">SUSE bug 1161121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531970" comment="python-devel-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531794" comment="python3-devel-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552151" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552152" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549121" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552153" comment="python-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552154" comment="python-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552155" comment="python-base-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552156" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552157" comment="python-curses-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552158" comment="python-demo-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552159" comment="python-devel-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552160" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552161" comment="python-idle-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552162" comment="python-tk-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552163" comment="python-xml-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549122" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549123" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549124" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549125" comment="python3-devel-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596416" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552152" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596282" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596417" comment="python-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552154" comment="python-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596418" comment="python-base-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552156" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596419" comment="python-curses-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596420" comment="python-demo-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596421" comment="python-devel-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596422" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596423" comment="python-idle-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596424" comment="python-tk-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596425" comment="python-xml-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596283" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596284" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596285" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596286" comment="python3-devel-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18388" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551485" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595621" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18389" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551485" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595621" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18390" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551485" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595621" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18391" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522550" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551485" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595621" comment="libvirglrenderer0-0.5.0-12.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18397</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18397" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008796.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0763-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPZ3M35XR5IQLIBDLZFFWGW6Z6SM7YNW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NAPU2NE5KWWCW4NS2FW7DLCSMM442VDM/" source="SUSE-SU"/>
    <description>
    A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397</cve>
	<bugzilla href="https://bugzilla.suse.com/1156260">SUSE bug 1156260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339082" comment="fribidi is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18420" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18420" ref_url="https://www.suse.com/security/cve/CVE-2019-18420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18420/">CVE-2019-18420</cve>
	<bugzilla href="https://bugzilla.suse.com/1154448">SUSE bug 1154448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18421" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18421" ref_url="https://www.suse.com/security/cve/CVE-2019-18421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be "promoted" before being used as a pagetable, and "demoted" before being used for any other type. Xen also allows for "recursive" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18421/">CVE-2019-18421</cve>
	<bugzilla href="https://bugzilla.suse.com/1154458">SUSE bug 1154458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18424" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424</cve>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18425" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18425" ref_url="https://www.suse.com/security/cve/CVE-2019-18425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00037.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don't install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18425/">CVE-2019-18425</cve>
	<bugzilla href="https://bugzilla.suse.com/1154456">SUSE bug 1154456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006492.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0244-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-02/msg00091.html" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334585" comment="sudo is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531723" comment="sudo-1.8.10p3-10.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552025" comment="sudo-1.8.10p3-10.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596182" comment="sudo-1.8.10p3-10.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18675" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
    <description>
    The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675</cve>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18676" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<bugzilla href="https://bugzilla.suse.com/1156329">SUSE bug 1156329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165586">SUSE bug 1165586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18677" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 3.x and 4.x through 4.8 when the append_domain setting is used (because the appended characters do not properly interact with hostname length restrictions). Due to incorrect message processing, it can inappropriately redirect traffic to origins it should not be delivered to.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<bugzilla href="https://bugzilla.suse.com/1156328">SUSE bug 1156328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18678" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<bugzilla href="https://bugzilla.suse.com/1156323">SUSE bug 1156323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18679" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<bugzilla href="https://bugzilla.suse.com/1156324">SUSE bug 1156324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680</cve>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173867">SUSE bug 1173867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173868">SUSE bug 1173868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 5.3.8, f-&gt;fmt.sdr.reserved is uninitialized in rcar_drif_g_fmt_sdr_cap in drivers/media/platform/rcar_drif.c, which could cause a memory disclosure problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786</cve>
	<bugzilla href="https://bugzilla.suse.com/1156043">SUSE bug 1156043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18804" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2576-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00069.html" source="SUSE-SU"/>
    <description>
    DjVuLibre 3.5.27 has a NULL pointer dereference in the function DJVU::filter_fv at IW44EncodeCodec.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804</cve>
	<bugzilla href="https://bugzilla.suse.com/1156188">SUSE bug 1156188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552307" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<bugzilla href="https://bugzilla.suse.com/1156187">SUSE bug 1156187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<bugzilla href="https://bugzilla.suse.com/1156259">SUSE bug 1156259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18809" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<bugzilla href="https://bugzilla.suse.com/1156258">SUSE bug 1156258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18853" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18853" ref_url="https://www.suse.com/security/cve/CVE-2019-18853" source="SUSE CVE"/>
    <description>
    ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18853/">CVE-2019-18853</cve>
	<bugzilla href="https://bugzilla.suse.com/1156520">SUSE bug 1156520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18860" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    Squid before 4.9, when certain web browsers are used, mishandles HTML in the host (aka hostname) parameter to cachemgr.cgi.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<bugzilla href="https://bugzilla.suse.com/1167373">SUSE bug 1167373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531065" comment="squid-3.5.21-26.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551501" comment="squid-3.5.21-26.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595638" comment="squid-3.5.21-26.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18874</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18874" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18874" ref_url="https://www.suse.com/security/cve/CVE-2019-18874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
    <description>
    psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18874/">CVE-2019-18874</cve>
	<bugzilla href="https://bugzilla.suse.com/1156525">SUSE bug 1156525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00036.html" source="SUSE-SU"/>
    <description>
    : Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531580" comment="libzypp-16.21.2-27.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531581" comment="libzypp-devel-16.21.2-27.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531582" comment="zypper-1.13.57-18.46.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531583" comment="zypper-log-1.13.57-18.46.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551931" comment="libzypp-16.21.2-27.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551932" comment="libzypp-devel-16.21.2-27.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551933" comment="zypper-1.13.57-18.46.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531583" comment="zypper-log-1.13.57-18.46.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596080" comment="libzypp-16.21.2-27.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596081" comment="libzypp-devel-16.21.2-27.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596082" comment="zypper-1.13.57-18.46.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531583" comment="zypper-log-1.13.57-18.46.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18901</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in the mysql-systemd-helper of the mariadb packaging of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allows local attackers to change the permissions of arbitrary files to 0640. This issue affects: SUSE Linux Enterprise Server 12 mariadb versions prior to 10.2.31-3.25.1. SUSE Linux Enterprise Server 15 mariadb versions prior to 10.2.31-3.26.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901</cve>
	<bugzilla href="https://bugzilla.suse.com/1160285">SUSE bug 1160285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19037" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037" source="SUSE CVE"/>
    <description>
    ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037</cve>
	<bugzilla href="https://bugzilla.suse.com/1157717">SUSE bug 1157717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19043" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043" source="SUSE CVE"/>
    <description>
    A memory leak in the i40e_setup_macvlans() function in drivers/net/ethernet/intel/i40e/i40e_main.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering i40e_setup_channel() failures, aka CID-27d461333459.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043</cve>
	<bugzilla href="https://bugzilla.suse.com/1159375">SUSE bug 1159375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19044" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044" source="SUSE CVE"/>
    <description>
    Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044</cve>
	<bugzilla href="https://bugzilla.suse.com/1159370">SUSE bug 1159370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19045" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<bugzilla href="https://bugzilla.suse.com/1161522">SUSE bug 1161522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<bugzilla href="https://bugzilla.suse.com/1157304">SUSE bug 1157304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19047" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047" source="SUSE CVE"/>
    <description>
    A memory leak in the mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_crdump_collect() failures, aka CID-c7ed6d0183d5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047</cve>
	<bugzilla href="https://bugzilla.suse.com/1157715">SUSE bug 1157715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19048" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048" source="SUSE CVE"/>
    <description>
    A memory leak in the crypto_reportstat() function in drivers/virt/vboxguest/vboxguest_utils.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering copy_form_user() failures, aka CID-e0b0cb938864.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048</cve>
	<bugzilla href="https://bugzilla.suse.com/1157720">SUSE bug 1157720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19049</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19049" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<bugzilla href="https://bugzilla.suse.com/1157173">SUSE bug 1157173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19051" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<bugzilla href="https://bugzilla.suse.com/1159024">SUSE bug 1159024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19052" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19053" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053" source="SUSE CVE"/>
    <description>
    A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053</cve>
	<bugzilla href="https://bugzilla.suse.com/1161520">SUSE bug 1161520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<bugzilla href="https://bugzilla.suse.com/1161518">SUSE bug 1161518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering nl80211hdr_put() failures, aka CID-1399c59fa929. NOTE: third parties dispute the relevance of this because it occurs on a code path where a successful allocation has already occurred.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055</cve>
	<bugzilla href="https://bugzilla.suse.com/1157319">SUSE bug 1157319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<bugzilla href="https://bugzilla.suse.com/1157193">SUSE bug 1157193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<bugzilla href="https://bugzilla.suse.com/1157145">SUSE bug 1157145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<bugzilla href="https://bugzilla.suse.com/1157178">SUSE bug 1157178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because "rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem)."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173961">SUSE bug 1173961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<bugzilla href="https://bugzilla.suse.com/1157180">SUSE bug 1157180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<bugzilla href="https://bugzilla.suse.com/1157307">SUSE bug 1157307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19069" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069" source="SUSE CVE"/>
    <description>
    A memory leak in the fastrpc_dma_buf_attach() function in drivers/misc/fastrpc.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering dma_get_sgtable() failures, aka CID-fc739a058d99.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069</cve>
	<bugzilla href="https://bugzilla.suse.com/1157064">SUSE bug 1157064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19070" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070</cve>
	<bugzilla href="https://bugzilla.suse.com/1157294">SUSE bug 1157294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19071" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071" source="SUSE CVE"/>
    <description>
    A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071</cve>
	<bugzilla href="https://bugzilla.suse.com/1157067">SUSE bug 1157067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19072" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072" source="SUSE CVE"/>
    <description>
    A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072</cve>
	<bugzilla href="https://bugzilla.suse.com/1157069">SUSE bug 1157069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<bugzilla href="https://bugzilla.suse.com/1157162">SUSE bug 1157162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173958">SUSE bug 1173958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19076" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19076" ref_url="https://www.suse.com/security/cve/CVE-2019-19076" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19076/">CVE-2019-19076</cve>
	<bugzilla href="https://bugzilla.suse.com/1157164">SUSE bug 1157164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<bugzilla href="https://bugzilla.suse.com/1157171">SUSE bug 1157171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19078" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<bugzilla href="https://bugzilla.suse.com/1157032">SUSE bug 1157032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<bugzilla href="https://bugzilla.suse.com/1157044">SUSE bug 1157044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<bugzilla href="https://bugzilla.suse.com/1157045">SUSE bug 1157045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<bugzilla href="https://bugzilla.suse.com/1157046">SUSE bug 1157046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<bugzilla href="https://bugzilla.suse.com/1157049">SUSE bug 1157049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19118</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19118" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19118" ref_url="https://www.suse.com/security/cve/CVE-2019-19118" source="SUSE CVE"/>
    <description>
    Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19118/">CVE-2019-19118</cve>
	<bugzilla href="https://bugzilla.suse.com/1157705">SUSE bug 1157705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19191" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006355.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00017.html" source="SUSE-SU"/>
    <description>
    Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation. This allows the user to escalate to root by pointing symlinks to files such as /etc/shadow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191</cve>
	<bugzilla href="https://bugzilla.suse.com/1154062">SUSE bug 1154062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157471">SUSE bug 1157471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530916" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530917" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530918" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548964" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548965" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548966" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595543" comment="libshibsp-lite6-2.5.5-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595544" comment="libshibsp6-2.5.5-6.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595545" comment="shibboleth-sp-2.5.5-6.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19232" ref_url="https://www.suse.com/security/cve/CVE-2019-19232" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19232/">CVE-2019-19232</cve>
	<bugzilla href="https://bugzilla.suse.com/1159618">SUSE bug 1159618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19234" ref_url="https://www.suse.com/security/cve/CVE-2019-19234" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL sudoer account) to impersonate any blocked user. NOTE: The software maintainer believes that this CVE is not valid. Disabling local password authentication for a user is not the same as disabling all access to that user--the user may still be able to login via other means (ssh key, kerberos, etc). Both the Linux shadow(5) and passwd(1) manuals are clear on this. Indeed it is a valid use case to have local accounts that are _only_ accessible via sudo and that cannot be logged into with a password. Sudo 1.8.30 added an optional setting to check the _shell_ of the target user (not the encrypted password!) against the contents of /etc/shells but that is not the same thing as preventing access to users with an invalid password hash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19234/">CVE-2019-19234</cve>
	<bugzilla href="https://bugzilla.suse.com/1159616">SUSE bug 1159616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19241" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.4.2, the io_uring feature leads to requests that inadvertently have UID 0 and full capabilities, aka CID-181e448d8709. This is related to fs/io-wq.c, fs/io_uring.c, and net/socket.c. For example, an attacker can bypass intended restrictions on adding an IPv4 address to the loopback interface. This occurs because IORING_OP_SENDMSG operations, although requested in the context of an unprivileged user, are sometimes performed by a kernel worker thread without considering that context.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241</cve>
	<bugzilla href="https://bugzilla.suse.com/1159441">SUSE bug 1159441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19242" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19242" ref_url="https://www.suse.com/security/cve/CVE-2019-19242" source="SUSE CVE"/>
    <description>
    SQLite 3.30.1 mishandles pExpr-&gt;y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19242/">CVE-2019-19242</cve>
	<bugzilla href="https://bugzilla.suse.com/1157817">SUSE bug 1157817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244</cve>
	<bugzilla href="https://bugzilla.suse.com/1157817">SUSE bug 1157817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19252" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252" source="SUSE CVE"/>
    <description>
    vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252</cve>
	<bugzilla href="https://bugzilla.suse.com/1157813">SUSE bug 1157813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19317" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317</cve>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196773">SUSE bug 1196773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196775">SUSE bug 1196775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333982" comment="sqlite3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319</cve>
	<bugzilla href="https://bugzilla.suse.com/1158021">SUSE bug 1158021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19330</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19330" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19330" ref_url="https://www.suse.com/security/cve/CVE-2019-19330" source="SUSE CVE"/>
    <description>
    The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19330/">CVE-2019-19330</cve>
	<bugzilla href="https://bugzilla.suse.com/1157712">SUSE bug 1157712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157978">SUSE bug 1157978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19378" ref_url="https://www.suse.com/security/cve/CVE-2019-19378" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image can lead to slab-out-of-bounds write access in index_rbio_pages in fs/btrfs/raid56.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19378/">CVE-2019-19378</cve>
	<bugzilla href="https://bugzilla.suse.com/1158270">SUSE bug 1158270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185853">SUSE bug 1185853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552460" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537678" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19449" ref_url="https://www.suse.com/security/cve/CVE-2019-19449" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19449/">CVE-2019-19449</cve>
	<bugzilla href="https://bugzilla.suse.com/1158821">SUSE bug 1158821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19525" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19526" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158893">SUSE bug 1158893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19527" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158900">SUSE bug 1158900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19528" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158407">SUSE bug 1158407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158410">SUSE bug 1158410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19531" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158427">SUSE bug 1158427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158445">SUSE bug 1158445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19532" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19535" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158903">SUSE bug 1158903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19536" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158394">SUSE bug 1158394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158904">SUSE bug 1158904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19555" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer overflow because of an incorrect sscanf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19577" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19577" ref_url="https://www.suse.com/security/cve/CVE-2019-19577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest's address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given direct access to physical devices are vulnerable. Systems which do not use PCI pass-through are not vulnerable. Only HVM guests can exploit the vulnerability. PV and PVH guests cannot. All versions of Xen with IOMMU support are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19577/">CVE-2019-19577</cve>
	<bugzilla href="https://bugzilla.suse.com/1158007">SUSE bug 1158007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19578" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19578" ref_url="https://www.suse.com/security/cve/CVE-2019-19578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at itself, or to another pagetable of the same or higher level. Xen has limited support for linear pagetables: A page may either point to itself, or point to another pagetable of the same level (i.e., L2 to L2, L3 to L3, and so on). XSA-240 introduced an additional restriction that limited the "depth" of such chains by allowing pages to either *point to* other pages of the same level, or *be pointed to* by other pages of the same level, but not both. To implement this, we keep track of the number of outstanding times a page points to or is pointed to another page table, to prevent both from happening at the same time. Unfortunately, the original commit introducing this reset this count when resuming validation of a partially-validated pagetable, incorrectly dropping some "linear_pt_entry" counts. If an attacker could engineer such a situation to occur, they might be able to make loops or other arbitrary chains of linear pagetables, as described in XSA-240. A malicious or buggy PV guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Privilege escalation and information leaks cannot be excluded. All versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Only systems which have enabled linear pagetables are vulnerable. Systems which have disabled linear pagetables, either by selecting CONFIG_PV_LINEAR_PT=n when building the hypervisor, or adding pv-linear-pt=false on the command-line, are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19578/">CVE-2019-19578</cve>
	<bugzilla href="https://bugzilla.suse.com/1158005">SUSE bug 1158005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19579" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the use of libxl's "assignable-add" feature to prepare devices to be assigned to untrusted guests. Unfortunately, this is not considered a strictly required step for device assignment. The PCI passthrough documentation on the wiki describes alternate ways of preparing devices for assignment, and libvirt uses its own ways as well. Hosts where these "alternate" methods are used will still leave the system in a vulnerable state after the device comes back from a guest. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579</cve>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19580" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19580" ref_url="https://www.suse.com/security/cve/CVE-2019-19580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in restartable PV type change operations. Despite extensive testing and auditing, some corner cases were missed. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All security-supported versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Note that these attacks require very precise timing, which may be difficult to exploit in practice.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19580/">CVE-2019-19580</cve>
	<bugzilla href="https://bugzilla.suse.com/1158006">SUSE bug 1158006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19581" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On 32-bit Arm accesses to bitmaps with bit a count which is a multiple of 32, an out of bounds access may occur. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. 32-bit Arm systems are vulnerable. 64-bit Arm systems are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581</cve>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19583" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19583" ref_url="https://www.suse.com/security/cve/CVE-2019-19583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19583/">CVE-2019-19583</cve>
	<bugzilla href="https://bugzilla.suse.com/1158004">SUSE bug 1158004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19602</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19602" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602" source="SUSE CVE"/>
    <description>
    fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602</cve>
	<bugzilla href="https://bugzilla.suse.com/1158887">SUSE bug 1158887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603</cve>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333982" comment="sqlite3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19604" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0123-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604</cve>
	<bugzilla href="https://bugzilla.suse.com/1158785">SUSE bug 1158785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158795">SUSE bug 1158795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530787" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548856" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595350" comment="git-core-2.12.3-27.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530788" comment="git-doc-2.12.3-27.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645</cve>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19646" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646</cve>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19687</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19687" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19687" ref_url="https://www.suse.com/security/cve/CVE-2019-19687" source="SUSE CVE"/>
    <description>
    OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19687/">CVE-2019-19687</cve>
	<bugzilla href="https://bugzilla.suse.com/1158875">SUSE bug 1158875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339413" comment="openstack-keystone is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19746" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19797" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for a different purpose after refactoring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19814" ref_url="https://www.suse.com/security/cve/CVE-2019-19814" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19814/">CVE-2019-19814</cve>
	<bugzilla href="https://bugzilla.suse.com/1159437">SUSE bug 1159437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19844</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19844" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19844" ref_url="https://www.suse.com/security/cve/CVE-2019-19844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19844/">CVE-2019-19844</cve>
	<bugzilla href="https://bugzilla.suse.com/1159447">SUSE bug 1159447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19906" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19906" ref_url="https://www.suse.com/security/cve/CVE-2019-19906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008123.html" source="SUSE-SU"/>
    <description>
    cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19906/">CVE-2019-19906</cve>
	<bugzilla href="https://bugzilla.suse.com/1159635">SUSE bug 1159635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531687" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531688" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531689" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531690" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531691" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531692" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531693" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531694" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531695" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531696" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531697" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531698" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531699" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552012" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552013" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552014" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552015" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552016" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552017" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552018" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552019" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552020" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552021" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552022" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552023" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552024" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596165" comment="cyrus-sasl-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552013" comment="cyrus-sasl-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596166" comment="cyrus-sasl-crammd5-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552015" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596167" comment="cyrus-sasl-digestmd5-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596168" comment="cyrus-sasl-gssapi-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552018" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596169" comment="cyrus-sasl-otp-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552020" comment="cyrus-sasl-otp-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596170" comment="cyrus-sasl-plain-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552022" comment="cyrus-sasl-plain-32bit-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596171" comment="libsasl2-3-2.1.26-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552024" comment="libsasl2-3-32bit-2.1.26-8.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19911</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19911" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19911" ref_url="https://www.suse.com/security/cve/CVE-2019-19911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
    <description>
    There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19911/">CVE-2019-19911</cve>
	<bugzilla href="https://bugzilla.suse.com/1160192">SUSE bug 1160192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19922" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922" source="SUSE CVE"/>
    <description>
    kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922</cve>
	<bugzilla href="https://bugzilla.suse.com/1159717">SUSE bug 1159717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923</cve>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924</cve>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925</cve>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19927" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19927" ref_url="https://www.suse.com/security/cve/CVE-2019-19927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.0.0-rc7 (as distributed in ubuntu/linux.git on kernel.ubuntu.com), mounting a crafted f2fs filesystem image and performing some operations can lead to slab-out-of-bounds read access in ttm_put_pages in drivers/gpu/drm/ttm/ttm_page_alloc.c. This is related to the vmwgfx or ttm module.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19927/">CVE-2019-19927</cve>
	<bugzilla href="https://bugzilla.suse.com/1160147">SUSE bug 1160147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19947" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947</cve>
	<bugzilla href="https://bugzilla.suse.com/1159929">SUSE bug 1159929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer overflow in the function WriteSGIImage of coders/sgi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948</cve>
	<bugzilla href="https://bugzilla.suse.com/1159861">SUSE bug 1159861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0170-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WritePNGImage of coders/png.c, related to Magick_png_write_raw_profile and LocaleNCompare.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949</cve>
	<bugzilla href="https://bugzilla.suse.com/1160369">SUSE bug 1160369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19951" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19951" ref_url="https://www.suse.com/security/cve/CVE-2019-19951" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20190423 Q8, there is a heap-based buffer overflow in the function ImportRLEPixels of coders/miff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19951/">CVE-2019-19951</cve>
	<bugzilla href="https://bugzilla.suse.com/1160321">SUSE bug 1160321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19952" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19952" ref_url="https://www.suse.com/security/cve/CVE-2019-19952" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.9-7 Q16, there is a use-after-free in the function MngInfoDiscardObject of coders/png.c, related to ReadOneMNGImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19952/">CVE-2019-19952</cve>
	<bugzilla href="https://bugzilla.suse.com/1160426">SUSE bug 1160426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19953" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19953" ref_url="https://www.suse.com/security/cve/CVE-2019-19953" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2020:0055-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0145-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00064.html" source="SUSE-SU"/>
    <description>
    In GraphicsMagick 1.4 snapshot-20191208 Q8, there is a heap-based buffer over-read in the function EncodeImage of coders/pict.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19953/">CVE-2019-19953</cve>
	<bugzilla href="https://bugzilla.suse.com/1160364">SUSE bug 1160364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959</cve>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19966" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966</cve>
	<bugzilla href="https://bugzilla.suse.com/1159841">SUSE bug 1159841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2937-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009471.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXOIPTG34E6FHFZ5MRT6B4BEC5ETU6ML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGZ4L5IPYNOJTWC7WZTAMPSFHIGKXQAE/" source="SUSE-SU"/>
    <description>
    libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977</cve>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190329">SUSE bug 1190329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191840">SUSE bug 1191840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192365">SUSE bug 1192365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193380">SUSE bug 1193380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193381">SUSE bug 1193381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628213" comment="libesmtp-1.0.6-17.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20044" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010436.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0735-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYQO6XCA5HFPKOF2ANXLGSZGFT63LHPA/" source="SUSE-SU"/>
    <description>
    In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670824" comment="zsh-5.0.5-6.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054</cve>
	<bugzilla href="https://bugzilla.suse.com/1159910">SUSE bug 1159910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20096" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<bugzilla href="https://bugzilla.suse.com/1159908">SUSE bug 1159908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218</cve>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189840">SUSE bug 1189840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192495">SUSE bug 1192495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333982" comment="sqlite3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2024" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<bugzilla href="https://bugzilla.suse.com/1129179">SUSE bug 1129179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551409" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551410" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551411" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551413" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537391" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595503" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595504" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595505" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595506" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20387" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20387" ref_url="https://www.suse.com/security/cve/CVE-2019-20387" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009094.html" source="SUSE-SU"/>
    <description>
    repodata_schema2id in repodata.c in libsolv before 0.7.6 has a heap-based buffer over-read via a last schema whose length is less than the length of the input schema.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20387/">CVE-2019-20387</cve>
	<bugzilla href="https://bugzilla.suse.com/1161510">SUSE bug 1161510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552388" comment="libsolv-devel-0.6.37-2.27.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552389" comment="libsolv-tools-0.6.37-2.27.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552390" comment="libzypp-16.21.4-27.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552391" comment="libzypp-devel-16.21.4-27.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552392" comment="perl-solv-0.6.37-2.27.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552393" comment="python-solv-0.6.37-2.27.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20422" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.3.4, fib6_rule_lookup in net/ipv6/ip6_fib.c mishandles the RT6_LOOKUP_F_DST_NOREF flag in a reference-count decision, leading to (for example) a crash that was identified by syzkaller, aka CID-7b09c2d052db.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422</cve>
	<bugzilla href="https://bugzilla.suse.com/1161897">SUSE bug 1161897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20433" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20433" ref_url="https://www.suse.com/security/cve/CVE-2019-20433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007507.html" source="SUSE-SU"/>
    <description>
    libaspell.a in GNU Aspell before 0.60.8 has a buffer over-read for a string ending with a single '\0' byte, if the encoding is set to ucs-2 or ucs-4 outside of the application, as demonstrated by the ASPELL_CONF environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20433/">CVE-2019-20433</cve>
	<bugzilla href="https://bugzilla.suse.com/1161982">SUSE bug 1161982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334662" comment="aspell is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20477</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20477" ref_url="https://www.suse.com/security/cve/CVE-2019-20477" source="SUSE CVE"/>
    <description>
    PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-20477/">CVE-2019-20477</cve>
	<bugzilla href="https://bugzilla.suse.com/1164453">SUSE bug 1164453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334410" comment="python-PyYAML is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0365-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html" source="SUSE-SU"/>
    <description>
    usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167090">SUSE bug 1167090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531772" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549111" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549112" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549113" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596244" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596245" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596246" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2054</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2054" ref_url="https://www.suse.com/security/cve/CVE-2019-2054" source="SUSE CVE"/>
    <description>
    In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2054/">CVE-2019-2054</cve>
	<bugzilla href="https://bugzilla.suse.com/1134561">SUSE bug 1134561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181039">SUSE bug 1181039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1164-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006774.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0624-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00027.html" source="SUSE-SU"/>
    <description>
    libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<bugzilla href="https://bugzilla.suse.com/1170441">SUSE bug 1170441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173698">SUSE bug 1173698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530919" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530920" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548967" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548968" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595546" comment="libvncclient0-0.9.9-17.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595547" comment="libvncserver0-0.9.9-17.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20794" ref_url="https://www.suse.com/security/cve/CVE-2019-20794" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20794/">CVE-2019-20794</cve>
	<bugzilla href="https://bugzilla.suse.com/1171737">SUSE bug 1171737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20806" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20806" ref_url="https://www.suse.com/security/cve/CVE-2019-20806" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20806/">CVE-2019-20806</cve>
	<bugzilla href="https://bugzilla.suse.com/1172199">SUSE bug 1172199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006896.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0794-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html" source="SUSE-SU"/>
    <description>
    In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531007" comment="gvim-7.4.326-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531008" comment="vim-7.4.326-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551464" comment="gvim-7.4.326-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551465" comment="vim-7.4.326-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595601" comment="gvim-7.4.326-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595602" comment="vim-7.4.326-17.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531009" comment="vim-data-7.4.326-17.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20808" ref_url="https://www.suse.com/security/cve/CVE-2019-20808" source="SUSE CVE"/>
    <description>
    In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20808/">CVE-2019-20808</cve>
	<bugzilla href="https://bugzilla.suse.com/1172379">SUSE bug 1172379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20811" ref_url="https://www.suse.com/security/cve/CVE-2019-20811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20811/">CVE-2019-20811</cve>
	<bugzilla href="https://bugzilla.suse.com/1172456">SUSE bug 1172456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ANBRV4PU5AWEEYUWZYBLJCQBG3AHEGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/" source="SUSE-SU"/>
    <description>
    libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838</cve>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189526">SUSE bug 1189526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193384">SUSE bug 1193384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20839" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20840" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1257-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1258-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1265-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334160" comment="python3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551688" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551689" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551690" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551691" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551692" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595786" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595787" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595788" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595789" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595790" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20908" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20908" ref_url="https://www.suse.com/security/cve/CVE-2019-20908" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20908/">CVE-2019-20908</cve>
	<bugzilla href="https://bugzilla.suse.com/1173567">SUSE bug 1173567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174187">SUSE bug 1174187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010862.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1613-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG3I7MSGZF7WN3YNM7ML4QMO6MXYUU73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KXU352TPOYPGUNSKDJRXFXWPD5NF32K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DKY5FFZVXAPBL5ATB6LJG4VYEF3GOLN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3AA6BSUJEGBBKUCQO6J25OSG7PA6ZKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2185-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOMPFK5R4IK4IFOQTL5NIJK6DKSYRSXT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2GBJR7SZL3UIJETOGQDYOPIODBESJYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/623Y5GJHFGANTQ36ECKXIXY3QVKGYSCE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EUMJS3WWV7Y2IVJFRMZNDUXZBSPWORBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT6BSX5663NCXU3Y4KR3RA3RQHJMCFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AKEBUCTPHZWXJGF6EWK7HBTO726SP2Y/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531867" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531880" comment="python-devel-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531868" comment="python3-3.4.10-25.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531869" comment="python3-base-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531870" comment="python3-curses-3.4.10-25.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531871" comment="python3-devel-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531867" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531868" comment="python3-3.4.10-25.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531869" comment="python3-base-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531870" comment="python3-curses-3.4.10-25.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552085" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552086" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552080" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552087" comment="python-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552088" comment="python-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552089" comment="python-base-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552090" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552091" comment="python-curses-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552092" comment="python-demo-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552093" comment="python-devel-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552094" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552095" comment="python-idle-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552096" comment="python-tk-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552097" comment="python-xml-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552081" comment="python3-3.4.10-25.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552082" comment="python3-base-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552083" comment="python3-curses-3.4.10-25.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552084" comment="python3-devel-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596356" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552086" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596351" comment="libpython3_4m1_0-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596357" comment="python-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552088" comment="python-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596358" comment="python-base-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552090" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596359" comment="python-curses-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596360" comment="python-demo-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596361" comment="python-devel-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596362" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596363" comment="python-idle-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525278" comment="python-pip-10.0.1-13.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009524556" comment="python-setuptools-40.6.2-4.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596364" comment="python-tk-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596365" comment="python-xml-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596352" comment="python3-3.4.10-25.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596353" comment="python3-base-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596354" comment="python3-curses-3.4.10-25.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596355" comment="python3-devel-3.4.10-25.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525277" comment="python3-setuptools-40.6.2-4.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20919" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007519.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1628-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00013.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531376" comment="perl-DBI-1.628-5.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551754" comment="perl-DBI-1.628-5.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595831" comment="perl-DBI-1.628-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20933</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20933" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20933" ref_url="https://www.suse.com/security/cve/CVE-2019-20933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
    <description>
    InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-20933/">CVE-2019-20933</cve>
	<bugzilla href="https://bugzilla.suse.com/1178988">SUSE bug 1178988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596123" comment="crowbar-openstack-4.0+git.1604938545.30c10db18-9.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596124" comment="grafana-6.7.4-1.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596125" comment="influxdb-1.2.4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596126" comment="python-urllib3-1.16-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20934" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20934" ref_url="https://www.suse.com/security/cve/CVE-2019-20934" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20934/">CVE-2019-20934</cve>
	<bugzilla href="https://bugzilla.suse.com/1179663">SUSE bug 1179663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179666">SUSE bug 1179666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2182" ref_url="https://www.suse.com/security/cve/CVE-2019-2182" source="SUSE CVE"/>
    <description>
    In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2182/">CVE-2019-2182</cve>
	<bugzilla href="https://bugzilla.suse.com/1150022">SUSE bug 1150022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2971-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2529-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html" source="SUSE-SU"/>
    <description>
    In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522374" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522375" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522376" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522377" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522378" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522379" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522380" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548826" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548827" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548828" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548829" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548830" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548831" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548832" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595270" comment="libjpeg-turbo-1.5.3-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595271" comment="libjpeg62-62.2.0-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548828" comment="libjpeg62-32bit-62.2.0-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595272" comment="libjpeg62-turbo-1.5.3-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595273" comment="libjpeg8-8.1.2-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548831" comment="libjpeg8-32bit-8.1.2-31.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595274" comment="libturbojpeg0-8.1.2-31.19.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2389</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2389" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2389" ref_url="https://www.suse.com/security/cve/CVE-2019-2389" source="SUSE CVE"/>
    <description>
    Incorrect scoping of kill operations in MongoDB Server's packaged SysV init scripts allow users with write access to the PID file to insert arbitrary PIDs to be killed when the root user stops the MongoDB process via SysV init. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.11; v3.6 versions prior to 3.6.14; v3.4 versions prior to 3.4.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2389/">CVE-2019-2389</cve>
	<bugzilla href="https://bugzilla.suse.com/1149102">SUSE bug 1149102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334386" comment="mongodb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2390</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2390" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2390" ref_url="https://www.suse.com/security/cve/CVE-2019-2390" source="SUSE CVE"/>
    <description>
    An unprivileged user or program on Microsoft Windows which can create OpenSSL configuration files in a fixed location may cause utility programs shipped with MongoDB server to run attacker defined code as the user running the utility. This issue affects: MongoDB Inc. MongoDB Server 4.0 prior to 4.0.11; 3.6 prior to 3.6.14; 3.4 prior to 3.4.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2390/">CVE-2019-2390</cve>
	<bugzilla href="https://bugzilla.suse.com/1149074">SUSE bug 1149074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334386" comment="mongodb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0585-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<bugzilla href="https://bugzilla.suse.com/1122293">SUSE bug 1122293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530522" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530523" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530865" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530870" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530872" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546379" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546380" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546381" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546382" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546656" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542123" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546657" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548942" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542124" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548547" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548548" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548549" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548550" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594879" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594880" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594881" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594882" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595451" comment="java-1_7_1-ibm-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530866" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595452" comment="java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595453" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530869" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595454" comment="java-1_8_0-ibm-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530871" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595455" comment="java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530873" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594842" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594843" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594844" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594845" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2426" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<bugzilla href="https://bugzilla.suse.com/1134297">SUSE bug 1134297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530522" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530523" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546379" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546380" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546381" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546382" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548547" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548548" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548549" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548550" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594879" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594880" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594881" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594882" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594842" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594843" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594844" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594845" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2449" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0585-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<bugzilla href="https://bugzilla.suse.com/1122292">SUSE bug 1122292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25017" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25017" ref_url="https://www.suse.com/security/cve/CVE-2019-25017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008353.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in rcp in MIT krb5-appl through 1.0.3. Due to the rcp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the rcp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious rcp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rcp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). This issue is similar to CVE-2019-6111 and CVE-2019-7283. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25017/">CVE-2019-25017</cve>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531914" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531915" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552116" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552117" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596383" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596384" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25018" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25018" ref_url="https://www.suse.com/security/cve/CVE-2019-25018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008353.html" source="SUSE-SU"/>
    <description>
    In the rcp client in MIT krb5-appl through 1.0.3, malicious servers could bypass intended access restrictions via the filename of . or an empty filename, similar to CVE-2018-20685 and CVE-2019-7282. The impact is modifying the permissions of the target directory on the client side. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25018/">CVE-2019-25018</cve>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531914" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531915" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552116" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552117" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596383" comment="krb5-appl-clients-1.0.3-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596384" comment="krb5-appl-servers-1.0.3-3.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25025</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25025" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25025" ref_url="https://www.suse.com/security/cve/CVE-2019-25025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
    <description>
    The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-25025/">CVE-2019-25025</cve>
	<bugzilla href="https://bugzilla.suse.com/1159548">SUSE bug 1159548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183174">SUSE bug 1183174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348061" comment="rubygem-activerecord-session_store is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25051" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009356.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFDL4ZU73CCA7DXOG7N2VKN4DXLIO7WL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2794-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52SJCPNULPFJAYMPRPDX7QYNTBFA4SXP/" source="SUSE-SU"/>
    <description>
    objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051</cve>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189485">SUSE bug 1189485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192363">SUSE bug 1192363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193390">SUSE bug 1193390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627800" comment="aspell-0.60.6.1-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627801" comment="aspell-ispell-0.60.6.1-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627802" comment="libaspell15-0.60.6.1-18.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627791" comment="libaspell15-32bit-0.60.6.1-18.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2529" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2529" ref_url="https://www.suse.com/security/cve/CVE-2019-2529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2529/">CVE-2019-2529</cve>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595050" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595051" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595052" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595053" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2537" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005813.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00021.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136037">SUSE bug 1136037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530616" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530617" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530618" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530619" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530620" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530621" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548668" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548673" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548674" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548675" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548676" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595049" comment="libmysqlclient18-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548669" comment="libmysqlclient18-32bit-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595050" comment="mariadb-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595051" comment="mariadb-client-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595052" comment="mariadb-errormessages-10.0.38-29.27.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595053" comment="mariadb-tools-10.0.38-29.27.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<bugzilla href="https://bugzilla.suse.com/1132728">SUSE bug 1132728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530522" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530523" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530510" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530512" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530513" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530570" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530572" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546379" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546380" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546381" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546382" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546364" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542012" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546365" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548612" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542060" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548547" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548548" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548549" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548550" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594879" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594880" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594881" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594882" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594866" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594985" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594986" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594842" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594843" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594844" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594845" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2614</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2614" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595300" comment="caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595301" comment="crowbar-core-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595302" comment="crowbar-core-branding-upstream-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595303" comment="crowbar-openstack-4.0+git.1573038068.1e32b3205-9.62.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595304" comment="crowbar-ui-1.1.0+git.1547500033.d0fb2bf2-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595305" comment="galera-3-wsrep-provider-25.3.25-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595306" comment="libmariadb3-3.1.2-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595307" comment="mariadb-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595308" comment="mariadb-client-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595309" comment="mariadb-errormessages-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595310" comment="mariadb-galera-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595311" comment="mariadb-tools-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595312" comment="openstack-dashboard-theme-SUSE-2016.2-5.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595313" comment="openstack-heat-templates-0.0.0+git.1515995585.81ed236-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595314" comment="openstack-neutron-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595315" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595316" comment="openstack-neutron-doc-9.4.2~dev21-7.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595317" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595318" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595319" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595320" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595321" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595322" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595323" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595324" comment="openstack-neutron-server-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595325" comment="openstack-nova-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595326" comment="openstack-nova-api-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595327" comment="openstack-nova-cells-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595328" comment="openstack-nova-cert-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595329" comment="openstack-nova-compute-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595330" comment="openstack-nova-conductor-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595331" comment="openstack-nova-console-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595332" comment="openstack-nova-consoleauth-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595333" comment="openstack-nova-doc-14.0.11~dev13-4.37.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595334" comment="openstack-nova-novncproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595335" comment="openstack-nova-placement-api-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595336" comment="openstack-nova-scheduler-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595337" comment="openstack-nova-serialproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595338" comment="openstack-nova-vncproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595339" comment="patterns-cloud-admin-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595340" comment="patterns-cloud-compute-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595341" comment="patterns-cloud-controller-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595342" comment="patterns-cloud-network-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595343" comment="patterns-cloud-user-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595344" comment="python-neutron-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595345" comment="python-nova-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595346" comment="python-oslo.messaging-5.10.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595347" comment="python-oslo.utils-3.16.1-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595348" comment="python-pysaml2-4.0.2-3.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2627</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2627" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595300" comment="caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595301" comment="crowbar-core-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595302" comment="crowbar-core-branding-upstream-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595303" comment="crowbar-openstack-4.0+git.1573038068.1e32b3205-9.62.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595304" comment="crowbar-ui-1.1.0+git.1547500033.d0fb2bf2-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595305" comment="galera-3-wsrep-provider-25.3.25-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595306" comment="libmariadb3-3.1.2-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595307" comment="mariadb-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595308" comment="mariadb-client-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595309" comment="mariadb-errormessages-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595310" comment="mariadb-galera-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595311" comment="mariadb-tools-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595312" comment="openstack-dashboard-theme-SUSE-2016.2-5.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595313" comment="openstack-heat-templates-0.0.0+git.1515995585.81ed236-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595314" comment="openstack-neutron-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595315" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595316" comment="openstack-neutron-doc-9.4.2~dev21-7.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595317" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595318" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595319" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595320" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595321" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595322" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595323" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595324" comment="openstack-neutron-server-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595325" comment="openstack-nova-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595326" comment="openstack-nova-api-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595327" comment="openstack-nova-cells-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595328" comment="openstack-nova-cert-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595329" comment="openstack-nova-compute-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595330" comment="openstack-nova-conductor-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595331" comment="openstack-nova-console-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595332" comment="openstack-nova-consoleauth-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595333" comment="openstack-nova-doc-14.0.11~dev13-4.37.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595334" comment="openstack-nova-novncproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595335" comment="openstack-nova-placement-api-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595336" comment="openstack-nova-scheduler-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595337" comment="openstack-nova-serialproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595338" comment="openstack-nova-vncproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595339" comment="patterns-cloud-admin-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595340" comment="patterns-cloud-compute-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595341" comment="patterns-cloud-controller-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595342" comment="patterns-cloud-network-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595343" comment="patterns-cloud-user-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595344" comment="python-neutron-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595345" comment="python-nova-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595346" comment="python-oslo.messaging-5.10.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595347" comment="python-oslo.utils-3.16.1-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595348" comment="python-pysaml2-4.0.2-3.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2628</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2628" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1913-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628</cve>
	<bugzilla href="https://bugzilla.suse.com/1136035">SUSE bug 1136035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595300" comment="caasp-openstack-heat-templates-1.0+git.1560518045.ad7dc6d-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595301" comment="crowbar-core-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595302" comment="crowbar-core-branding-upstream-4.0+git.1573109906.0f62e9503-9.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595303" comment="crowbar-openstack-4.0+git.1573038068.1e32b3205-9.62.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595304" comment="crowbar-ui-1.1.0+git.1547500033.d0fb2bf2-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595305" comment="galera-3-wsrep-provider-25.3.25-11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595306" comment="libmariadb3-3.1.2-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595307" comment="mariadb-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595308" comment="mariadb-client-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595309" comment="mariadb-errormessages-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595310" comment="mariadb-galera-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595311" comment="mariadb-tools-10.2.25-13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595312" comment="openstack-dashboard-theme-SUSE-2016.2-5.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595313" comment="openstack-heat-templates-0.0.0+git.1515995585.81ed236-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595314" comment="openstack-neutron-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595315" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595316" comment="openstack-neutron-doc-9.4.2~dev21-7.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595317" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595318" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595319" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595320" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595321" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595322" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595323" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595324" comment="openstack-neutron-server-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595325" comment="openstack-nova-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595326" comment="openstack-nova-api-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595327" comment="openstack-nova-cells-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595328" comment="openstack-nova-cert-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595329" comment="openstack-nova-compute-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595330" comment="openstack-nova-conductor-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595331" comment="openstack-nova-console-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595332" comment="openstack-nova-consoleauth-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595333" comment="openstack-nova-doc-14.0.11~dev13-4.37.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595334" comment="openstack-nova-novncproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595335" comment="openstack-nova-placement-api-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595336" comment="openstack-nova-scheduler-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595337" comment="openstack-nova-serialproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595338" comment="openstack-nova-vncproxy-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595339" comment="patterns-cloud-admin-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595340" comment="patterns-cloud-compute-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595341" comment="patterns-cloud-controller-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595342" comment="patterns-cloud-network-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595343" comment="patterns-cloud-user-20170124-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595344" comment="python-neutron-9.4.2~dev21-7.35.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595345" comment="python-nova-14.0.11~dev13-4.37.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595346" comment="python-oslo.messaging-5.10.2-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595347" comment="python-oslo.utils-3.16.1-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595348" comment="python-pysaml2-4.0.2-3.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1327-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<bugzilla href="https://bugzilla.suse.com/1132732">SUSE bug 1132732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184734">SUSE bug 1184734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530522" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530523" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530510" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530512" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530513" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530570" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530572" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546379" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546380" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546381" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546382" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546364" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542012" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546365" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548612" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542060" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548547" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548548" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548549" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548550" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594879" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594880" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594881" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594882" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594866" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594985" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594986" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594842" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594843" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594844" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594845" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2697" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<bugzilla href="https://bugzilla.suse.com/1132734">SUSE bug 1132734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530510" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530512" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530513" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530570" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530572" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546364" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542012" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546365" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548612" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542060" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594866" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594985" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594986" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1308-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005616.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<bugzilla href="https://bugzilla.suse.com/1132729">SUSE bug 1132729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134718">SUSE bug 1134718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521232" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530522" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530523" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521233" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530510" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530512" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530513" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530570" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530572" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521150" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530485" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530486" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521151" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546379" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546380" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546381" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546382" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546364" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542012" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546365" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548612" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542060" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548547" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548548" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548549" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548550" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594879" comment="java-1_7_0-openjdk-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594880" comment="java-1_7_0-openjdk-demo-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594881" comment="java-1_7_0-openjdk-devel-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594882" comment="java-1_7_0-openjdk-headless-1.7.0.221-43.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594866" comment="java-1_7_1-ibm-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530511" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594867" comment="java-1_7_1-ibm-devel-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594868" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530514" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.45-38.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594985" comment="java-1_8_0-ibm-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530571" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594986" comment="java-1_8_0-ibm-devel-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530573" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.35-30.50.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594842" comment="java-1_8_0-openjdk-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594843" comment="java-1_8_0-openjdk-demo-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594844" comment="java-1_8_0-openjdk-devel-1.8.0.212-27.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594845" comment="java-1_8_0-openjdk-headless-1.8.0.212-27.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2737</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2737" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2739</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2739" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2740</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<bugzilla href="https://bugzilla.suse.com/1141784">SUSE bug 1141784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548663" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548664" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548665" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548666" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595044" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595045" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595046" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595047" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2758</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2758" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758</cve>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<bugzilla href="https://bugzilla.suse.com/1141782">SUSE bug 1141782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542250" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548663" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548664" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548665" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548666" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595131" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595132" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595133" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595044" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595045" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595046" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595047" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2766" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<bugzilla href="https://bugzilla.suse.com/1141789">SUSE bug 1141789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542250" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548663" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548664" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548665" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548666" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595131" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595132" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595133" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595044" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595045" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595046" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595047" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<bugzilla href="https://bugzilla.suse.com/1141783">SUSE bug 1141783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542250" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548663" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548664" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548665" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548666" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595131" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595132" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595133" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595044" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595045" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595046" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595047" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<bugzilla href="https://bugzilla.suse.com/1141787">SUSE bug 1141787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548663" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548664" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548665" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548666" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595044" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595045" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595046" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595047" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2805</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805</cve>
	<bugzilla href="https://bugzilla.suse.com/1132826">SUSE bug 1132826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<bugzilla href="https://bugzilla.suse.com/1141785">SUSE bug 1141785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542250" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548663" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548664" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548665" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548666" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595131" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595132" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595133" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595044" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595045" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595046" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595047" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<bugzilla href="https://bugzilla.suse.com/1141786">SUSE bug 1141786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548663" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548664" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548665" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548666" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595044" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595045" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595046" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595047" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2894" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<bugzilla href="https://bugzilla.suse.com/1152856">SUSE bug 1152856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2933" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2938</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2938" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938</cve>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2958" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0050-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200050-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156669">SUSE bug 1156669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531737" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531738" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531739" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531740" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531741" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531742" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549070" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549071" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549075" comment="mariadb-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549076" comment="mariadb-client-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549077" comment="mariadb-errormessages-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549078" comment="mariadb-tools-10.0.40.2-29.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596199" comment="libmysqlclient18-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549071" comment="libmysqlclient18-32bit-10.0.40.2-29.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2996" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Deployment). The supported version that is affected is Java SE: 8u221; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0051-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200051-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006314.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2557-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2565-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2687-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158442">SUSE bug 1158442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522404" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530782" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530783" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522405" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531743" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531745" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531746" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531253" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531255" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548847" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548848" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548849" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548850" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549079" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542719" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549080" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549012" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542568" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595288" comment="java-1_7_0-openjdk-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595289" comment="java-1_7_0-openjdk-demo-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595290" comment="java-1_7_0-openjdk-devel-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595291" comment="java-1_7_0-openjdk-headless-1.7.0.241-43.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596204" comment="java-1_7_1-ibm-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531744" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596205" comment="java-1_7_1-ibm-devel-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596206" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531747" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.55-38.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595754" comment="java-1_8_0-ibm-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531254" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595755" comment="java-1_8_0-ibm-devel-1.8.0_sr6.0-30.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531256" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.0-30.60.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0140-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155131">SUSE bug 1155131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530808" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530809" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530810" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530814" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551346" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551347" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551348" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551350" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537292" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595382" comment="kernel-default-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595383" comment="kernel-default-base-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595384" comment="kernel-default-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551349" comment="kernel-default-man-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530811" comment="kernel-devel-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530812" comment="kernel-macros-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530813" comment="kernel-source-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595385" comment="kernel-syms-4.4.121-92.101.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530815" comment="kgraft-patch-4_4_121-92_101-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3498</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3498" ref_url="https://www.suse.com/security/cve/CVE-2019-3498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006204.html" source="SUSE-SU"/>
    <description>
    In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3498/">CVE-2019-3498</cve>
	<bugzilla href="https://bugzilla.suse.com/1120932">SUSE bug 1120932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139945">SUSE bug 1139945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3688" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00053.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149108">SUSE bug 1149108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530786" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551325" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595295" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3689" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2776-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192776-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2408-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2435-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html" source="SUSE-SU"/>
    <description>
    The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522280" comment="nfs-client-1.3.0-34.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530719" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522281" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551271" comment="nfs-client-1.3.0-34.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551272" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551273" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595237" comment="nfs-client-1.3.0-34.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595238" comment="nfs-doc-1.3.0-34.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595239" comment="nfs-kernel-server-1.3.0-34.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2672-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-12/msg00024.html" source="SUSE-SU"/>
    <description>
    The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<bugzilla href="https://bugzilla.suse.com/1148336">SUSE bug 1148336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157880">SUSE bug 1157880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530786" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551325" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595295" comment="permissions-2015.09.28.1626-17.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3693" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3693" ref_url="https://www.suse.com/security/cve/CVE-2019-3693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00000.html" source="SUSE-SU"/>
    <description>
    A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3693/">CVE-2019-3693</cve>
	<bugzilla href="https://bugzilla.suse.com/1154328">SUSE bug 1154328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530781" comment="mailman-2.1.17-3.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548846" comment="mailman-2.1.17-3.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595287" comment="mailman-2.1.17-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3701" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701</cve>
	<bugzilla href="https://bugzilla.suse.com/1120386">SUSE bug 1120386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0231-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0167-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0176-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00025.html" source="SUSE-SU"/>
    <description>
    Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530687" comment="libspice-server1-0.12.7-10.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3814" ref_url="https://www.suse.com/security/cve/CVE-2019-3814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005310.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" source="SUSE-SU"/>
    <description>
    It was discovered that Dovecot before versions 2.2.36.1 and 2.3.4.1 incorrectly handled client certificates. A remote attacker in possession of a valid certificate with an empty username field could possibly use this issue to impersonate other users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3814/">CVE-2019-3814</cve>
	<bugzilla href="https://bugzilla.suse.com/1123022">SUSE bug 1123022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530892" comment="dovecot22-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530893" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530894" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530895" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546696" comment="dovecot22-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546697" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546698" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546699" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595518" comment="dovecot22-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595519" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595520" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595521" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005881.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<bugzilla href="https://bugzilla.suse.com/1123161">SUSE bug 1123161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530679" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530680" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530681" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530685" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551243" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551244" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551245" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551247" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537117" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595126" comment="kernel-default-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595127" comment="kernel-default-base-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595128" comment="kernel-default-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551246" comment="kernel-default-man-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530682" comment="kernel-devel-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530683" comment="kernel-macros-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530684" comment="kernel-source-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595129" comment="kernel-syms-4.4.121-92.120.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530686" comment="kgraft-patch-4_4_121-92_120-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00023.html" source="SUSE-SU"/>
    <description>
    libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546549" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546550" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546551" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595171" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595172" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546551" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0174-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00023.html" source="SUSE-SU"/>
    <description>
    libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521601" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521602" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521603" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546549" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546550" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546551" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595171" comment="curl-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595172" comment="libcurl4-7.37.0-37.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546551" comment="libcurl4-32bit-7.37.0-37.34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3828</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3828" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3828" ref_url="https://www.suse.com/security/cve/CVE-2019-3828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1125-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1635-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1858-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html" source="SUSE-SU"/>
    <description>
    Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3828/">CVE-2019-3828</cve>
	<bugzilla href="https://bugzilla.suse.com/1126503">SUSE bug 1126503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164137">SUSE bug 1164137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3830</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3830" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3830" ref_url="https://www.suse.com/security/cve/CVE-2019-3830" source="SUSE CVE"/>
    <description>
    A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3830/">CVE-2019-3830</cve>
	<bugzilla href="https://bugzilla.suse.com/1125567">SUSE bug 1125567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339415" comment="openstack-ceilometer is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548750" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548751" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595169" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595170" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3837" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3837" ref_url="https://www.suse.com/security/cve/CVE-2019-3837" source="SUSE CVE"/>
    <description>
    It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-3837/">CVE-2019-3837</cve>
	<bugzilla href="https://bugzilla.suse.com/1131430">SUSE bug 1131430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1119-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1121-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00018.html" source="SUSE-SU"/>
    <description>
    It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<bugzilla href="https://bugzilla.suse.com/1018128">SUSE bug 1018128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030263">SUSE bug 1030263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1032135">SUSE bug 1032135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038835">SUSE bug 1038835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050888">SUSE bug 1050888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1050889">SUSE bug 1050889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106171">SUSE bug 1106171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106172">SUSE bug 1106172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106173">SUSE bug 1106173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107422">SUSE bug 1107422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107423">SUSE bug 1107423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107581">SUSE bug 1107581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111479">SUSE bug 1111479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112229">SUSE bug 1112229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114495">SUSE bug 1114495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117022">SUSE bug 1117022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117327">SUSE bug 1117327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118318">SUSE bug 1118318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129180">SUSE bug 1129180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136756">SUSE bug 1136756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521696" comment="ghostscript-9.26a-23.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521697" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546672" comment="ghostscript-9.26a-23.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546673" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595482" comment="ghostscript-9.26a-23.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595483" comment="ghostscript-x11-9.26a-23.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3839" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3839" ref_url="https://www.suse.com/security/cve/CVE-2019-3839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2222-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2223-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html" source="SUSE-SU"/>
    <description>
    It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.27 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3839/">CVE-2019-3839</cve>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522218" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522219" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548750" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548751" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595169" comment="ghostscript-9.27-23.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595170" comment="ghostscript-x11-9.27-23.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3840" ref_url="https://www.suse.com/security/cve/CVE-2019-3840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1288-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3840/">CVE-2019-3840</cve>
	<bugzilla href="https://bugzilla.suse.com/1127458">SUSE bug 1127458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530840" comment="libvirt-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530841" comment="libvirt-client-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530842" comment="libvirt-daemon-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530843" comment="libvirt-daemon-config-network-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530844" comment="libvirt-daemon-config-nwfilter-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530845" comment="libvirt-daemon-driver-interface-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530846" comment="libvirt-daemon-driver-libxl-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530847" comment="libvirt-daemon-driver-lxc-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530848" comment="libvirt-daemon-driver-network-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530849" comment="libvirt-daemon-driver-nodedev-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530850" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530851" comment="libvirt-daemon-driver-qemu-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530852" comment="libvirt-daemon-driver-secret-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530853" comment="libvirt-daemon-driver-storage-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530854" comment="libvirt-daemon-hooks-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530855" comment="libvirt-daemon-lxc-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530856" comment="libvirt-daemon-qemu-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530857" comment="libvirt-daemon-xen-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530858" comment="libvirt-doc-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530859" comment="libvirt-lock-sanlock-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530860" comment="libvirt-nss-2.0.0-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551366" comment="libvirt-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551367" comment="libvirt-client-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551368" comment="libvirt-daemon-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551369" comment="libvirt-daemon-config-network-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551370" comment="libvirt-daemon-config-nwfilter-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551371" comment="libvirt-daemon-driver-interface-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530846" comment="libvirt-daemon-driver-libxl-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551372" comment="libvirt-daemon-driver-lxc-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551373" comment="libvirt-daemon-driver-network-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551374" comment="libvirt-daemon-driver-nodedev-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551375" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551376" comment="libvirt-daemon-driver-qemu-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551377" comment="libvirt-daemon-driver-secret-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551378" comment="libvirt-daemon-driver-storage-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551379" comment="libvirt-daemon-hooks-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551380" comment="libvirt-daemon-lxc-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551381" comment="libvirt-daemon-qemu-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530857" comment="libvirt-daemon-xen-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551382" comment="libvirt-doc-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551383" comment="libvirt-lock-sanlock-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551384" comment="libvirt-nss-2.0.0-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595421" comment="libvirt-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595422" comment="libvirt-client-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595423" comment="libvirt-daemon-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595424" comment="libvirt-daemon-config-network-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595425" comment="libvirt-daemon-config-nwfilter-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595426" comment="libvirt-daemon-driver-interface-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530846" comment="libvirt-daemon-driver-libxl-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595427" comment="libvirt-daemon-driver-lxc-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595428" comment="libvirt-daemon-driver-network-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595429" comment="libvirt-daemon-driver-nodedev-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595430" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595431" comment="libvirt-daemon-driver-qemu-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595432" comment="libvirt-daemon-driver-secret-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595433" comment="libvirt-daemon-driver-storage-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595434" comment="libvirt-daemon-hooks-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595435" comment="libvirt-daemon-lxc-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595436" comment="libvirt-daemon-qemu-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530857" comment="libvirt-daemon-xen-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595437" comment="libvirt-doc-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595438" comment="libvirt-lock-sanlock-2.0.0-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595439" comment="libvirt-nss-2.0.0-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" source="SUSE-SU"/>
    <description>
    In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530487" comment="libudev-devel-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551072" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551073" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551074" comment="libudev-devel-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551075" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551076" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551077" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551078" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551079" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551080" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594846" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551073" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594847" comment="libudev-devel-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594848" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551076" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594849" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551078" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594850" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594851" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<bugzilla href="https://bugzilla.suse.com/1136424">SUSE bug 1136424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136446">SUSE bug 1136446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156330">SUSE bug 1156330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552409" comment="kgraft-patch-4_4_121-92_101-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552410" comment="kgraft-patch-4_4_121-92_104-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552411" comment="kgraft-patch-4_4_121-92_109-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537013" comment="kgraft-patch-4_4_121-92_92-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552407" comment="kgraft-patch-4_4_121-92_95-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552408" comment="kgraft-patch-4_4_121-92_98-default-6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537016" comment="kgraft-patch-4_4_121-92_101-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537017" comment="kgraft-patch-4_4_121-92_104-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537018" comment="kgraft-patch-4_4_121-92_109-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536963" comment="kgraft-patch-4_4_121-92_85-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537013" comment="kgraft-patch-4_4_121-92_92-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537014" comment="kgraft-patch-4_4_121-92_95-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537015" comment="kgraft-patch-4_4_121-92_98-default-6-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134329">SUSE bug 1134329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141850">SUSE bug 1141850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334590" comment="libssh2_org is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546670" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595456" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334590" comment="libssh2_org is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546670" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595456" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546670" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595456" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3858" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334590" comment="libssh2_org is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546670" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595456" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1290-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1291-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521117" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521118" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546272" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546273" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594798" comment="libssh2-1-1.4.3-20.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546273" comment="libssh2-1-32bit-1.4.3-20.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1640-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521526" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521924" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546463" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546464" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594984" comment="libssh2-1-1.4.3-20.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546464" comment="libssh2-1-32bit-1.4.3-20.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3861" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546670" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595456" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3862" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334590" comment="libssh2_org is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546670" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595456" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334590" comment="libssh2_org is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521685" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521686" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546670" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595456" comment="libssh2-1-1.4.3-20.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546671" comment="libssh2-1-32bit-1.4.3-20.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005435.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1180-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<bugzilla href="https://bugzilla.suse.com/1131060">SUSE bug 1131060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139519">SUSE bug 1139519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530438" comment="libdcerpc-atsvc0-4.2.4-28.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530439" comment="libdcerpc-binding0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530440" comment="libdcerpc-binding0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530441" comment="libdcerpc0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530442" comment="libdcerpc0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530443" comment="libndr-krb5pac0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530444" comment="libndr-krb5pac0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530445" comment="libndr-nbt0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530446" comment="libndr-nbt0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530447" comment="libndr-standard0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530448" comment="libndr-standard0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530449" comment="libndr0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530450" comment="libndr0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530451" comment="libnetapi0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530452" comment="libnetapi0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530453" comment="libsamba-credentials0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530454" comment="libsamba-credentials0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530455" comment="libsamba-errors0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530456" comment="libsamba-errors0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530457" comment="libsamba-hostconfig0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530458" comment="libsamba-hostconfig0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530459" comment="libsamba-passdb0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530460" comment="libsamba-passdb0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530461" comment="libsamba-util0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530462" comment="libsamba-util0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530463" comment="libsamdb0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530464" comment="libsamdb0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530465" comment="libsmbclient0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530466" comment="libsmbclient0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530467" comment="libsmbconf0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530468" comment="libsmbconf0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530469" comment="libsmbldap0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530470" comment="libsmbldap0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530471" comment="libtevent-util0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530472" comment="libtevent-util0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530473" comment="libwbclient0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530474" comment="libwbclient0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530475" comment="samba-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530476" comment="samba-client-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530477" comment="samba-client-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530478" comment="samba-doc-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530479" comment="samba-libs-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530480" comment="samba-libs-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530481" comment="samba-winbind-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530482" comment="samba-winbind-32bit-4.4.2-38.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551028" comment="libdcerpc-atsvc0-4.2.4-28.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551029" comment="libdcerpc-binding0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551030" comment="libdcerpc-binding0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551031" comment="libdcerpc0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551032" comment="libdcerpc0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551033" comment="libndr-krb5pac0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551034" comment="libndr-krb5pac0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551035" comment="libndr-nbt0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551036" comment="libndr-nbt0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551037" comment="libndr-standard0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551038" comment="libndr-standard0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551039" comment="libndr0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551040" comment="libndr0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551041" comment="libnetapi0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551042" comment="libnetapi0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551043" comment="libsamba-credentials0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551044" comment="libsamba-credentials0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551045" comment="libsamba-errors0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551046" comment="libsamba-errors0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551047" comment="libsamba-hostconfig0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551048" comment="libsamba-hostconfig0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551049" comment="libsamba-passdb0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551050" comment="libsamba-passdb0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551051" comment="libsamba-util0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551052" comment="libsamba-util0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551053" comment="libsamdb0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551054" comment="libsamdb0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551055" comment="libsmbclient0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551056" comment="libsmbclient0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551057" comment="libsmbconf0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551058" comment="libsmbconf0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551059" comment="libsmbldap0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551060" comment="libsmbldap0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551061" comment="libtevent-util0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551062" comment="libtevent-util0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551063" comment="libwbclient0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551064" comment="libwbclient0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551065" comment="samba-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551066" comment="samba-client-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551067" comment="samba-client-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530478" comment="samba-doc-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551068" comment="samba-libs-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551069" comment="samba-libs-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551070" comment="samba-winbind-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551071" comment="samba-winbind-32bit-4.4.2-38.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594819" comment="libdcerpc-atsvc0-4.2.4-28.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594820" comment="libdcerpc-binding0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551030" comment="libdcerpc-binding0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594821" comment="libdcerpc0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551032" comment="libdcerpc0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594822" comment="libndr-krb5pac0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551034" comment="libndr-krb5pac0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594823" comment="libndr-nbt0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551036" comment="libndr-nbt0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594824" comment="libndr-standard0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551038" comment="libndr-standard0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594825" comment="libndr0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551040" comment="libndr0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594826" comment="libnetapi0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551042" comment="libnetapi0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594827" comment="libsamba-credentials0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551044" comment="libsamba-credentials0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594828" comment="libsamba-errors0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551046" comment="libsamba-errors0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594829" comment="libsamba-hostconfig0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551048" comment="libsamba-hostconfig0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594830" comment="libsamba-passdb0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551050" comment="libsamba-passdb0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594831" comment="libsamba-util0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551052" comment="libsamba-util0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594832" comment="libsamdb0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551054" comment="libsamdb0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594833" comment="libsmbclient0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551056" comment="libsmbclient0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594834" comment="libsmbconf0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551058" comment="libsmbconf0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594835" comment="libsmbldap0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551060" comment="libsmbldap0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594836" comment="libtevent-util0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551062" comment="libtevent-util0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594837" comment="libwbclient0-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551064" comment="libwbclient0-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594838" comment="samba-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594839" comment="samba-client-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551067" comment="samba-client-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530478" comment="samba-doc-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594840" comment="samba-libs-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551069" comment="samba-libs-32bit-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594841" comment="samba-winbind-4.4.2-38.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551071" comment="samba-winbind-32bit-4.4.2-38.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3881</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3881" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3881" ref_url="https://www.suse.com/security/cve/CVE-2019-3881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1582-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00051.html" source="SUSE-SU"/>
    <description>
    Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3881/">CVE-2019-3881</cve>
	<bugzilla href="https://bugzilla.suse.com/1143436">SUSE bug 1143436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334174" comment="rubygem-bundler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<bugzilla href="https://bugzilla.suse.com/1131416">SUSE bug 1131416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131427">SUSE bug 1131427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1294-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00105.html" source="SUSE-SU"/>
    <description>
    An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133150">SUSE bug 1133150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530527" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530528" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530529" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530530" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530531" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530532" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530534" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530535" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530536" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530537" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530538" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530539" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530540" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530541" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530542" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530543" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530545" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530546" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530547" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551106" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551107" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551108" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551109" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551110" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551111" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551112" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551113" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551114" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551115" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551116" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551117" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551118" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551119" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551120" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551121" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551122" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551123" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551124" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594887" comment="libvirt-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594888" comment="libvirt-client-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594889" comment="libvirt-daemon-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594890" comment="libvirt-daemon-config-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594891" comment="libvirt-daemon-config-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594892" comment="libvirt-daemon-driver-interface-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530533" comment="libvirt-daemon-driver-libxl-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594893" comment="libvirt-daemon-driver-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594894" comment="libvirt-daemon-driver-network-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594895" comment="libvirt-daemon-driver-nodedev-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594896" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594897" comment="libvirt-daemon-driver-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594898" comment="libvirt-daemon-driver-secret-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594899" comment="libvirt-daemon-driver-storage-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594900" comment="libvirt-daemon-hooks-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594901" comment="libvirt-daemon-lxc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594902" comment="libvirt-daemon-qemu-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530544" comment="libvirt-daemon-xen-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594903" comment="libvirt-doc-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594904" comment="libvirt-lock-sanlock-2.0.0-27.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594905" comment="libvirt-nss-2.0.0-27.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20194473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-4473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-4473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-4473" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
    <description>
    Multiple binaries in IBM SDK, Java Technology Edition 7, 7R, and 8 on the AIX platform use insecure absolute RPATHs, which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 163984.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542250" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595131" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595132" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595133" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20194732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-4732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-4732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-4732" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
    <description>
    IBM SDK, Java Technology Edition Version 7.0.0.0 through 7.0.10.55, 7.1.0.0 through 7.1.4.55, and 8.0.0.0 through 8.0.6.0 could allow a local authenticated attacker to execute arbitrary code on the system, caused by DLL search order hijacking vulnerability in Microsoft Windows client. By placing a specially-crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 172618.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732</cve>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549086" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542735" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596217" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596218" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html" source="SUSE-SU"/>
    <description>
    hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008</cve>
	<bugzilla href="https://bugzilla.suse.com/1133031">SUSE bug 1133031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0184-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521634" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521635" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521597" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521636" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530816" comment="python-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521637" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530817" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521638" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530818" comment="python-demo-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530821" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530822" comment="python-idle-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521640" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521641" comment="python-xml-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521598" comment="python3-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521599" comment="python3-base-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521600" comment="python3-curses-3.4.6-25.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548896" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548897" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546546" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548898" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548899" comment="python-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548900" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548901" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548902" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548903" comment="python-demo-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548905" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548906" comment="python-idle-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548907" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548908" comment="python-xml-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546547" comment="python3-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546548" comment="python3-base-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551266" comment="python3-curses-3.4.6-25.21.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595394" comment="libpython2_7-1_0-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548897" comment="libpython2_7-1_0-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595157" comment="libpython3_4m1_0-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595395" comment="python-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548899" comment="python-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595396" comment="python-base-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548901" comment="python-base-32bit-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595397" comment="python-curses-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595398" comment="python-demo-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530819" comment="python-doc-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530820" comment="python-doc-pdf-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595399" comment="python-gdbm-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595400" comment="python-idle-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595401" comment="python-tk-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595402" comment="python-xml-2.7.13-28.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595158" comment="python3-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595159" comment="python3-base-3.4.6-25.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595160" comment="python3-curses-3.4.6-25.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5018" ref_url="https://www.suse.com/security/cve/CVE-2019-5018" source="SUSE CVE"/>
    <description>
    An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5018/">CVE-2019-5018</cve>
	<bugzilla href="https://bugzilla.suse.com/1134622">SUSE bug 1134622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0111-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0084-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html" source="SUSE-SU"/>
    <description>
    An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009632681" comment="Mesa-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632682" comment="Mesa-32bit-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632683" comment="Mesa-libEGL1-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632684" comment="Mesa-libEGL1-32bit-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632685" comment="Mesa-libGL1-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632686" comment="Mesa-libGL1-32bit-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632687" comment="Mesa-libGLESv2-2-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632688" comment="Mesa-libglapi0-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632689" comment="Mesa-libglapi0-32bit-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632690" comment="libgbm1-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632691" comment="libgbm1-32bit-11.2.1-104.9.49 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632692" comment="libxatracker2-1.0.0-104.9.49 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5108" ref_url="https://www.suse.com/security/cve/CVE-2019-5108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
    <description>
    An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5108/">CVE-2019-5108</cve>
	<bugzilla href="https://bugzilla.suse.com/1159912">SUSE bug 1159912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159913">SUSE bug 1159913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552484" comment="kgraft-patch-4_4_121-92_104-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552483" comment="kgraft-patch-4_4_121-92_109-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552482" comment="kgraft-patch-4_4_121-92_114-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552481" comment="kgraft-patch-4_4_121-92_117-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552480" comment="kgraft-patch-4_4_121-92_120-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552479" comment="kgraft-patch-4_4_121-92_125-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538074" comment="kgraft-patch-4_4_121-92_104-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538073" comment="kgraft-patch-4_4_121-92_109-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538072" comment="kgraft-patch-4_4_121-92_114-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538071" comment="kgraft-patch-4_4_121-92_117-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538070" comment="kgraft-patch-4_4_121-92_120-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538069" comment="kgraft-patch-4_4_121-92_125-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5418</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5418" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0915-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190915-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    There is a File Content Disclosure vulnerability in Action View &lt;5.2.2.1, &lt;5.1.6.2, &lt;5.0.7.2, &lt;4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418</cve>
	<bugzilla href="https://bugzilla.suse.com/1129272">SUSE bug 1129272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595524" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5419</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5419" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0915-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190915-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1344-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1527-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1824-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    There is a possible denial of service vulnerability in Action View (Rails) &lt;5.2.2.1, &lt;5.1.6.2, &lt;5.0.7.2, &lt;4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419</cve>
	<bugzilla href="https://bugzilla.suse.com/1129271">SUSE bug 1129271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595524" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5420</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5420" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5420" ref_url="https://www.suse.com/security/cve/CVE-2019-5420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability in development mode Rails &lt;5.2.2.1, &lt;6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5420/">CVE-2019-5420</cve>
	<bugzilla href="https://bugzilla.suse.com/1129268">SUSE bug 1129268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334392" comment="rubygem-rails-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2009-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192009-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1492-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1508-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521212" comment="curl-7.37.0-37.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521213" comment="libcurl4-7.37.0-37.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521214" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546373" comment="curl-7.37.0-37.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546374" comment="libcurl4-7.37.0-37.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546375" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594874" comment="curl-7.37.0-37.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594875" comment="libcurl4-7.37.0-37.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546375" comment="libcurl4-32bit-7.37.0-37.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5477</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2867-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192867-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008258.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLEJCRYIVSTKE34ZJIXITKLZOOKOAMWQ/" source="SUSE-SU"/>
    <description>
    A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477</cve>
	<bugzilla href="https://bugzilla.suse.com/1146578">SUSE bug 1146578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595186" comment="crowbar-core-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595187" comment="crowbar-core-branding-upstream-4.0+git.1570463621.40b11cd48-9.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595188" comment="crowbar-openstack-4.0+git.1569429513.e7016b2b6-9.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595189" comment="grafana-4.6.5-1.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595190" comment="novnc-1.0.0-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595191" comment="openstack-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595192" comment="openstack-keystone-doc-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595193" comment="openstack-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595194" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595195" comment="openstack-neutron-doc-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595196" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595197" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595198" comment="openstack-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595199" comment="openstack-neutron-lbaas-agent-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595200" comment="openstack-neutron-lbaas-doc-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595201" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595202" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595203" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595204" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595205" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595206" comment="openstack-neutron-server-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595207" comment="openstack-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595208" comment="openstack-nova-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595209" comment="openstack-nova-cells-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595210" comment="openstack-nova-cert-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595211" comment="openstack-nova-compute-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595212" comment="openstack-nova-conductor-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595213" comment="openstack-nova-console-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595214" comment="openstack-nova-consoleauth-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595215" comment="openstack-nova-doc-14.0.11~dev13-4.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595216" comment="openstack-nova-novncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595217" comment="openstack-nova-placement-api-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595218" comment="openstack-nova-scheduler-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595219" comment="openstack-nova-serialproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595220" comment="openstack-nova-vncproxy-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595221" comment="openstack-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595222" comment="openstack-tempest-test-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595223" comment="python-keystone-10.0.3~dev9-7.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595224" comment="python-neutron-9.4.2~dev21-7.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595225" comment="python-neutron-lbaas-9.2.2~dev11-4.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595226" comment="python-nova-14.0.11~dev13-4.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595227" comment="python-pysaml2-4.0.2-3.11.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595228" comment="python-tempest-12.2.1~a0~dev177-4.6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595229" comment="python-urllib3-1.16-3.9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595230" comment="ruby2.1-rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595231" comment="ruby2.1-rubygem-easy_diff-1.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596336" comment="ruby2.1-rubygem-nokogiri-1.6.1-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595232" comment="rubygem-chef-10.32.2-5.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595233" comment="sleshammer-aarch64-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595234" comment="sleshammer-ppc64le-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595235" comment="sleshammer-s390x-0.7.0-0.18.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595236" comment="sleshammer-x86_64-0.7.0-0.18.12.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2373-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192373-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2149-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530693" comment="curl-7.37.0-37.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530694" comment="libcurl4-7.37.0-37.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530695" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548729" comment="curl-7.37.0-37.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548730" comment="libcurl4-7.37.0-37.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548731" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595134" comment="curl-7.37.0-37.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595135" comment="libcurl4-7.37.0-37.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548731" comment="libcurl4-32bit-7.37.0-37.43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="TID000019369" ref_url="https://www.suse.com/support/kb/doc/?id=000019369" source="SUSE-SU"/>
		<reference ref_id="TID7023616" ref_url="https://www.suse.com/support/kb/doc/?id=7023616" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html" source="SUSE-SU"/>
    <description>
    The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<bugzilla href="https://bugzilla.suse.com/1120843">SUSE bug 1120843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120885">SUSE bug 1120885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530558" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530559" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530560" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530564" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551136" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551137" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551138" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551140" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536941" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594963" comment="kernel-default-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594964" comment="kernel-default-base-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594965" comment="kernel-default-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551139" comment="kernel-default-man-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530561" comment="kernel-devel-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530562" comment="kernel-macros-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530563" comment="kernel-source-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594966" comment="kernel-syms-4.4.121-92.114.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530565" comment="kgraft-patch-4_4_121-92_114-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5737</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5737" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0627-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190627-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0635-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190635-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0636-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190636-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1211-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00059.html" source="SUSE-SU"/>
    <description>
    In Node.js including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1, an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737</cve>
	<bugzilla href="https://bugzilla.suse.com/1127532">SUSE bug 1127532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595502" comment="nodejs6-6.17.0-11.24.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5739</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5739" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5739" ref_url="https://www.suse.com/security/cve/CVE-2019-5739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005269.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1076-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1173-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html" source="SUSE-SU"/>
    <description>
    Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5739/">CVE-2019-5739</cve>
	<bugzilla href="https://bugzilla.suse.com/1127533">SUSE bug 1127533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595502" comment="nodejs6-6.17.0-11.24.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5785" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0202-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0248-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0249-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0250-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<bugzilla href="https://bugzilla.suse.com/1125330">SUSE bug 1125330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125396">SUSE bug 1125396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0925-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190925-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1281-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00098.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<bugzilla href="https://bugzilla.suse.com/1131493">SUSE bug 1131493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521764" comment="wget-1.14-21.10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546709" comment="wget-1.14-21.10.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595525" comment="wget-1.14-21.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521455" comment="openssh-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521456" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530557" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521457" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551132" comment="openssh-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551133" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551134" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551135" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594959" comment="openssh-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594960" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594961" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594962" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6110" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00041.html" source="SUSE-SU"/>
    <description>
    In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521193" comment="openssh-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521194" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530509" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521195" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551094" comment="openssh-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551095" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551096" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551097" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594862" comment="openssh-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594863" comment="openssh-askpass-gnome-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594864" comment="openssh-fips-7.2p2-74.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594865" comment="openssh-helpers-7.2p2-74.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123028">SUSE bug 1123028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521455" comment="openssh-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521456" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530557" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521457" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551132" comment="openssh-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551133" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551134" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551135" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594959" comment="openssh-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594960" comment="openssh-askpass-gnome-7.2p2-74.42.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594961" comment="openssh-fips-7.2p2-74.42.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594962" comment="openssh-helpers-7.2p2-74.42.8 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0144-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0103-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0104-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-01/msg00047.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<bugzilla href="https://bugzilla.suse.com/1122319">SUSE bug 1122319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129186">SUSE bug 1129186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134156">SUSE bug 1134156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521244" comment="ghostscript-9.26a-23.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521245" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521246" comment="libspectre1-0.2.7-12.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546406" comment="ghostscript-9.26a-23.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546407" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546408" comment="libspectre1-0.2.7-12.6.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594916" comment="ghostscript-9.26a-23.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594917" comment="ghostscript-x11-9.26a-23.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594918" comment="libspectre1-0.2.7-12.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6128" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006177.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1161-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00041.html" source="SUSE-SU"/>
    <description>
    The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<bugzilla href="https://bugzilla.suse.com/1121626">SUSE bug 1121626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153715">SUSE bug 1153715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333930" comment="tiff is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html" source="SUSE-SU"/>
    <description>
    In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522035" comment="libpolkit0-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522037" comment="polkit-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522038" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548660" comment="libpolkit0-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548661" comment="polkit-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548662" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595041" comment="libpolkit0-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595042" comment="polkit-0.113-5.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595043" comment="typelib-1_0-Polkit-1_0-0.113-5.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6212" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6215" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6216" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6217" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6226" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6227" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6229" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005162.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0309-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00015.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<bugzilla href="https://bugzilla.suse.com/1124937">SUSE bug 1124937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521654" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521655" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521657" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521658" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530838" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521659" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530839" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551359" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551360" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551361" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551362" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551363" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551364" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551365" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595414" comment="libjavascriptcoregtk-4_0-18-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595415" comment="libwebkit2gtk-4_0-37-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521656" comment="libwebkit2gtk3-lang-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595416" comment="typelib-1_0-JavaScriptCore-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595417" comment="typelib-1_0-WebKit2-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595418" comment="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595419" comment="webkit2gtk-4_0-injected-bundles-2.22.6-2.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595420" comment="webkit2gtk3-devel-2.22.6-2.35.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<bugzilla href="https://bugzilla.suse.com/1121894">SUSE bug 1121894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0425-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0255-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0268-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521175" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521176" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530487" comment="libudev-devel-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521177" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521178" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521179" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521180" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521182" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521183" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551072" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551073" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551074" comment="libudev-devel-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551075" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551076" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551077" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551078" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551079" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551080" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594846" comment="libsystemd0-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551073" comment="libsystemd0-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594847" comment="libudev-devel-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594848" comment="libudev1-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551076" comment="libudev1-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594849" comment="systemd-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551078" comment="systemd-32bit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521181" comment="systemd-bash-completion-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594850" comment="systemd-sysvinit-228-150.66.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594851" comment="udev-228-150.66.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6465" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1406-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1532-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html" source="SUSE-SU"/>
    <description>
    Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -&gt; 9.10.8-P1, 9.11.0 -&gt; 9.11.5-P2, 9.12.0 -&gt; 9.12.3-P2, and versions 9.9.3-S1 -&gt; 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -&gt; 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<bugzilla href="https://bugzilla.suse.com/1126069">SUSE bug 1126069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148887">SUSE bug 1148887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530524" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530525" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521234" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521235" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548569" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548570" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548572" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548573" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594883" comment="bind-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594884" comment="bind-chrootenv-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530526" comment="bind-doc-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594885" comment="bind-libs-9.9.9P1-63.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594886" comment="bind-utils-9.9.9P1-63.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2044-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530990" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530991" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530993" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530994" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530996" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530997" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531000" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551454" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551455" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551456" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551457" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551459" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537488" comment="qemu-ppc-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551461" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595592" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595593" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595594" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595595" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595596" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595597" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6974" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<bugzilla href="https://bugzilla.suse.com/1124728">SUSE bug 1124728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124729">SUSE bug 1124729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537361" comment="kgraft-patch-4_4_120-92_70-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552439" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537360" comment="kgraft-patch-4_4_121-92_73-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537362" comment="kgraft-patch-4_4_121-92_80-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537359" comment="kgraft-patch-4_4_121-92_85-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537364" comment="kgraft-patch-4_4_121-92_92-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552438" comment="kgraft-patch-4_4_121-92_95-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552437" comment="kgraft-patch-4_4_121-92_98-default-4-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551409" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551410" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551411" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551413" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537361" comment="kgraft-patch-4_4_120-92_70-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537370" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537391" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537360" comment="kgraft-patch-4_4_121-92_73-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537362" comment="kgraft-patch-4_4_121-92_80-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537359" comment="kgraft-patch-4_4_121-92_85-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537364" comment="kgraft-patch-4_4_121-92_92-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537367" comment="kgraft-patch-4_4_121-92_95-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537363" comment="kgraft-patch-4_4_121-92_98-default-4-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595503" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595504" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595505" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595506" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6975</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6975" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6975" ref_url="https://www.suse.com/security/cve/CVE-2019-6975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005770.html" source="SUSE-SU"/>
    <description>
    Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6975/">CVE-2019-6975</cve>
	<bugzilla href="https://bugzilla.suse.com/1124991">SUSE bug 1124991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139945">SUSE bug 1139945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595048" comment="python-Django-1.8.19-3.12.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7164</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2261-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192261-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2374-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192374-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html" source="SUSE-SU"/>
    <description>
    SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164</cve>
	<bugzilla href="https://bugzilla.suse.com/1124593">SUSE bug 1124593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595143" comment="python-SQLAlchemy-1.0.14-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1058-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<bugzilla href="https://bugzilla.suse.com/1128649">SUSE bug 1128649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7221" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0645-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190645-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<bugzilla href="https://bugzilla.suse.com/1124732">SUSE bug 1124732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124734">SUSE bug 1124734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537361" comment="kgraft-patch-4_4_120-92_70-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552439" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537360" comment="kgraft-patch-4_4_121-92_73-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537362" comment="kgraft-patch-4_4_121-92_80-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537359" comment="kgraft-patch-4_4_121-92_85-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537364" comment="kgraft-patch-4_4_121-92_92-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552438" comment="kgraft-patch-4_4_121-92_95-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552437" comment="kgraft-patch-4_4_121-92_98-default-4-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551409" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551410" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551411" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551413" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537361" comment="kgraft-patch-4_4_120-92_70-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537370" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537391" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537360" comment="kgraft-patch-4_4_121-92_73-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537362" comment="kgraft-patch-4_4_121-92_80-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537359" comment="kgraft-patch-4_4_121-92_85-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537364" comment="kgraft-patch-4_4_121-92_92-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537367" comment="kgraft-patch-4_4_121-92_95-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537363" comment="kgraft-patch-4_4_121-92_98-default-4-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595503" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595504" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595505" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595506" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00000.html" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<bugzilla href="https://bugzilla.suse.com/1124735">SUSE bug 1124735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551409" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551410" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551411" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551413" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537391" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595503" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595504" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595505" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595506" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7285" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7292" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may result in the disclosure of process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7308" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7308" ref_url="https://www.suse.com/security/cve/CVE-2019-7308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7308/">CVE-2019-7308</cve>
	<bugzilla href="https://bugzilla.suse.com/1124055">SUSE bug 1124055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html" source="SUSE-SU"/>
    <description>
    png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165297">SUSE bug 1165297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530688" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530690" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530691" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530698" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530700" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522039" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530614" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530615" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522040" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522656" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522657" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548727" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542250" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548728" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548732" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542257" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548663" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548664" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548665" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548666" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549087" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549088" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595131" comment="java-1_7_1-ibm-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530689" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595132" comment="java-1_7_1-ibm-devel-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595133" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530692" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.50-38.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595144" comment="java-1_8_0-ibm-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530699" comment="java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595145" comment="java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530701" comment="java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595044" comment="java-1_8_0-openjdk-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595045" comment="java-1_8_0-openjdk-demo-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595046" comment="java-1_8_0-openjdk-devel-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595047" comment="java-1_8_0-openjdk-headless-1.8.0.222-27.35.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596221" comment="libpng16-16-1.6.8-15.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549088" comment="libpng16-16-32bit-1.6.8-15.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7395" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<bugzilla href="https://bugzilla.suse.com/1124368">SUSE bug 1124368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0214-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0215-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0235-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-02/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<bugzilla href="https://bugzilla.suse.com/1124366">SUSE bug 1124366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
    <description>
    In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<bugzilla href="https://bugzilla.suse.com/1124365">SUSE bug 1124365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7524" ref_url="https://www.suse.com/security/cve/CVE-2019-7524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005310.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1212-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1220-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00067.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7524/">CVE-2019-7524</cve>
	<bugzilla href="https://bugzilla.suse.com/1130116">SUSE bug 1130116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530892" comment="dovecot22-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530893" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530894" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530895" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546696" comment="dovecot22-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546697" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546698" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546699" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595518" comment="dovecot22-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595519" comment="dovecot22-backend-mysql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595520" comment="dovecot22-backend-pgsql-2.2.31-19.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595521" comment="dovecot22-backend-sqlite-2.2.31-19.14.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7548</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7548" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7548" ref_url="https://www.suse.com/security/cve/CVE-2019-7548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2253-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2261-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192261-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2374-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192374-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2039-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2078-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html" source="SUSE-SU"/>
    <description>
    SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7548/">CVE-2019-7548</cve>
	<bugzilla href="https://bugzilla.suse.com/1124593">SUSE bug 1124593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595143" comment="python-SQLAlchemy-1.0.14-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7608</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7608" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7608" ref_url="https://www.suse.com/security/cve/CVE-2019-7608" source="SUSE CVE"/>
    <description>
    Kibana versions before 5.6.15 and 6.6.1 had a cross-site scripting (XSS) vulnerability that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-7608/">CVE-2019-7608</cve>
	<bugzilla href="https://bugzilla.suse.com/1130634">SUSE bug 1130634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7609</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7609" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7609" ref_url="https://www.suse.com/security/cve/CVE-2019-7609" source="SUSE CVE"/>
    <description>
    Kibana versions before 5.6.15 and 6.6.1 contain an arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7609/">CVE-2019-7609</cve>
	<bugzilla href="https://bugzilla.suse.com/1130633">SUSE bug 1130633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7610</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7610" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7610" ref_url="https://www.suse.com/security/cve/CVE-2019-7610" source="SUSE CVE"/>
    <description>
    Kibana versions before 6.6.1 contain an arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7610/">CVE-2019-7610</cve>
	<bugzilla href="https://bugzilla.suse.com/1130632">SUSE bug 1130632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7611</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7611" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7611" ref_url="https://www.suse.com/security/cve/CVE-2019-7611" source="SUSE CVE"/>
    <description>
    A permission issue was found in Elasticsearch versions before 5.6.15 and 6.6.1 when Field Level Security and Document Level Security are disabled and the _aliases, _shrink, or _split endpoints are used . If the elasticsearch.yml file has xpack.security.dls_fls.enabled set to false, certain permission checks are skipped when users perform one of the actions mentioned above, to make existing data available under a new index/alias name. This could result in an attacker gaining additional permissions against a restricted index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7611/">CVE-2019-7611</cve>
	<bugzilla href="https://bugzilla.suse.com/1130730">SUSE bug 1130730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7616</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7616" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7616" ref_url="https://www.suse.com/security/cve/CVE-2019-7616" source="SUSE CVE"/>
    <description>
    Kibana versions before 6.8.2 and 7.2.1 contain a server side request forgery (SSRF) flaw in the graphite integration for Timelion visualizer. An attacker with administrative Kibana access could set the timelion:graphite.url configuration option to an arbitrary URL. This could possibly lead to an attacker accessing external URL resources as the Kibana process on the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7616/">CVE-2019-7616</cve>
	<bugzilla href="https://bugzilla.suse.com/1143554">SUSE bug 1143554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7620</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7620" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7620" ref_url="https://www.suse.com/security/cve/CVE-2019-7620" source="SUSE CVE"/>
    <description>
    Logstash versions before 7.4.1 and 6.8.4 contain a denial of service flaw in the Logstash Beats input plugin. An unauthenticated user who is able to connect to the port the Logstash beats input could send a specially crafted network packet that would cause Logstash to stop responding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7620/">CVE-2019-7620</cve>
	<bugzilla href="https://bugzilla.suse.com/1155526">SUSE bug 1155526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339424" comment="logstash is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7621</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7621" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7621" ref_url="https://www.suse.com/security/cve/CVE-2019-7621" source="SUSE CVE"/>
    <description>
    Kibana versions before 6.8.6 and 7.5.1 contain a cross site scripting (XSS) flaw in the coordinate and region map visualizations. An attacker with the ability to create coordinate map visualizations could create a malicious visualization. If another Kibana user views that visualization or a dashboard containing the visualization it could execute JavaScript in the victim???s browser.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-7621/">CVE-2019-7621</cve>
	<bugzilla href="https://bugzilla.suse.com/1159666">SUSE bug 1159666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8320" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320</cve>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8321" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321</cve>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8322" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322</cve>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8323" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323</cve>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8324" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324</cve>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8325" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325</cve>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8341</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8341" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8341" ref_url="https://www.suse.com/security/cve/CVE-2019-8341" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1395-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1614-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8341/">CVE-2019-8341</cve>
	<bugzilla href="https://bugzilla.suse.com/1125815">SUSE bug 1125815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530065" comment="python-Jinja2-2.8-22.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8457" ref_url="https://www.suse.com/security/cve/CVE-2019-8457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1645-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html" source="SUSE-SU"/>
    <description>
    SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8457/">CVE-2019-8457</cve>
	<bugzilla href="https://bugzilla.suse.com/1136976">SUSE bug 1136976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521516" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521517" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521518" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548609" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548610" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548611" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594982" comment="libsqlite3-0-3.8.10.2-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548610" comment="libsqlite3-0-32bit-3.8.10.2-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594983" comment="sqlite3-3.8.10.2-9.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. A malicious website may be able to execute scripts in the context of another website.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8515" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A cross-origin issue existed with the fetch API. This was addressed with improved input validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may disclose sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<bugzilla href="https://bugzilla.suse.com/1132256">SUSE bug 1132256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521136" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521137" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521139" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521140" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521141" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530437" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551021" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551022" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551023" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551024" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551025" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551026" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551027" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594812" comment="libjavascriptcoregtk-4_0-18-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594813" comment="libwebkit2gtk-4_0-37-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521138" comment="libwebkit2gtk3-lang-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594814" comment="typelib-1_0-JavaScriptCore-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594815" comment="typelib-1_0-WebKit2-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594816" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594817" comment="webkit2gtk-4_0-injected-bundles-2.24.1-2.41.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594818" comment="webkit2gtk3-devel-2.24.1-2.41.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8564" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564</cve>
	<bugzilla href="https://bugzilla.suse.com/1132673">SUSE bug 1132673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may result in the disclosure of process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1766-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<bugzilla href="https://bugzilla.suse.com/1135715">SUSE bug 1135715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A logic issue existed in the handling of synchronous page loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13, Safari 13. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00070.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548841" comment="cups-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548842" comment="cups-client-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548843" comment="cups-libs-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548844" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595283" comment="cups-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595284" comment="cups-client-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595285" comment="cups-libs-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548844" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2345-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2207-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue existed in the handling of document loads. This issue was addressed with improved state management. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<bugzilla href="https://bugzilla.suse.com/1148931">SUSE bug 1148931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522114" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522115" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522117" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522118" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530696" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522119" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530697" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551248" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551249" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551250" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551251" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551252" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551253" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551254" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595136" comment="libjavascriptcoregtk-4_0-18-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595137" comment="libwebkit2gtk-4_0-37-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522116" comment="libwebkit2gtk3-lang-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595138" comment="typelib-1_0-JavaScriptCore-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595139" comment="typelib-1_0-WebKit2-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595140" comment="typelib-1_0-WebKit2WebExtension-4_0-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595141" comment="webkit2gtk-4_0-injected-bundles-2.24.4-2.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595142" comment="webkit2gtk3-devel-2.24.4-2.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2573-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00070.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<bugzilla href="https://bugzilla.suse.com/1146358">SUSE bug 1146358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146359">SUSE bug 1146359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522393" comment="cups-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522394" comment="cups-client-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522395" comment="cups-libs-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522396" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548841" comment="cups-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548842" comment="cups-client-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548843" comment="cups-libs-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548844" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595283" comment="cups-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595284" comment="cups-client-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595285" comment="cups-libs-1.7.5-20.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548844" comment="cups-libs-32bit-1.7.5-20.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8726" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.1 and iPadOS 13.1, tvOS 13, Safari 13.0.1, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 6.1, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8768" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    "Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Catalina 10.15. A user may be unable to delete browsing history items.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    An issue existed in the drawing of web page elements. The issue was addressed with improved logic. This issue is fixed in iOS 13.1 and iPadOS 13.1, macOS Catalina 10.15. Visiting a maliciously crafted website may reveal browsing history.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 13.0.1, iOS 13. Maliciously crafted web content may violate iframe sandboxing policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771</cve>
	<bugzilla href="https://bugzilla.suse.com/1155321">SUSE bug 1155321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2587-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2591-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-11/msg00074.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823</cve>
	<bugzilla href="https://bugzilla.suse.com/1156318">SUSE bug 1156318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8835" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835</cve>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8844" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844</cve>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8846" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846</cve>
	<bugzilla href="https://bugzilla.suse.com/1161719">SUSE bug 1161719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8912</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="TID000019417" ref_url="https://www.suse.com/support/kb/doc/?id=000019417" source="SUSE-SU"/>
		<reference ref_id="TID7023740" ref_url="https://www.suse.com/support/kb/doc/?id=7023740" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<bugzilla href="https://bugzilla.suse.com/1125907">SUSE bug 1125907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126284">SUSE bug 1126284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8934" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
    <description>
    hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126455">SUSE bug 1126455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8936" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005280.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1143-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1158-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00036.html" source="SUSE-SU"/>
    <description>
    NTP through 4.2.8p12 has a NULL Pointer Dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<bugzilla href="https://bugzilla.suse.com/1128525">SUSE bug 1128525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148892">SUSE bug 1148892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155513">SUSE bug 1155513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521702" comment="ntp-4.2.8p13-85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521703" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548943" comment="ntp-4.2.8p13-85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548944" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595484" comment="ntp-4.2.8p13-85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595485" comment="ntp-doc-4.2.8p13-85.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8953</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8953" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8953" ref_url="https://www.suse.com/security/cve/CVE-2019-8953" source="SUSE CVE"/>
    <description>
    The HAProxy package before 0.59_16 for pfSense has XSS via the desc (aka Description) or table_actionsaclN parameter, related to haproxy_listeners.php and haproxy_listeners_edit.php.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8953/">CVE-2019-8953</cve>
	<bugzilla href="https://bugzilla.suse.com/1126227">SUSE bug 1126227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8956</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8956" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8956" ref_url="https://www.suse.com/security/cve/CVE-2019-8956" source="SUSE CVE"/>
    <description>
    In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-8956/">CVE-2019-8956</cve>
	<bugzilla href="https://bugzilla.suse.com/1124136">SUSE bug 1124136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8980</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8980" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8980" ref_url="https://www.suse.com/security/cve/CVE-2019-8980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8980/">CVE-2019-8980</cve>
	<bugzilla href="https://bugzilla.suse.com/1126209">SUSE bug 1126209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9003" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9003" ref_url="https://www.suse.com/security/cve/CVE-2019-9003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9003/">CVE-2019-9003</cve>
	<bugzilla href="https://bugzilla.suse.com/1126704">SUSE bug 1126704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074</cve>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075</cve>
	<bugzilla href="https://bugzilla.suse.com/1071544">SUSE bug 1071544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193110">SUSE bug 1193110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1790-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1804-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077</cve>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9162</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9162" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9162" ref_url="https://www.suse.com/security/cve/CVE-2019-9162" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9162/">CVE-2019-9162</cve>
	<bugzilla href="https://bugzilla.suse.com/1127324">SUSE bug 1127324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005821.html" source="SUSE-SU"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146392">SUSE bug 1146392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530595" comment="glibc-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530596" comment="glibc-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530597" comment="glibc-devel-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530598" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530602" comment="glibc-locale-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530603" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530604" comment="glibc-profile-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530605" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530606" comment="nscd-2.22-62.22.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551189" comment="glibc-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551190" comment="glibc-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551191" comment="glibc-devel-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551192" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551193" comment="glibc-locale-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551194" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551195" comment="glibc-profile-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551196" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551197" comment="nscd-2.22-62.22.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595033" comment="glibc-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551190" comment="glibc-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595034" comment="glibc-devel-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551192" comment="glibc-devel-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530599" comment="glibc-html-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530600" comment="glibc-i18ndata-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530601" comment="glibc-info-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595035" comment="glibc-locale-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551194" comment="glibc-locale-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595036" comment="glibc-profile-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551196" comment="glibc-profile-32bit-2.22-62.22.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595037" comment="nscd-2.22-62.22.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9213" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0645-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190645-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<bugzilla href="https://bugzilla.suse.com/1128166">SUSE bug 1128166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128378">SUSE bug 1128378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129016">SUSE bug 1129016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537361" comment="kgraft-patch-4_4_120-92_70-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552439" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537360" comment="kgraft-patch-4_4_121-92_73-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537362" comment="kgraft-patch-4_4_121-92_80-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537359" comment="kgraft-patch-4_4_121-92_85-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537364" comment="kgraft-patch-4_4_121-92_92-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552438" comment="kgraft-patch-4_4_121-92_95-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552437" comment="kgraft-patch-4_4_121-92_98-default-4-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530877" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530878" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530879" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530883" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551409" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551410" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551411" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551413" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537361" comment="kgraft-patch-4_4_120-92_70-default-11-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537370" comment="kgraft-patch-4_4_121-92_101-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537391" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537360" comment="kgraft-patch-4_4_121-92_73-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537362" comment="kgraft-patch-4_4_121-92_80-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537359" comment="kgraft-patch-4_4_121-92_85-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537364" comment="kgraft-patch-4_4_121-92_92-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537367" comment="kgraft-patch-4_4_121-92_95-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537363" comment="kgraft-patch-4_4_121-92_98-default-4-2.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595503" comment="kernel-default-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595504" comment="kernel-default-base-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595505" comment="kernel-default-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551412" comment="kernel-default-man-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530880" comment="kernel-devel-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530881" comment="kernel-macros-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530882" comment="kernel-source-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595506" comment="kernel-syms-4.4.121-92.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530884" comment="kgraft-patch-4_4_121-92_104-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9278" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112537774
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9454" ref_url="https://www.suse.com/security/cve/CVE-2019-9454" source="SUSE CVE"/>
    <description>
    In the Android kernel in i2c driver there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9454/">CVE-2019-9454</cve>
	<bugzilla href="https://bugzilla.suse.com/1150023">SUSE bug 1150023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9455" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9455" ref_url="https://www.suse.com/security/cve/CVE-2019-9455" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9455/">CVE-2019-9455</cve>
	<bugzilla href="https://bugzilla.suse.com/1170345">SUSE bug 1170345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9456" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-09/msg00133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html" source="SUSE-SU"/>
    <description>
    In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<bugzilla href="https://bugzilla.suse.com/1150025">SUSE bug 1150025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<bugzilla href="https://bugzilla.suse.com/1168295">SUSE bug 1168295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173963">SUSE bug 1173963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552460" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537678" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html" source="SUSE-SU"/>
    <description>
    The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<bugzilla href="https://bugzilla.suse.com/1132673">SUSE bug 1132673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132828">SUSE bug 1132828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156653">SUSE bug 1156653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530501" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530502" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530503" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530507" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551089" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551090" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551091" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551093" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536864" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594858" comment="kernel-default-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594859" comment="kernel-default-base-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594860" comment="kernel-default-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551092" comment="kernel-default-man-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530504" comment="kernel-devel-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530505" comment="kernel-macros-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530506" comment="kernel-source-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594861" comment="kernel-syms-4.4.121-92.109.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530508" comment="kgraft-patch-4_4_121-92_109-default-1-3.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html" source="SUSE-SU"/>
    <description>
    The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<bugzilla href="https://bugzilla.suse.com/1137865">SUSE bug 1137865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146042">SUSE bug 1146042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530773" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530774" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530775" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530779" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551320" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551321" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551322" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551324" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537227" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595277" comment="kernel-default-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595278" comment="kernel-default-base-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595279" comment="kernel-default-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551323" comment="kernel-default-man-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530776" comment="kernel-devel-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530777" comment="kernel-macros-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530778" comment="kernel-source-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595280" comment="kernel-syms-4.4.121-92.125.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530780" comment="kgraft-patch-4_4_121-92_125-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<bugzilla href="https://bugzilla.suse.com/1145579">SUSE bug 1145579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146091">SUSE bug 1146091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193427">SUSE bug 1193427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552180" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596437" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9512</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2000-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2072-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2085-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2130-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512</cve>
	<bugzilla href="https://bugzilla.suse.com/1145663">SUSE bug 1145663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146099">SUSE bug 1146099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146111">SUSE bug 1146111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147142">SUSE bug 1147142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2232-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2234-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2264-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<bugzilla href="https://bugzilla.suse.com/1145580">SUSE bug 1145580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146094">SUSE bug 1146094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193427">SUSE bug 1193427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552180" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596437" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9515</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515</cve>
	<bugzilla href="https://bugzilla.suse.com/1145663">SUSE bug 1145663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146100">SUSE bug 1146100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9517</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9517" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2051-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<bugzilla href="https://bugzilla.suse.com/1145575">SUSE bug 1145575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146097">SUSE bug 1146097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9518</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9518" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518</cve>
	<bugzilla href="https://bugzilla.suse.com/1145662">SUSE bug 1145662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145663">SUSE bug 1145663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146093">SUSE bug 1146093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9543" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9543" ref_url="https://www.suse.com/security/cve/CVE-2019-9543" source="SUSE CVE"/>
    <description>
    An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readGenericBitmap() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfseparate binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JArithmeticDecoder::decodeBit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9543/">CVE-2019-9543</cve>
	<bugzilla href="https://bugzilla.suse.com/1128100">SUSE bug 1128100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334072" comment="poppler is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9545" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9545" ref_url="https://www.suse.com/security/cve/CVE-2019-9545" source="SUSE CVE"/>
    <description>
    An issue was discovered in Poppler 0.74.0. A recursive function call, in JBIG2Stream::readTextRegion() located in JBIG2Stream.cc, can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to JBIG2Bitmap::clearToZero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9545/">CVE-2019-9545</cve>
	<bugzilla href="https://bugzilla.suse.com/1128114">SUSE bug 1128114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334072" comment="poppler is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1371-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
    <description>
    Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521777" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530548" comment="python-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530549" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530550" comment="python-demo-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521241" comment="python-devel-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530553" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530554" comment="python-idle-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521778" comment="python3-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521779" comment="python3-base-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521780" comment="python3-curses-3.4.6-25.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521777" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530548" comment="python-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530549" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530550" comment="python-demo-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530553" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530554" comment="python-idle-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521778" comment="python3-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521779" comment="python3-base-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521780" comment="python3-curses-3.4.6-25.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548574" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548575" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546710" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548576" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548577" comment="python-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548578" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548579" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548580" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548581" comment="python-demo-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548582" comment="python-devel-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548583" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548584" comment="python-idle-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548585" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548586" comment="python-xml-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546711" comment="python3-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546712" comment="python3-base-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551422" comment="python3-curses-3.4.6-25.24.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594906" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548575" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595526" comment="libpython3_4m1_0-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594907" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548577" comment="python-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594908" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548579" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594909" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594910" comment="python-demo-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594911" comment="python-devel-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594912" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594913" comment="python-idle-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594914" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594915" comment="python-xml-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595527" comment="python3-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595528" comment="python3-base-3.4.6-25.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595529" comment="python3-curses-3.4.6-25.24.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0696-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html" source="SUSE-SU"/>
    <description>
    Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334164" comment="python is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530981" comment="python-devel-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531794" comment="python3-devel-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548994" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548995" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549121" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548996" comment="python-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548997" comment="python-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548998" comment="python-base-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548999" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549000" comment="python-curses-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549001" comment="python-demo-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549002" comment="python-devel-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549003" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549004" comment="python-idle-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549005" comment="python-tk-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549006" comment="python-xml-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549122" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549123" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549124" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549125" comment="python3-devel-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595582" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548995" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596282" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595583" comment="python-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548997" comment="python-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595584" comment="python-base-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548999" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595585" comment="python-curses-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595586" comment="python-demo-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595587" comment="python-devel-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595588" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595589" comment="python-idle-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595590" comment="python-tk-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595591" comment="python-xml-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596283" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596284" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596285" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596286" comment="python3-devel-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9740</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740</cve>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596123" comment="crowbar-openstack-4.0+git.1604938545.30c10db18-9.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596124" comment="grafana-6.7.4-1.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596125" comment="influxdb-1.2.4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596126" comment="python-urllib3-1.16-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 65, Firefox ESR 60.5, and Thunderbird 60.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when a raw pointer to a DOM element on a page is obtained using JavaScript and the element is then removed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    The type inference system allows the compilation of functions that can cause type confusions between arbitrary objects when compiled through the IonMonkey just-in-time (JIT) compiler and when the constructor function is entered through on-stack replacement (OSR). This allows for possible arbitrary reading and writing of objects during an exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    The IonMonkey just-in-time (JIT) compiler can leak an internal JS_OPTIMIZED_OUT magic value to the running script during a bailout. This magic value can then be used by JavaScript to achieve memory corruption, which results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. *Note: Spectre mitigations are currently enabled for all users by default settings.*. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9794" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A vulnerability where type-confusion in the IonMonkey just-in-time (JIT) compiler could potentially be used by malicious JavaScript to trigger a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur when the SMIL animation controller incorrectly registers with the refresh driver twice when only a single registration is expected. When a registration is later freed with the removal of the animation controller element, the refresh driver incorrectly leaves a dangling pointer to the driver's observer array. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 66, Firefox ESR 60.6, and Thunderbird 60.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9801" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Firefox will accept any registered Program ID as an external protocol handler and offer to launch this local application when given a matching URL on Windows operating systems. This should only happen if the program has specifically registered itself as a "URL Handler" in the Windows registry. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.6, Firefox ESR &lt; 60.6, and Firefox &lt; 66.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. This vulnerability affects Firefox &lt; 66.0.1, Firefox ESR &lt; 60.6.1, and Thunderbird &lt; 60.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1861-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1782-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-07/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1813-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR &lt; 60.8, Firefox &lt; 68, and Thunderbird &lt; 60.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<bugzilla href="https://bugzilla.suse.com/1140868">SUSE bug 1140868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521976" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521977" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530590" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530591" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521978" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521979" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530592" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530593" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521980" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521981" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521982" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521983" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521984" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521985" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521986" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548633" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548635" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548637" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548639" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548641" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548643" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548646" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548648" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595020" comment="libfreebl3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548634" comment="libfreebl3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595021" comment="libfreebl3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548636" comment="libfreebl3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595022" comment="libsoftokn3-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548638" comment="libsoftokn3-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595023" comment="libsoftokn3-hmac-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548640" comment="libsoftokn3-hmac-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595024" comment="mozilla-nss-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548642" comment="mozilla-nss-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595025" comment="mozilla-nss-certs-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548644" comment="mozilla-nss-certs-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595026" comment="mozilla-nss-sysinit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548647" comment="mozilla-nss-sysinit-32bit-3.44.1-58.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595027" comment="mozilla-nss-tools-3.44.1-58.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2251-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2260-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html" source="SUSE-SU"/>
    <description>
    Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR &lt; 60.9, Firefox ESR &lt; 68.1, and Firefox &lt; 69.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<bugzilla href="https://bugzilla.suse.com/1149294">SUSE bug 1149294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149323">SUSE bug 1149323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149324">SUSE bug 1149324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522245" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522246" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530716" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522247" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548756" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548757" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548758" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548759" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595177" comment="MozillaFirefox-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595178" comment="MozillaFirefox-branding-SLE-68-32.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595179" comment="MozillaFirefox-devel-68.1.0-109.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595180" comment="MozillaFirefox-translations-common-68.1.0-109.89.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1077-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1126-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1152-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html" source="SUSE-SU"/>
    <description>
    Incorrect handling of __proto__ mutations may lead to type confusion in IonMonkey JIT code and can be leveraged for arbitrary memory read and write. This vulnerability affects Firefox &lt; 66.0.1, Firefox ESR &lt; 60.6.1, and Thunderbird &lt; 60.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<bugzilla href="https://bugzilla.suse.com/1129821">SUSE bug 1129821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130262">SUSE bug 1130262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521754" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530885" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521755" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546683" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546684" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546685" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595509" comment="MozillaFirefox-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595510" comment="MozillaFirefox-devel-60.6.1esr-109.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595511" comment="MozillaFirefox-translations-common-60.6.1esr-109.63.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need to update to macOS 10.14.5 in order to take advantage of this change.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A possible vulnerability exists where type confusion can occur when manipulating JavaScript objects in object groups, allowing for the bypassing of security checks within these groups. *Note: this vulnerability has only been demonstrated with UnboxedObjects, which are disabled by default on all supported releases.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    Images from a different domain can be read using a canvas object in some circumstances. This could be used to steal image data from a different site in violation of same-origin policy. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9818" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A race condition is present in the crash generation server used to generate data for the crash reporter. This issue can lead to a use-after-free in the main process, resulting in a potentially exploitable crash and a sandbox escape. *Note: this vulnerability only affects Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A vulnerability where a JavaScript compartment mismatch can occur while working with the fetch API, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00084.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability can occur in the chrome event handler when it is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.7, Firefox &lt; 67, and Firefox ESR &lt; 60.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521224" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530521" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521225" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546376" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546377" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546378" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594876" comment="MozillaFirefox-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594877" comment="MozillaFirefox-devel-60.7.0-109.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594878" comment="MozillaFirefox-translations-common-60.7.0-109.72.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00040.html" source="SUSE-SU"/>
    <description>
    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530488" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530489" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530491" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530492" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530494" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530495" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530498" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551081" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551082" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551083" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551084" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551086" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009536858" comment="qemu-ppc-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551088" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594852" comment="qemu-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594853" comment="qemu-block-curl-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530490" comment="qemu-block-rbd-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594854" comment="qemu-block-ssh-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594855" comment="qemu-guest-agent-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530493" comment="qemu-ipxe-1.0.0-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551085" comment="qemu-kvm-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594856" comment="qemu-lang-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551087" comment="qemu-s390-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530496" comment="qemu-seabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530497" comment="qemu-sgabios-8-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594857" comment="qemu-tools-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530499" comment="qemu-vgabios-1.9.1-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530500" comment="qemu-x86-2.6.2-41.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530896" comment="xen-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530897" comment="xen-doc-html-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530898" comment="xen-libs-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530899" comment="xen-libs-32bit-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530900" comment="xen-tools-4.7.6_06-43.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530901" comment="xen-tools-domU-4.7.6_06-43.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2283-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00022.html" source="SUSE-SU"/>
    <description>
    libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522352" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522353" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551318" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551319" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595269" comment="libseccomp2-2.4.1-11.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551319" comment="libseccomp2-32bit-2.4.1-11.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9924" ref_url="https://www.suse.com/security/cve/CVE-2019-9924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0838-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005307.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1178-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00049.html" source="SUSE-SU"/>
    <description>
    rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9924/">CVE-2019-9924</cve>
	<bugzilla href="https://bugzilla.suse.com/1130324">SUSE bug 1130324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521744" comment="bash-4.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521747" comment="libreadline6-6.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521748" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551414" comment="bash-4.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551415" comment="libreadline6-6.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551416" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595507" comment="bash-4.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521745" comment="bash-doc-4.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595508" comment="libreadline6-6.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551416" comment="libreadline6-32bit-6.3-83.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521749" comment="readline-doc-6.3-83.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1300-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1638-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00082.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1639-1" ref_url="https://lists.opensuse.org/opensuse-updates/2019-06/msg00171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0678-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-05/msg00129.html" source="SUSE-SU"/>
    <description>
    GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521520" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521493" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521495" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521523" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521496" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521497" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521498" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521499" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521500" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521525" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521502" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521503" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521504" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521505" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521506" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521507" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521508" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521509" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521510" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521511" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551158" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551141" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551142" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551159" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551143" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551144" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551145" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551146" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551147" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551160" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551148" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551149" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551150" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551151" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551152" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551153" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551154" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551155" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551156" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551157" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551158" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594970" comment="gstreamer-plugins-base-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521494" comment="gstreamer-plugins-base-lang-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594971" comment="libgstallocators-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551159" comment="libgstapp-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594972" comment="libgstapp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551144" comment="libgstapp-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594973" comment="libgstaudio-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551146" comment="libgstaudio-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594974" comment="libgstfft-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551160" comment="libgstinterfaces-0_10-0-32bit-0.10.36-18.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594975" comment="libgstpbutils-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551149" comment="libgstpbutils-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594976" comment="libgstriff-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594977" comment="libgstrtp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594978" comment="libgstrtsp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594979" comment="libgstsdp-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594980" comment="libgsttag-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551155" comment="libgsttag-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594981" comment="libgstvideo-1_0-0-1.8.3-13.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551157" comment="libgstvideo-1_0-0-32bit-1.8.3-13.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9936" ref_url="https://www.suse.com/security/cve/CVE-2019-9936" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9936/">CVE-2019-9936</cve>
	<bugzilla href="https://bugzilla.suse.com/1130326">SUSE bug 1130326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9937" ref_url="https://www.suse.com/security/cve/CVE-2019-9937" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1372-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00026.html" source="SUSE-SU"/>
    <description>
    In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9937/">CVE-2019-9937</cve>
	<bugzilla href="https://bugzilla.suse.com/1130325">SUSE bug 1130325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9947" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1352-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136184">SUSE bug 1136184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551688" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551689" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551690" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551691" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551692" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595786" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009562703" comment="python-futures-3.0.2-15.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595787" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595788" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595789" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595790" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9948" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1273-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1580-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html" source="SUSE-SU"/>
    <description>
    urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<bugzilla href="https://bugzilla.suse.com/1130847">SUSE bug 1130847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530548" comment="python-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530549" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530550" comment="python-demo-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521241" comment="python-devel-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530553" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530554" comment="python-idle-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521236" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521237" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521238" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530548" comment="python-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521239" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530549" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521240" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530550" comment="python-demo-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530553" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530554" comment="python-idle-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521242" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521243" comment="python-xml-2.7.13-28.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548574" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548575" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548576" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548577" comment="python-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548578" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548579" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548580" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548581" comment="python-demo-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548582" comment="python-devel-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548583" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548584" comment="python-idle-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548585" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548586" comment="python-xml-2.7.13-28.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594906" comment="libpython2_7-1_0-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548575" comment="libpython2_7-1_0-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594907" comment="python-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548577" comment="python-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594908" comment="python-base-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548579" comment="python-base-32bit-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594909" comment="python-curses-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594910" comment="python-demo-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594911" comment="python-devel-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530551" comment="python-doc-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530552" comment="python-doc-pdf-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594912" comment="python-gdbm-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594913" comment="python-idle-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594914" comment="python-tk-2.7.13-28.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594915" comment="python-xml-2.7.13-28.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9956" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1033-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1320-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2019-05/msg00010.html" source="SUSE-SU"/>
    <description>
    In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<bugzilla href="https://bugzilla.suse.com/1130330">SUSE bug 1130330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009521034" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521035" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521037" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009521039" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009546257" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546258" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546259" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009546260" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009594783" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594784" comment="ImageMagick-config-6-upstream-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594785" comment="libMagickCore-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009594786" comment="libMagickWand-6_Q16-1-6.8.8.1-71.108.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0093" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093</cve>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0181" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010691.html" source="SUSE-SU"/>
    <description>
    In exif_data_load_data_thumbnail of exif-data.c, there is a possible denial of service due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145075076
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181</cve>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009677635" comment="libexif12-0.6.22-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677562" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0198" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010691.html" source="SUSE-SU"/>
    <description>
    In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198</cve>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009677635" comment="libexif12-0.6.22-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677562" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0404" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0423</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0423" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0423" ref_url="https://www.suse.com/security/cve/CVE-2020-0423" source="SUSE CVE"/>
    <description>
    In binder_release_work of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161151868References: N/A
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-0423/">CVE-2020-0423</cve>
	<bugzilla href="https://bugzilla.suse.com/1178200">SUSE bug 1178200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0429" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0429" ref_url="https://www.suse.com/security/cve/CVE-2020-0429" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0429/">CVE-2020-0429</cve>
	<bugzilla href="https://bugzilla.suse.com/1176724">SUSE bug 1176724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176931">SUSE bug 1176931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188026">SUSE bug 1188026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009537828" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537827" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537829" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537826" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537825" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537943" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538219" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552467" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552466" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552468" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552465" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552464" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552478" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552490" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0430</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0430" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0430" ref_url="https://www.suse.com/security/cve/CVE-2020-0430" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
    <description>
    In skb_headlen of /include/linux/skbuff.h, there is a possible out of bounds read due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-153881554
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0430/">CVE-2020-0430</cve>
	<bugzilla href="https://bugzilla.suse.com/1176723">SUSE bug 1176723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178003">SUSE bug 1178003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0431" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552467" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552466" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552468" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552465" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552464" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537828" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537827" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537829" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537826" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537825" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0433" ref_url="https://www.suse.com/security/cve/CVE-2020-0433" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008814.html" source="SUSE-SU"/>
    <description>
    In blk_mq_queue_tag_busy_iter of blk-mq-tag.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151939299
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0433/">CVE-2020-0433</cve>
	<bugzilla href="https://bugzilla.suse.com/1176720">SUSE bug 1176720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178066">SUSE bug 1178066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187135">SUSE bug 1187135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0435</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0435" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0435" ref_url="https://www.suse.com/security/cve/CVE-2020-0435" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-14615. Reason: This candidate is a duplicate of CVE-2018-14615. Notes: All CVE users should reference CVE-2018-14615 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0435/">CVE-2020-0435</cve>
	<bugzilla href="https://bugzilla.suse.com/1176719">SUSE bug 1176719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196027">SUSE bug 1196027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0452" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010691.html" source="SUSE-SU"/>
    <description>
    In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452</cve>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009677635" comment="libexif12-0.6.22-8.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677562" comment="libexif12-32bit-0.6.22-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552489" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552488" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552487" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552486" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552485" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538135" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538134" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538133" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538132" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538131" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552489" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552488" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552487" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552486" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552485" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538135" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538134" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538133" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538132" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538131" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0487</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0487" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0487" ref_url="https://www.suse.com/security/cve/CVE-2020-0487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWY2EXAD52MSG6ZRFPI2CF3APYF7OZ7F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3IU5K7DTVB7RH7VVIUTMX4XFQDWSHYUS/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0487/">CVE-2020-0487</cve>
	<bugzilla href="https://bugzilla.suse.com/1180112">SUSE bug 1180112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339567" comment="flac is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0499" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008132.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWY2EXAD52MSG6ZRFPI2CF3APYF7OZ7F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3IU5K7DTVB7RH7VVIUTMX4XFQDWSHYUS/" source="SUSE-SU"/>
    <description>
    In FLAC__bitreader_read_rice_signed_block of bitreader.c, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-156076070
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531825" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531826" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531827" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552053" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552054" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552055" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596314" comment="libFLAC++6-1.3.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596315" comment="libFLAC8-1.3.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552055" comment="libFLAC8-32bit-1.3.0-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334525" comment="flac is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008731.html" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID000019643" ref_url="https://www.suse.com/support/kb/doc/?id=000019643" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0818-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172206">SUSE bug 1172206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172207">SUSE bug 1172207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172770">SUSE bug 1172770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551480" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551481" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551482" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551484" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537513" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595617" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595618" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595619" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595620" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="TID000019635" ref_url="https://www.suse.com/support/kb/doc/?id=000019635" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="TID000019635" ref_url="https://www.suse.com/support/kb/doc/?id=000019635" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00016.html" source="SUSE-SU"/>
    <description>
    Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531024" comment="ucode-intel-20200602-13.68.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0479-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0872-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00055.html" source="SUSE-SU"/>
    <description>
    Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531615" comment="bluez-5.13-5.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531616" comment="libbluetooth3-5.13-5.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551959" comment="bluez-5.13-5.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551960" comment="libbluetooth3-5.13-5.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596106" comment="bluez-5.13-5.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596107" comment="libbluetooth3-5.13-5.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006459.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0209-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00012.html" source="SUSE-SU"/>
    <description>
    Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162191">SUSE bug 1162191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531478" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531479" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531480" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531481" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531482" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531483" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531484" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531485" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531486" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531487" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531488" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531489" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531490" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531491" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531492" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551846" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551847" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551848" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551849" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551850" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551851" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551852" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551853" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551854" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551855" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551856" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551857" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551858" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551859" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551860" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596010" comment="libQt5Concurrent5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596011" comment="libQt5Core5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596012" comment="libQt5DBus5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596013" comment="libQt5Gui5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596014" comment="libQt5Network5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596015" comment="libQt5OpenGL5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596016" comment="libQt5PrintSupport5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596017" comment="libQt5Sql5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596018" comment="libQt5Sql5-mysql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596019" comment="libQt5Sql5-postgresql-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596020" comment="libQt5Sql5-sqlite-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596021" comment="libQt5Sql5-unixODBC-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596022" comment="libQt5Test5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596023" comment="libQt5Widgets5-5.6.1-17.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596024" comment="libQt5Xml5-5.6.1-17.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0570</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0570" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0570" ref_url="https://www.suse.com/security/cve/CVE-2020-0570" source="SUSE CVE"/>
    <description>
    Uncontrolled search path in the QT Library before 5.14.0, 5.12.7 and 5.9.10 may allow an authenticated user to potentially enable elevation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0570/">CVE-2020-0570</cve>
	<bugzilla href="https://bugzilla.suse.com/1161167">SUSE bug 1161167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162191">SUSE bug 1162191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334189" comment="libqt5-qtbase is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0599</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0599" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0599" ref_url="https://www.suse.com/security/cve/CVE-2020-0599" source="SUSE CVE"/>
    <description>
    Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0599/">CVE-2020-0599</cve>
	<bugzilla href="https://bugzilla.suse.com/1179693">SUSE bug 1179693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338728" comment="ucode-intel is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00008.html" source="SUSE-SU"/>
    <description>
    WebKitGTK through 2.26.4 and WPE WebKit through 2.26.4 (which are the versions right before 2.28.0) contains a memory corruption issue (use-after-free) that may lead to arbitrary code execution. This issue has been fixed in 2.28.0 with improved memory handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<bugzilla href="https://bugzilla.suse.com/1165528">SUSE bug 1165528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0381-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html" source="SUSE-SU"/>
    <description>
    The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029</cve>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531393" comment="glibc-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531394" comment="glibc-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531395" comment="glibc-devel-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531396" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531400" comment="glibc-locale-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531401" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531402" comment="glibc-profile-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531403" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531404" comment="nscd-2.22-113.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551771" comment="glibc-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551772" comment="glibc-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551773" comment="glibc-devel-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551774" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551775" comment="glibc-locale-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551776" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551777" comment="glibc-profile-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551778" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551779" comment="nscd-2.22-113.4 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595953" comment="glibc-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551772" comment="glibc-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595954" comment="glibc-devel-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551774" comment="glibc-devel-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531397" comment="glibc-html-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531398" comment="glibc-i18ndata-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531399" comment="glibc-info-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595955" comment="glibc-locale-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551776" comment="glibc-locale-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595956" comment="glibc-profile-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551778" comment="glibc-profile-32bit-2.22-113.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595957" comment="nscd-2.22-113.4 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10177</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10177" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10177" ref_url="https://www.suse.com/security/cve/CVE-2020-10177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    Pillow before 7.1.0 has multiple out-of-bounds reads in libImaging/FliDecode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10177/">CVE-2020-10177</cve>
	<bugzilla href="https://bugzilla.suse.com/1173413">SUSE bug 1173413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10188" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10188" ref_url="https://www.suse.com/security/cve/CVE-2020-10188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006882.html" source="SUSE-SU"/>
    <description>
    utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10188/">CVE-2020-10188</cve>
	<bugzilla href="https://bugzilla.suse.com/1165787">SUSE bug 1165787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531003" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531004" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551462" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551463" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595598" comment="krb5-appl-clients-1.0.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595599" comment="krb5-appl-servers-1.0.3-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10251" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10251" ref_url="https://www.suse.com/security/cve/CVE-2020-10251" source="SUSE CVE"/>
    <description>
    In ImageMagick 7.0.9, an out-of-bounds read vulnerability exists within the ReadHEICImageByID function in coders\heic.c. It can be triggered via an image with a width or height value that exceeds the actual size of the image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10251/">CVE-2020-10251</cve>
	<bugzilla href="https://bugzilla.suse.com/1166225">SUSE bug 1166225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10378</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10378" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10378" ref_url="https://www.suse.com/security/cve/CVE-2020-10378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where state-&gt;shuffle is instructed to read beyond state-&gt;buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10378/">CVE-2020-10378</cve>
	<bugzilla href="https://bugzilla.suse.com/1161670">SUSE bug 1161670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173416">SUSE bug 1173416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10379</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10379" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10379" ref_url="https://www.suse.com/security/cve/CVE-2020-10379" source="SUSE CVE"/>
    <description>
    In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10379/">CVE-2020-10379</cve>
	<bugzilla href="https://bugzilla.suse.com/1173417">SUSE bug 1173417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334396" comment="python-Pillow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10531" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0819-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0459-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00004.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175778">SUSE bug 1175778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530921" comment="libicu-doc-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530922" comment="libicu52_1-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530923" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530924" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548969" comment="libicu-doc-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548970" comment="libicu52_1-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548971" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548972" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595548" comment="libicu-doc-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595549" comment="libicu52_1-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548971" comment="libicu52_1-32bit-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595550" comment="libicu52_1-data-52.1-8.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" source="SUSE-SU"/>
    <description>
    Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531034" comment="perl-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531036" comment="perl-base-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551487" comment="perl-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551488" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551489" comment="perl-base-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595624" comment="perl-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551488" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595625" comment="perl-base-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html" source="SUSE-SU"/>
    <description>
    The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663</cve>
	<bugzilla href="https://bugzilla.suse.com/1167244">SUSE bug 1167244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531013" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531014" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531015" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531016" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551469" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551470" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551471" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551472" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595606" comment="libruby2_1-2_1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595607" comment="ruby2.1-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595608" comment="ruby2.1-stdlib-2.1.9-19.3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595609" comment="yast2-ruby-bindings-3.1.53-9.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10702" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702" source="SUSE CVE"/>
    <description>
    A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702</cve>
	<bugzilla href="https://bugzilla.suse.com/1168681">SUSE bug 1168681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10713" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007421.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173456">SUSE bug 1173456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199353">SUSE bug 1199353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537694" comment="shim-15+git47-22.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551546" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537579" comment="grub2-powerpc-ieee1275-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537694" comment="shim-15+git47-22.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595673" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537694" comment="shim-15+git47-22.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10717" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10717" ref_url="https://www.suse.com/security/cve/CVE-2020-10717" source="SUSE CVE"/>
    <description>
    A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version &gt;= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10717/">CVE-2020-10717</cve>
	<bugzilla href="https://bugzilla.suse.com/1171110">SUSE bug 1171110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10720" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10720" ref_url="https://www.suse.com/security/cve/CVE-2020-10720" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10720/">CVE-2020-10720</cve>
	<bugzilla href="https://bugzilla.suse.com/1170778">SUSE bug 1170778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10736</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10736" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10736" ref_url="https://www.suse.com/security/cve/CVE-2020-10736" source="SUSE CVE"/>
    <description>
    An authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10736/">CVE-2020-10736</cve>
	<bugzilla href="https://bugzilla.suse.com/1170021">SUSE bug 1170021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334046" comment="ceph is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10743</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10743" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10743" ref_url="https://www.suse.com/security/cve/CVE-2020-10743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
    <description>
    It was discovered that OpenShift Container Platform's (OCP) distribution of Kibana could open in an iframe, which made it possible to intercept and manipulate requests. This flaw allows an attacker to trick a user into performing arbitrary actions in OCP's distribution of Kibana, such as clickjacking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10743/">CVE-2020-10743</cve>
	<bugzilla href="https://bugzilla.suse.com/1171909">SUSE bug 1171909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10744</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10744" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10744" ref_url="https://www.suse.com/security/cve/CVE-2020-10744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5, 3.5.6 and 3.6.4 as well as previous versions are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10744/">CVE-2020-10744</cve>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10745" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0984-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1023-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1313-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html" source="SUSE-SU"/>
    <description>
    A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531196" comment="libdcerpc-binding0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531197" comment="libdcerpc-binding0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531198" comment="libdcerpc0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531199" comment="libdcerpc0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531200" comment="libndr-krb5pac0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531201" comment="libndr-krb5pac0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531202" comment="libndr-nbt0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531203" comment="libndr-nbt0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531204" comment="libndr-standard0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531205" comment="libndr-standard0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531206" comment="libndr0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531207" comment="libndr0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531208" comment="libnetapi0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531209" comment="libnetapi0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531210" comment="libsamba-credentials0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531211" comment="libsamba-credentials0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531212" comment="libsamba-errors0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531213" comment="libsamba-errors0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531214" comment="libsamba-hostconfig0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531215" comment="libsamba-hostconfig0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531216" comment="libsamba-passdb0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531217" comment="libsamba-passdb0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531218" comment="libsamba-util0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531219" comment="libsamba-util0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531220" comment="libsamdb0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531221" comment="libsamdb0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531222" comment="libsmbclient0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531223" comment="libsmbclient0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531224" comment="libsmbconf0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531225" comment="libsmbconf0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531226" comment="libsmbldap0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531227" comment="libsmbldap0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531228" comment="libtevent-util0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531229" comment="libtevent-util0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531230" comment="libwbclient0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531231" comment="libwbclient0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531232" comment="samba-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531233" comment="samba-client-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531234" comment="samba-client-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531235" comment="samba-doc-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531236" comment="samba-libs-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531237" comment="samba-libs-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531238" comment="samba-winbind-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531239" comment="samba-winbind-32bit-4.4.2-38.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551608" comment="libdcerpc-binding0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551609" comment="libdcerpc-binding0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551610" comment="libdcerpc0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551611" comment="libdcerpc0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551612" comment="libndr-krb5pac0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551613" comment="libndr-krb5pac0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551614" comment="libndr-nbt0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551615" comment="libndr-nbt0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551616" comment="libndr-standard0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551617" comment="libndr-standard0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551618" comment="libndr0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551619" comment="libndr0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551620" comment="libnetapi0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551621" comment="libnetapi0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551622" comment="libsamba-credentials0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551623" comment="libsamba-credentials0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551624" comment="libsamba-errors0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551625" comment="libsamba-errors0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551626" comment="libsamba-hostconfig0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551627" comment="libsamba-hostconfig0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551628" comment="libsamba-passdb0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551629" comment="libsamba-passdb0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551630" comment="libsamba-util0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551631" comment="libsamba-util0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551632" comment="libsamdb0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551633" comment="libsamdb0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551634" comment="libsmbclient0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551635" comment="libsmbclient0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551636" comment="libsmbconf0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551637" comment="libsmbconf0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551638" comment="libsmbldap0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551639" comment="libsmbldap0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551640" comment="libtevent-util0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551641" comment="libtevent-util0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551642" comment="libwbclient0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551643" comment="libwbclient0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551644" comment="samba-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551645" comment="samba-client-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551646" comment="samba-client-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531235" comment="samba-doc-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551647" comment="samba-libs-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551648" comment="samba-libs-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551649" comment="samba-winbind-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551650" comment="samba-winbind-32bit-4.4.2-38.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595719" comment="libdcerpc-binding0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551609" comment="libdcerpc-binding0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595720" comment="libdcerpc0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551611" comment="libdcerpc0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595721" comment="libndr-krb5pac0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551613" comment="libndr-krb5pac0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595722" comment="libndr-nbt0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551615" comment="libndr-nbt0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595723" comment="libndr-standard0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551617" comment="libndr-standard0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595724" comment="libndr0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551619" comment="libndr0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595725" comment="libnetapi0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551621" comment="libnetapi0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595726" comment="libsamba-credentials0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551623" comment="libsamba-credentials0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595727" comment="libsamba-errors0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551625" comment="libsamba-errors0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595728" comment="libsamba-hostconfig0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551627" comment="libsamba-hostconfig0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595729" comment="libsamba-passdb0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551629" comment="libsamba-passdb0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595730" comment="libsamba-util0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551631" comment="libsamba-util0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595731" comment="libsamdb0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551633" comment="libsamdb0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595732" comment="libsmbclient0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551635" comment="libsmbclient0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595733" comment="libsmbconf0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551637" comment="libsmbconf0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595734" comment="libsmbldap0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551639" comment="libsmbldap0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595735" comment="libtevent-util0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551641" comment="libtevent-util0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595736" comment="libwbclient0-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551643" comment="libwbclient0-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595737" comment="samba-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595738" comment="samba-client-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551646" comment="samba-client-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531235" comment="samba-doc-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595739" comment="samba-libs-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551648" comment="samba-libs-32bit-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595740" comment="samba-winbind-4.4.2-38.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551650" comment="samba-winbind-32bit-4.4.2-38.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174963">SUSE bug 1174963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0987-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0994-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184743">SUSE bug 1184743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552451" comment="kgraft-patch-4_4_121-92_114-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552450" comment="kgraft-patch-4_4_121-92_117-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552449" comment="kgraft-patch-4_4_121-92_120-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552448" comment="kgraft-patch-4_4_121-92_125-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552447" comment="kgraft-patch-4_4_121-92_129-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551480" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551481" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551482" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551484" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537533" comment="kgraft-patch-4_4_121-92_114-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537532" comment="kgraft-patch-4_4_121-92_117-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537531" comment="kgraft-patch-4_4_121-92_120-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537530" comment="kgraft-patch-4_4_121-92_125-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537529" comment="kgraft-patch-4_4_121-92_129-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537513" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595617" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595618" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595619" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595620" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761</cve>
	<bugzilla href="https://bugzilla.suse.com/1172710">SUSE bug 1172710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10766" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A stack information leak flaw was found in s390/s390x in the Linux kernel’s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10781</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" source="SUSE-SU"/>
    <description>
    Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531034" comment="perl-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531036" comment="perl-base-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551487" comment="perl-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551488" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551489" comment="perl-base-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595624" comment="perl-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551488" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595625" comment="perl-base-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10931</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10931" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10931" ref_url="https://www.suse.com/security/cve/CVE-2020-10931" source="SUSE CVE"/>
    <description>
    Memcached 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (daemon crash) via a crafted binary protocol header to try_read_command_binary in memcached.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10931/">CVE-2020-10931</cve>
	<bugzilla href="https://bugzilla.suse.com/1167522">SUSE bug 1167522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334021" comment="memcached is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10994</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10994" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10994" ref_url="https://www.suse.com/security/cve/CVE-2020-10994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10994/">CVE-2020-10994</cve>
	<bugzilla href="https://bugzilla.suse.com/1173418">SUSE bug 1173418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11008" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open for an exploit where _some_ credential is leaked (but the attacker cannot control which one). Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that are considered illegal as of the recently published Git versions can cause Git to send a "blank" pattern to helpers, missing hostname and protocol fields. Many helpers will interpret this as matching _any_ URL, and will return some unspecified stored password, leaking the password to an attacker's server. The vulnerability can be triggered by feeding a malicious URL to `git clone`. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The root of the problem is in Git itself, which should not be feeding blank input to helpers. However, the ability to exploit the vulnerability in practice depends on which helpers are in use. Credential helpers which are known to trigger the vulnerability: - Git's "store" helper - Git's "cache" helper - the "osxkeychain" helper that ships in Git's "contrib" directory Credential helpers which are known to be safe even with vulnerable versions of Git: - Git Credential Manager for Windows Any helper not in this list should be assumed to trigger the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008</cve>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530961" comment="git-core-2.26.2-27.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548984" comment="git-core-2.26.2-27.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595580" comment="git-core-2.26.2-27.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11076</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11076" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076</cve>
	<bugzilla href="https://bugzilla.suse.com/1172175">SUSE bug 1172175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172176">SUSE bug 1172176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11077</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11077" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11077" ref_url="https://www.suse.com/security/cve/CVE-2020-11077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0990-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1001-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. This is a similar but different vulnerability from CVE-2020-11076. The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11077/">CVE-2020-11077</cve>
	<bugzilla href="https://bugzilla.suse.com/1172175">SUSE bug 1172175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172176">SUSE bug 1172176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11078</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11078" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019148.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0772-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANZIEBB4AJVGYC2KYDE7RDSTFBBTL5ID/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BX6XMG6VSE6RQ4LZXDDXUYZZZ2FYOQM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DTGWJY2VML3YAAFAOOYJAQP5SZ4X6XWG/" source="SUSE-SU"/>
    <description>
    In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078</cve>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525303" comment="python-httplib2-0.19.0-7.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11080" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FQEUDKQEBT4RUZ2JLDQBWSAYUJ4SCTW/" source="SUSE-SU"/>
    <description>
    In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., &gt; 32), then drop the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<bugzilla href="https://bugzilla.suse.com/1172441">SUSE bug 1172441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172442">SUSE bug 1172442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531995" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552180" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596437" comment="libnghttp2-14-1.39.2-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11100</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11100" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11100" ref_url="https://www.suse.com/security/cve/CVE-2020-11100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006668.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0444-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00002.html" source="SUSE-SU"/>
    <description>
    In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11100/">CVE-2020-11100</cve>
	<bugzilla href="https://bugzilla.suse.com/1168023">SUSE bug 1168023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11102" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102" source="SUSE CVE"/>
    <description>
    hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102</cve>
	<bugzilla href="https://bugzilla.suse.com/1168713">SUSE bug 1168713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11110</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11110" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11110" ref_url="https://www.suse.com/security/cve/CVE-2020-11110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
    <description>
    Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11110/">CVE-2020-11110</cve>
	<bugzilla href="https://bugzilla.suse.com/1174583">SUSE bug 1174583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11538</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11538" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11538" ref_url="https://www.suse.com/security/cve/CVE-2020-11538" source="SUSE CVE"/>
    <description>
    In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11538/">CVE-2020-11538</cve>
	<bugzilla href="https://bugzilla.suse.com/1173420">SUSE bug 1173420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334396" comment="python-Pillow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11609" ref_url="https://www.suse.com/security/cve/CVE-2020-11609" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11609/">CVE-2020-11609</cve>
	<bugzilla href="https://bugzilla.suse.com/1168854">SUSE bug 1168854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11655" ref_url="https://www.suse.com/security/cve/CVE-2020-11655" source="SUSE CVE"/>
    <description>
    SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11655/">CVE-2020-11655</cve>
	<bugzilla href="https://bugzilla.suse.com/1169126">SUSE bug 1169126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11656" ref_url="https://www.suse.com/security/cve/CVE-2020-11656" source="SUSE CVE"/>
    <description>
    In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11656/">CVE-2020-11656</cve>
	<bugzilla href="https://bugzilla.suse.com/1169111">SUSE bug 1169111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552460" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552461" comment="kgraft-patch-4_4_121-92_129-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552462" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552463" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552464" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552478" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537678" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537679" comment="kgraft-patch-4_4_121-92_129-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537680" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537681" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537825" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537943" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11669</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11669" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11669" ref_url="https://www.suse.com/security/cve/CVE-2020-11669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11669/">CVE-2020-11669</cve>
	<bugzilla href="https://bugzilla.suse.com/1169390">SUSE bug 1169390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11739" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739</cve>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11740" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11741" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11742" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00006.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0602-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00008.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue exists in WebKitGTK before 2.28.1 and WPE WebKit before 2.28.1 via crafted web content that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793</cve>
	<bugzilla href="https://bugzilla.suse.com/1169658">SUSE bug 1169658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11868" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551502" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551503" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595639" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595640" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11869" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869" source="SUSE CVE"/>
    <description>
    An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869</cve>
	<bugzilla href="https://bugzilla.suse.com/1170537">SUSE bug 1170537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11945" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<bugzilla href="https://bugzilla.suse.com/1170313">SUSE bug 1170313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530946" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551443" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595569" comment="squid-3.5.21-26.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11947" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947</cve>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11985" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11985" ref_url="https://www.suse.com/security/cve/CVE-2020-11985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
    <description>
    IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11985/">CVE-2020-11985</cve>
	<bugzilla href="https://bugzilla.suse.com/1175072">SUSE bug 1175072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531259" comment="apache2-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531261" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531262" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531263" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531264" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551666" comment="apache2-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551667" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551668" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551669" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551670" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595758" comment="apache2-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595759" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595760" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595761" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595762" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11993" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178074">SUSE bug 1178074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180830">SUSE bug 1180830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531259" comment="apache2-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531261" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531262" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531263" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531264" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551666" comment="apache2-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551667" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551668" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551669" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551670" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595758" comment="apache2-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595759" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595760" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595761" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595762" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12052</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12052" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12052" ref_url="https://www.suse.com/security/cve/CVE-2020-12052" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
    <description>
    Grafana version &lt; 6.7.3 is vulnerable for annotation popup XSS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12052/">CVE-2020-12052</cve>
	<bugzilla href="https://bugzilla.suse.com/1170657">SUSE bug 1170657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12108" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12108" ref_url="https://www.suse.com/security/cve/CVE-2020-12108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0661-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0764-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html" source="SUSE-SU"/>
    <description>
    /options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12108/">CVE-2020-12108</cve>
	<bugzilla href="https://bugzilla.suse.com/1171363">SUSE bug 1171363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530963" comment="mailman-2.1.17-3.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548985" comment="mailman-2.1.17-3.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595581" comment="mailman-2.1.17-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12114" ref_url="https://www.suse.com/security/cve/CVE-2020-12114" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12114/">CVE-2020-12114</cve>
	<bugzilla href="https://bugzilla.suse.com/1171098">SUSE bug 1171098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551480" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551481" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551482" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551484" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537513" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595617" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595618" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595619" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595620" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12137" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12137" ref_url="https://www.suse.com/security/cve/CVE-2020-12137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html" source="SUSE-SU"/>
    <description>
    GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12137/">CVE-2020-12137</cve>
	<bugzilla href="https://bugzilla.suse.com/1170558">SUSE bug 1170558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530963" comment="mailman-2.1.17-3.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548985" comment="mailman-2.1.17-3.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595581" comment="mailman-2.1.17-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0647-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html" source="SUSE-SU"/>
    <description>
    In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530925" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530926" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530927" comment="openldap2-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530928" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530929" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530931" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530925" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530926" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530927" comment="openldap2-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530928" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530929" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551430" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551431" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551432" comment="openldap2-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551433" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551434" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551435" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595551" comment="libldap-2_4-2-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551431" comment="libldap-2_4-2-32bit-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595552" comment="openldap2-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595553" comment="openldap2-back-meta-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595554" comment="openldap2-client-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530930" comment="openldap2-doc-2.4.41-18.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595555" comment="openldap2-ppolicy-check-password-1.2-18.68.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12268" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006802.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0653-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00034.html" source="SUSE-SU"/>
    <description>
    jbig2_image_compose in jbig2_image.c in Artifex jbig2dec before 0.18 has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268</cve>
	<bugzilla href="https://bugzilla.suse.com/1170603">SUSE bug 1170603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530940" comment="ghostscript-9.52-23.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530941" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530942" comment="libspectre1-0.2.7-12.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548978" comment="ghostscript-9.52-23.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548979" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548980" comment="libspectre1-0.2.7-12.10.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595563" comment="ghostscript-9.52-23.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595564" comment="ghostscript-x11-9.52-23.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595565" comment="libspectre1-0.2.7-12.10.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12321" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1960-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNZ3NYJWZSI2ISRG5U4RX3XMDBRHDRTX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWOUPKVHO4A2R27BZDEYM2EMS4RXKDM4/" source="SUSE-SU"/>
    <description>
    Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321</cve>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531578" comment="kernel-firmware-20170530-21.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531579" comment="ucode-amd-20170530-21.31.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12351</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12351" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178397">SUSE bug 1178397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178398">SUSE bug 1178398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12362</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182033">SUSE bug 1182033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12363</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12387" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
    <description>
    A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530944" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548981" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548982" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548983" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595566" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595567" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595568" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12388" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
    <description>
    The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR &lt; 68.8 and Firefox &lt; 76.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530944" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548981" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548982" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548983" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595566" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595567" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595568" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12389" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
    <description>
    The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR &lt; 68.8 and Firefox &lt; 76.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530944" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548981" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548982" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548983" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595566" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595567" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595568" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12392" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
    <description>
    The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local files. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530944" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548981" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548982" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548983" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595566" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595567" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595568" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
    <description>
    The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530944" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548981" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548982" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548983" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595566" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595567" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595568" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12395" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530944" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548981" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548982" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548983" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595566" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595567" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595568" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0854-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00047.html" source="SUSE-SU"/>
    <description>
    NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531068" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531070" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531072" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531074" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531076" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531078" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531080" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531082" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531084" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551504" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551505" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551506" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551507" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551508" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551509" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551510" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551511" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551512" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551513" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551514" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551515" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551516" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551517" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551518" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551519" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551520" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595641" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551505" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595642" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551507" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595643" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551509" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595644" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551511" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595645" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551513" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595646" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551515" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595647" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551517" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595648" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551519" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595649" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633044" comment="libfreebl3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633046" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633048" comment="libsoftokn3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633050" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633052" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633054" comment="mozilla-nss-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633056" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633058" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633060" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633044" comment="libfreebl3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633046" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633048" comment="libsoftokn3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633050" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633052" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633054" comment="mozilla-nss-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633056" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633058" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633060" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0953-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0955-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531068" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531069" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531070" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531071" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531072" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531073" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531074" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531075" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531076" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531077" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531078" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531079" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531080" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531081" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531082" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531083" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531084" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551504" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551505" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551506" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551507" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551508" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551509" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551510" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551511" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551512" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551513" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551514" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551515" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551516" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551517" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551518" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551519" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551520" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595641" comment="libfreebl3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551505" comment="libfreebl3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595642" comment="libfreebl3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551507" comment="libfreebl3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595643" comment="libsoftokn3-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551509" comment="libsoftokn3-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595644" comment="libsoftokn3-hmac-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551511" comment="libsoftokn3-hmac-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595645" comment="mozilla-nspr-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551513" comment="mozilla-nspr-32bit-4.25-19.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595646" comment="mozilla-nss-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551515" comment="mozilla-nss-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595647" comment="mozilla-nss-certs-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551517" comment="mozilla-nss-certs-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595648" comment="mozilla-nss-sysinit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551519" comment="mozilla-nss-sysinit-32bit-3.53.1-58.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595649" comment="mozilla-nss-tools-3.53.1-58.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633044" comment="libfreebl3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633046" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633048" comment="libsoftokn3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633050" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633052" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633054" comment="mozilla-nss-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633056" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633058" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633060" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12405" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00019.html" source="SUSE-SU"/>
    <description>
    When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531010" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531011" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531012" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551466" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551467" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551468" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595603" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595604" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595605" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12406" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla Developer Iain Ireland discovered a missing type check during unboxed objects removal, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531010" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531011" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531012" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551466" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551467" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551468" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595603" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595604" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595605" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12410" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0789-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00019.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531010" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531011" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531012" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551466" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551467" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551468" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595603" comment="MozillaFirefox-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595604" comment="MozillaFirefox-devel-68.9.0-109.123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595605" comment="MozillaFirefox-translations-common-68.9.0-109.123.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12415" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When "%2F" was present in a manifest URL, Firefox's AppCache behavior may have become confused and allowed a manifest to be served from a subdirectory. This could cause the appcache to be used to service requests for the top level directory. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12416" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    A VideoStreamEncoder may have been freed in a race condition with VideoBroadcaster::AddOrUpdateSink, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12417" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. *Note: this issue only affects Firefox on ARM64 platforms.* This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12418" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12419" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When processing callbacks that occurred during window flushing in the parent process, the associated window may die; causing a use-after-free condition. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12420" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12421" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0967-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0982-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When performing add-on updates, certificate chains terminating in non-built-in-roots were rejected (even if they were legitimately added by an administrator.) This could have caused add-ons to become out-of-date silently without notification to the user. This vulnerability affects Firefox ESR &lt; 68.10, Firefox &lt; 78, and Thunderbird &lt; 68.10.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    In non-standard configurations, a JPEG image created by JavaScript could have caused an internal variable to overflow, resulting in an out of bounds write, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12423" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When the Windows DLL "webauthn.dll" was missing from the Operating System, and a malicious one was placed in a folder in the user's %PATH%, Firefox may have loaded the DLL, leading to arbitrary code execution. *Note: This issue only affects the Windows operating system; other operating systems are unaffected.* This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12424" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12425" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Due to confusion processing a hyphen character in Date.parse(), a one-byte out of bounds read could have occurred, leading to potential information disclosure. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12426" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 77. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531092" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531093" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531094" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531095" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551527" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551528" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551529" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551530" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595655" comment="MozillaFirefox-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595656" comment="MozillaFirefox-branding-SLE-78-35.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595657" comment="MozillaFirefox-devel-78.0.1-112.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595658" comment="MozillaFirefox-translations-common-78.0.1-112.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12458</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12458" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12458" ref_url="https://www.suse.com/security/cve/CVE-2020-12458" source="SUSE CVE"/>
    <description>
    An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12458/">CVE-2020-12458</cve>
	<bugzilla href="https://bugzilla.suse.com/1170898">SUSE bug 1170898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334411" comment="grafana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12459</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12459" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12459" ref_url="https://www.suse.com/security/cve/CVE-2020-12459" source="SUSE CVE"/>
    <description>
    In certain Red Hat packages for Grafana 6.x through 6.3.6, the configuration files /etc/grafana/grafana.ini and /etc/grafana/ldap.toml (which contain a secret_key and a bind_password) are world readable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12459/">CVE-2020-12459</cve>
	<bugzilla href="https://bugzilla.suse.com/1170898">SUSE bug 1170898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334411" comment="grafana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464</cve>
	<bugzilla href="https://bugzilla.suse.com/1170901">SUSE bug 1170901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551480" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551481" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551482" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551484" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537513" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595617" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595618" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595619" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595620" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552445" comment="kgraft-patch-4_4_121-92_109-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552444" comment="kgraft-patch-4_4_121-92_114-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552443" comment="kgraft-patch-4_4_121-92_117-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552442" comment="kgraft-patch-4_4_121-92_120-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552441" comment="kgraft-patch-4_4_121-92_125-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552446" comment="kgraft-patch-4_4_121-92_129-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551480" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551481" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551482" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551484" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537471" comment="kgraft-patch-4_4_121-92_109-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537470" comment="kgraft-patch-4_4_121-92_114-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537469" comment="kgraft-patch-4_4_121-92_117-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537468" comment="kgraft-patch-4_4_121-92_120-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537467" comment="kgraft-patch-4_4_121-92_125-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537472" comment="kgraft-patch-4_4_121-92_129-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537513" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595617" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595618" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595619" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595620" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552445" comment="kgraft-patch-4_4_121-92_109-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552444" comment="kgraft-patch-4_4_121-92_114-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552443" comment="kgraft-patch-4_4_121-92_117-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552442" comment="kgraft-patch-4_4_121-92_120-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552441" comment="kgraft-patch-4_4_121-92_125-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552446" comment="kgraft-patch-4_4_121-92_129-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551480" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551481" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551482" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551484" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537471" comment="kgraft-patch-4_4_121-92_109-default-10-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537470" comment="kgraft-patch-4_4_121-92_114-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537469" comment="kgraft-patch-4_4_121-92_117-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537468" comment="kgraft-patch-4_4_121-92_120-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537467" comment="kgraft-patch-4_4_121-92_125-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537472" comment="kgraft-patch-4_4_121-92_129-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537513" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595617" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595618" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595619" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595620" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655</cve>
	<bugzilla href="https://bugzilla.suse.com/1171217">SUSE bug 1171217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531025" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531026" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531027" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531031" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551480" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551481" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551482" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551484" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537513" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595617" comment="kernel-default-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595618" comment="kernel-default-base-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595619" comment="kernel-default-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551483" comment="kernel-default-man-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531028" comment="kernel-devel-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531029" comment="kernel-macros-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531030" comment="kernel-source-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595620" comment="kernel-syms-4.4.121-92.135.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531032" comment="kgraft-patch-4_4_121-92_135-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12657" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657</cve>
	<bugzilla href="https://bugzilla.suse.com/1171205">SUSE bug 1171205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659</cve>
	<bugzilla href="https://bugzilla.suse.com/1171214">SUSE bug 1171214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00059.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531186" comment="dovecot22-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531187" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531188" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531189" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551602" comment="dovecot22-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551603" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551604" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551605" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595714" comment="dovecot22-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595715" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595716" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595717" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1241-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1262-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00059.html" source="SUSE-SU"/>
    <description>
    In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674</cve>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531186" comment="dovecot22-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531187" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531188" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531189" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551602" comment="dovecot22-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551603" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551604" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551605" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595714" comment="dovecot22-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595715" comment="dovecot22-backend-mysql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595716" comment="dovecot22-backend-pgsql-2.2.31-19.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595717" comment="dovecot22-backend-sqlite-2.2.31-19.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html" source="SUSE-SU"/>
    <description>
    regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531034" comment="perl-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531035" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531036" comment="perl-base-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551487" comment="perl-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551488" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551489" comment="perl-base-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595624" comment="perl-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551488" comment="perl-32bit-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595625" comment="perl-base-5.18.2-12.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531037" comment="perl-doc-5.18.2-12.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767</cve>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12768" ref_url="https://www.suse.com/security/cve/CVE-2020-12768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in the Linux kernel before 5.6. svm_cpu_uninit in arch/x86/kvm/svm.c has a memory leak, aka CID-d80b64ff297e. NOTE: third parties dispute this issue because it's a one-time leak at the boot, the size is negligible, and it can't be triggered at will.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12768/">CVE-2020-12768</cve>
	<bugzilla href="https://bugzilla.suse.com/1171736">SUSE bug 1171736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12770" ref_url="https://www.suse.com/security/cve/CVE-2020-12770" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12770/">CVE-2020-12770</cve>
	<bugzilla href="https://bugzilla.suse.com/1171420">SUSE bug 1171420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12826" ref_url="https://www.suse.com/security/cve/CVE-2020-12826" source="SUSE CVE"/>
    <description>
    A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12826/">CVE-2020-12826</cve>
	<bugzilla href="https://bugzilla.suse.com/1171727">SUSE bug 1171727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171985">SUSE bug 1171985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12861" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-080.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551826" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595990" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-082.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551826" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595990" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-083.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551826" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595990" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12864" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to read important information, such as the ASLR offsets of the program, aka GHSL-2020-081.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551826" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595990" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12865" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551826" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595990" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12866" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, GHSL-2020-079.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551826" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595990" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1791-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1798-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00003.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in sanei_epson_net_read in SANE Backends before 1.0.30 allows a malicious device connected to the same local network as the victim to cause a denial of service, aka GHSL-2020-075.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531452" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551826" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595990" comment="sane-backends-1.0.31-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12912</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12912" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12912" ref_url="https://www.suse.com/security/cve/CVE-2020-12912" source="SUSE CVE"/>
    <description>
    A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12912/">CVE-2020-12912</cve>
	<bugzilla href="https://bugzilla.suse.com/1178760">SUSE bug 1178760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13112" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112</cve>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13113" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexif before 0.6.22. Use of uninitialized memory in EXIF Makernote handling could lead to crashes and potential use-after-free conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113</cve>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13114" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0793-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114</cve>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531005" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531006" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549007" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595600" comment="libexif12-0.6.22-8.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549008" comment="libexif12-32bit-0.6.22-8.9.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13249</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13249" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0738-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    libmariadb/mariadb_lib.c in MariaDB Connector/C before 3.1.8 does not properly validate the content of an OK packet received from a server. NOTE: although mariadb_lib.c was originally based on code shipped for MySQL, this issue does not affect any MySQL components supported by Oracle.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13253" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13253" ref_url="https://www.suse.com/security/cve/CVE-2020-13253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORE7QLMZXD7OV3HIKQUG3SXU2RG6ONFC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0210-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUV2UU2CMT6KXSJ7THBLFDIVHI27MZFH/" source="SUSE-SU"/>
    <description>
    sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13253/">CVE-2020-13253</cve>
	<bugzilla href="https://bugzilla.suse.com/1172033">SUSE bug 1172033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13254</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13254" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13254" ref_url="https://www.suse.com/security/cve/CVE-2020-13254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13254/">CVE-2020-13254</cve>
	<bugzilla href="https://bugzilla.suse.com/1172166">SUSE bug 1172166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172167">SUSE bug 1172167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361</cve>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13379</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13379" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13379" ref_url="https://www.suse.com/security/cve/CVE-2020-13379" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0892-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1105-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1611-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00017.html" source="SUSE-SU"/>
    <description>
    The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13379/">CVE-2020-13379</cve>
	<bugzilla href="https://bugzilla.suse.com/1172409">SUSE bug 1172409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13430</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13430" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13430" ref_url="https://www.suse.com/security/cve/CVE-2020-13430" source="SUSE CVE"/>
    <description>
    Grafana before 7.0.0 allows tag value XSS via the OpenTSDB datasource.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13430/">CVE-2020-13430</cve>
	<bugzilla href="https://bugzilla.suse.com/1172128">SUSE bug 1172128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334411" comment="grafana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434</cve>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333982" comment="sqlite3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435</cve>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543</cve>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334506" comment="webkit2gtk3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552376" comment="webkit2gtk3-devel-2.32.1-2.63.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3MQBA72WHEO5RZKASEJOENULHWKFOZY/" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558</cve>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334506" comment="webkit2gtk3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552376" comment="webkit2gtk3-devel-2.32.1-2.63.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
    <description>
    An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334506" comment="webkit2gtk3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552376" comment="webkit2gtk3-devel-2.32.1-2.63.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13596</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13596" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13596" ref_url="https://www.suse.com/security/cve/CVE-2020-13596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13596/">CVE-2020-13596</cve>
	<bugzilla href="https://bugzilla.suse.com/1172166">SUSE bug 1172166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172167">SUSE bug 1172167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630</cve>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333982" comment="sqlite3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631</cve>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632</cve>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13645" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009886.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42QNVR5Y3Z3YQLA2G7H66ZAGRYHVNWHT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ALNGEQGJBIVTIE7PVRV4LMX5VCNHFOZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3944-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WJQDO7GLZV6KOOPFA2ZGLO6YGORWTRO/" source="SUSE-SU"/>
    <description>
    In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645</cve>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659102" comment="glib-networking-2.48.2-6.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659084" comment="glib-networking-lang-2.48.2-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659</cve>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551539" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551540" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551541" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551542" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551543" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551544" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551545" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595666" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595667" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595668" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595669" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595671" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595672" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13754" ref_url="https://www.suse.com/security/cve/CVE-2020-13754" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
    <description>
    hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13754/">CVE-2020-13754</cve>
	<bugzilla href="https://bugzilla.suse.com/1172382">SUSE bug 1172382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13757</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0901-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P3ME7Z7HY3RZGMZEXVYWABVMMLGMXE2S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V4YOO76ZUMWHQXJCEHC2KUOF54N5673X/" source="SUSE-SU"/>
    <description>
    Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757</cve>
	<bugzilla href="https://bugzilla.suse.com/1172389">SUSE bug 1172389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525304" comment="python-rsa-3.1.4-12.16.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13765" ref_url="https://www.suse.com/security/cve/CVE-2020-13765" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
    <description>
    rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13765/">CVE-2020-13765</cve>
	<bugzilla href="https://bugzilla.suse.com/1172478">SUSE bug 1172478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13791" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13791" ref_url="https://www.suse.com/security/cve/CVE-2020-13791" source="SUSE CVE"/>
    <description>
    hw/pci/pci.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access by providing an address near the end of the PCI configuration space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13791/">CVE-2020-13791</cve>
	<bugzilla href="https://bugzilla.suse.com/1172494">SUSE bug 1172494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html" source="SUSE-SU"/>
    <description>
    ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800</cve>
	<bugzilla href="https://bugzilla.suse.com/1172495">SUSE bug 1172495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13817" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551502" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551503" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595639" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595640" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007963.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1692-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1693-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4EOEHZ7Q27TTGN54YMFIIKDEJ5OS3SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OIESM64GYREKLMRLTSQUIOYAUT6QG6A2/" source="SUSE-SU"/>
    <description>
    Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531497" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531498" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531499" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531500" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531501" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531502" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531503" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531504" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531505" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531506" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531507" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531508" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531509" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531510" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531511" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531512" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531513" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531516" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531517" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531518" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531519" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531520" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531521" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531522" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531523" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551865" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551866" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551867" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551868" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551869" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551870" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551871" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551872" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551873" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551874" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551875" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551876" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551877" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551878" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537837" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551879" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551880" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537839" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551881" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551882" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551883" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551884" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525349" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537843" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551885" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551886" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596029" comment="libasan6-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551866" comment="libasan6-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596030" comment="libatomic1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551868" comment="libatomic1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596031" comment="libgcc_s1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551870" comment="libgcc_s1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596032" comment="libgfortran5-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551872" comment="libgfortran5-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596033" comment="libgo16-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551874" comment="libgo16-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596034" comment="libgomp1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551876" comment="libgomp1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596035" comment="libitm1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551878" comment="libitm1-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531511" comment="liblsan0-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596036" comment="libobjc4-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551880" comment="libobjc4-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531514" comment="libquadmath0-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531515" comment="libquadmath0-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596037" comment="libstdc++6-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551882" comment="libstdc++6-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596038" comment="libstdc++6-locale-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596039" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525349" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531521" comment="libtsan0-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596040" comment="libubsan1-10.2.1+git583-1.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551886" comment="libubsan1-32bit-10.2.1+git583-1.3.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13867</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007313.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1141-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1144-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00005.html" source="SUSE-SU"/>
    <description>
    Open-iSCSI targetcli-fb through 2.1.52 has weak permissions for /etc/target (and for the backup directory and backup files).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867</cve>
	<bugzilla href="https://bugzilla.suse.com/1172743">SUSE bug 1172743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334602" comment="targetcli-fb is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13871" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13871" ref_url="https://www.suse.com/security/cve/CVE-2020-13871" source="SUSE CVE"/>
    <description>
    SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13871/">CVE-2020-13871</cve>
	<bugzilla href="https://bugzilla.suse.com/1172646">SUSE bug 1172646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13902" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13902" ref_url="https://www.suse.com/security/cve/CVE-2020-13902" source="SUSE CVE"/>
    <description>
    ImageMagick 7.0.9-27 through 7.0.10-17 has a heap-based buffer over-read in BlobToStringInfo in MagickCore/string.c during TIFF image decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13902/">CVE-2020-13902</cve>
	<bugzilla href="https://bugzilla.suse.com/1172642">SUSE bug 1172642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13934" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13934" ref_url="https://www.suse.com/security/cve/CVE-2020-13934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007182.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html" source="SUSE-SU"/>
    <description>
    An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13934/">CVE-2020-13934</cve>
	<bugzilla href="https://bugzilla.suse.com/1174121">SUSE bug 1174121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1102-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1111-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html" source="SUSE-SU"/>
    <description>
    The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935</cve>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333989" comment="tomcat is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13943</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13943" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13943" ref_url="https://www.suse.com/security/cve/CVE-2020-13943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1799-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1842-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html" source="SUSE-SU"/>
    <description>
    If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13943/">CVE-2020-13943</cve>
	<bugzilla href="https://bugzilla.suse.com/1177582">SUSE bug 1177582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13956</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13956" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13956" ref_url="https://www.suse.com/security/cve/CVE-2020-13956" source="SUSE CVE"/>
    <description>
    Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13956/">CVE-2020-13956</cve>
	<bugzilla href="https://bugzilla.suse.com/1177488">SUSE bug 1177488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338741" comment="apache-commons-httpclient is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14019</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14019" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14019" ref_url="https://www.suse.com/security/cve/CVE-2020-14019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007211.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1156-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html" source="SUSE-SU"/>
    <description>
    Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14019/">CVE-2020-14019</cve>
	<bugzilla href="https://bugzilla.suse.com/1173257">SUSE bug 1173257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334197" comment="python-rtslib-fb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14059" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0910-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0914-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00071.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid 5.x before 5.0.3. Due to an Incorrect Synchronization, a Denial of Service can occur when processing objects in an SMP cache because of an Ipc::Mem::PageStack::pop ABA problem during access to the memory page/slot management list.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<bugzilla href="https://bugzilla.suse.com/1173303">SUSE bug 1173303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531065" comment="squid-3.5.21-26.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551501" comment="squid-3.5.21-26.26.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595638" comment="squid-3.5.21-26.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14093" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531064" comment="mutt-1.10.1-55.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551500" comment="mutt-1.10.1-55.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595637" comment="mutt-1.10.1-55.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTSUNUWKKFI2BZV3IR5RLHAQFXINNKM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D34ALFN2MMC67CCWTOANPH5DLTSAHLOG/" source="SUSE-SU"/>
    <description>
    The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177569">SUSE bug 1177569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189078">SUSE bug 1189078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531851" comment="openssh-7.2p2-74.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531852" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531853" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531854" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552069" comment="openssh-7.2p2-74.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552070" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552071" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552072" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596339" comment="openssh-7.2p2-74.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596340" comment="openssh-askpass-gnome-7.2p2-74.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596341" comment="openssh-fips-7.2p2-74.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596342" comment="openssh-helpers-7.2p2-74.57.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14151" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14151" ref_url="https://www.suse.com/security/cve/CVE-2020-14151" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-11813. Reason: This candidate is a duplicate of CVE-2018-11813. Notes: All CVE users should reference [ID] instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14151/">CVE-2020-14151</cve>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172994">SUSE bug 1172994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333959" comment="libjpeg-turbo is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333960" comment="libjpeg62-turbo is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14154" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531064" comment="mutt-1.10.1-55.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551500" comment="mutt-1.10.1-55.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595637" comment="mutt-1.10.1-55.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ANBRV4PU5AWEEYUWZYBLJCQBG3AHEGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/" source="SUSE-SU"/>
    <description>
    libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155</cve>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333973" comment="pcre is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653038" comment="libpcre1-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653016" comment="libpcre1-32bit-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653039" comment="libpcre16-0-8.45-8.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653349" comment="selinux-policy-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653350" comment="selinux-policy-devel-20140730-36.5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653351" comment="selinux-policy-minimum-20140730-36.5.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305</cve>
	<bugzilla href="https://bugzilla.suse.com/1173346">SUSE bug 1173346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14308" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551546" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537579" comment="grub2-powerpc-ieee1275-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595673" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14309" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551546" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537579" comment="grub2-powerpc-ieee1275-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595673" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14310" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551546" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537579" comment="grub2-powerpc-ieee1275-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595673" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14311" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551546" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537579" comment="grub2-powerpc-ieee1275-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595673" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551682" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551683" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551684" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551686" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537689" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595775" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595776" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595777" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595778" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14318" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531408" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531409" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531410" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531411" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531412" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531413" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531414" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531415" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531416" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531417" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531418" comment="libndr0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531419" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531420" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531421" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531422" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531423" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531424" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531425" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531426" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531427" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531428" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531429" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531430" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531431" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531432" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531433" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531434" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531435" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531436" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531437" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531438" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531439" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531440" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531441" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531442" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531443" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531444" comment="samba-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531445" comment="samba-client-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531446" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531448" comment="samba-libs-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531449" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531450" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531451" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551783" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551784" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551785" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551786" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551787" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551788" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551789" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551790" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551791" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551792" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551793" comment="libndr0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551794" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551795" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551796" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551797" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551798" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551799" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551800" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551801" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551802" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551803" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551804" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551805" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551806" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551807" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551808" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551809" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551810" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551811" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551812" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551813" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551814" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551815" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551816" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551817" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551818" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551819" comment="samba-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551820" comment="samba-client-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551821" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551822" comment="samba-libs-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551823" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551824" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551825" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595961" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551784" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595962" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551786" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595963" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551788" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595964" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551790" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595965" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551792" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595966" comment="libndr0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551794" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595967" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551796" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595968" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551798" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595969" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551800" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595970" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551802" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595971" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551804" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595972" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551806" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595973" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551808" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595974" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551810" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595975" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551812" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595976" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551814" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595977" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551816" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595978" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551818" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595979" comment="samba-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595980" comment="samba-client-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551821" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595981" comment="samba-libs-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551823" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595982" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551825" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14323" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1811-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1819-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531408" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531409" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531410" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531411" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531412" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531413" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531414" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531415" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531416" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531417" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531418" comment="libndr0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531419" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531420" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531421" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531422" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531423" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531424" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531425" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531426" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531427" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531428" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531429" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531430" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531431" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531432" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531433" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531434" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531435" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531436" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531437" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531438" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531439" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531440" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531441" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531442" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531443" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531444" comment="samba-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531445" comment="samba-client-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531446" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531448" comment="samba-libs-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531449" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531450" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531451" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551783" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551784" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551785" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551786" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551787" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551788" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551789" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551790" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551791" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551792" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551793" comment="libndr0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551794" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551795" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551796" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551797" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551798" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551799" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551800" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551801" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551802" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551803" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551804" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551805" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551806" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551807" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551808" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551809" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551810" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551811" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551812" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551813" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551814" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551815" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551816" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551817" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551818" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551819" comment="samba-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551820" comment="samba-client-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551821" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551822" comment="samba-libs-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551823" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551824" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551825" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595961" comment="libdcerpc-binding0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551784" comment="libdcerpc-binding0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595962" comment="libdcerpc0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551786" comment="libdcerpc0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595963" comment="libndr-krb5pac0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551788" comment="libndr-krb5pac0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595964" comment="libndr-nbt0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551790" comment="libndr-nbt0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595965" comment="libndr-standard0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551792" comment="libndr-standard0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595966" comment="libndr0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551794" comment="libndr0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595967" comment="libnetapi0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551796" comment="libnetapi0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595968" comment="libsamba-credentials0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551798" comment="libsamba-credentials0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595969" comment="libsamba-errors0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551800" comment="libsamba-errors0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595970" comment="libsamba-hostconfig0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551802" comment="libsamba-hostconfig0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595971" comment="libsamba-passdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551804" comment="libsamba-passdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595972" comment="libsamba-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551806" comment="libsamba-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595973" comment="libsamdb0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551808" comment="libsamdb0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595974" comment="libsmbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551810" comment="libsmbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595975" comment="libsmbconf0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551812" comment="libsmbconf0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595976" comment="libsmbldap0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551814" comment="libsmbldap0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595977" comment="libtevent-util0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551816" comment="libtevent-util0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595978" comment="libwbclient0-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551818" comment="libwbclient0-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595979" comment="samba-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595980" comment="samba-client-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551821" comment="samba-client-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531447" comment="samba-doc-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595981" comment="samba-libs-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551823" comment="samba-libs-32bit-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595982" comment="samba-winbind-4.4.2-38.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551825" comment="samba-winbind-32bit-4.4.2-38.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552459" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552460" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552461" comment="kgraft-patch-4_4_121-92_129-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552462" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552463" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551682" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551683" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551684" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551686" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537677" comment="kgraft-patch-4_4_121-92_120-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537678" comment="kgraft-patch-4_4_121-92_125-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537679" comment="kgraft-patch-4_4_121-92_129-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537680" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537681" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537689" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595775" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595776" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595777" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595778" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14343</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009336.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343</cve>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628227" comment="python-PyYAML-5.3.1-28.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007252.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1162-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1164-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1182-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1198-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html" source="SUSE-SU"/>
    <description>
    An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175880">SUSE bug 1175880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531165" comment="libX11-6-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531166" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531168" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531169" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531129" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531130" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531131" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531132" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531133" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531134" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531135" comment="libxcb-present0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531136" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531137" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531138" comment="libxcb-render0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531139" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531140" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531141" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531142" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531143" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531144" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531145" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531146" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531147" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531148" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531149" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531150" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531151" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531152" comment="libxcb1-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531153" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551589" comment="libX11-6-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551590" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551591" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551592" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551557" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551558" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551559" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551560" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551561" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551562" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551563" comment="libxcb-present0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551564" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551565" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551566" comment="libxcb-render0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551567" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551568" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551569" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551570" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551571" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551572" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551573" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551574" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551575" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551576" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551577" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551578" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551579" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551580" comment="libxcb1-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551581" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595704" comment="libX11-6-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551590" comment="libX11-6-32bit-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531167" comment="libX11-data-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595705" comment="libX11-xcb1-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551592" comment="libX11-xcb1-32bit-1.6.2-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595681" comment="libxcb-dri2-0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551558" comment="libxcb-dri2-0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595682" comment="libxcb-dri3-0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551560" comment="libxcb-dri3-0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595683" comment="libxcb-glx0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551562" comment="libxcb-glx0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595684" comment="libxcb-present0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551564" comment="libxcb-present0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595685" comment="libxcb-randr0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595686" comment="libxcb-render0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551567" comment="libxcb-render0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595687" comment="libxcb-shape0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595688" comment="libxcb-shm0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551570" comment="libxcb-shm0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595689" comment="libxcb-sync1-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551572" comment="libxcb-sync1-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595690" comment="libxcb-xf86dri0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595691" comment="libxcb-xfixes0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551575" comment="libxcb-xfixes0-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595692" comment="libxcb-xinerama0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595693" comment="libxcb-xkb1-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551578" comment="libxcb-xkb1-32bit-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595694" comment="libxcb-xv0-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595695" comment="libxcb1-1.10-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551581" comment="libxcb1-32bit-1.10-4.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181067">SUSE bug 1181067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531240" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531241" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551651" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551652" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595741" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595742" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531240" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531241" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551651" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551652" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595741" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595742" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007305.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1279-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00075.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531240" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531241" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551651" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551652" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595741" comment="xorg-x11-server-7.6_1.18.3-76.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595742" comment="xorg-x11-server-extra-7.6_1.18.3-76.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14349" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html" source="SUSE-SU"/>
    <description>
    It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176151">SUSE bug 1176151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179499">SUSE bug 1179499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531636" comment="libecpg6-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531637" comment="libpq5-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531638" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551978" comment="libecpg6-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551979" comment="libpq5-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551980" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551942" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551943" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551944" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551945" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551946" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551947" comment="postgresql10-server-10.15-4.9.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596134" comment="libecpg6-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596135" comment="libpq5-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551980" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596090" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596091" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596092" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596093" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596094" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596095" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334083" comment="postgresql is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14350" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1228-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00044.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1243-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1244-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1312-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1326-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00008.html" source="SUSE-SU"/>
    <description>
    It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176151">SUSE bug 1176151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179115">SUSE bug 1179115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179499">SUSE bug 1179499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531636" comment="libecpg6-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531637" comment="libpq5-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531638" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551978" comment="libecpg6-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551979" comment="libpq5-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551980" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551942" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551943" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551944" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551945" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551946" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551947" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551948" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551949" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551950" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551951" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551952" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551953" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596134" comment="libecpg6-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596135" comment="libpq5-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551980" comment="libpq5-32bit-12.5-3.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596090" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596091" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596092" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596093" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596094" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596095" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596096" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596097" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596098" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596099" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596100" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596101" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334083" comment="postgresql is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14351" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1905-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008998.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1803-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00000.html" source="SUSE-SU"/>
    <description>
    Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334170" comment="spice is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334604" comment="spice-gtk is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552356" comment="libspice-client-glib-2_0-8-0.31-9.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552357" comment="libspice-client-glib-helper-0.31-9.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552358" comment="libspice-client-gtk-2_0-4-0.31-9.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552359" comment="libspice-client-gtk-3_0-4-0.31-9.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552360" comment="libspice-controller0-0.31-9.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552355" comment="libspice-server1-0.12.7-10.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552361" comment="typelib-1_0-SpiceClientGlib-2_0-0.31-9.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552362" comment="typelib-1_0-SpiceClientGtk-3_0-0.31-9.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14356" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176392">SUSE bug 1176392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4SY5GPVDDNTXYVZ6YALLHT7B5RVDBJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJUVPABDGLSKQJMNPJUJBYOQTIDGD67K/" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531622" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531623" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551966" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551967" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596113" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596114" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00014.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531257" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531258" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551664" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551665" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595756" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595757" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1374-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00013.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1376-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00014.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531257" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531258" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551664" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551665" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595756" comment="xorg-x11-server-7.6_1.18.3-76.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595757" comment="xorg-x11-server-extra-7.6_1.18.3-76.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1368-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1370-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00018.html" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531270" comment="libX11-6-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531271" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531273" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531274" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551673" comment="libX11-6-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551674" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551675" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551676" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595767" comment="libX11-6-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551674" comment="libX11-6-32bit-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531272" comment="libX11-data-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595768" comment="libX11-xcb1-1.6.2-12.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551676" comment="libX11-xcb1-32bit-1.6.2-12.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176494">SUSE bug 1176494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14367" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0845-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIUHNUKYNY5JRZHWXP7NXCJOMX4HEQMQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in chrony versions before 3.5.1 when creating the PID file under the /var/run/chrony folder. The file is created during chronyd startup while still running as the root user, and when it's opened for writing, chronyd does not check for an existing symbolic link with the same file name. This flaw allows an attacker with privileged access to create a symlink with the default PID file name pointing to any destination file in the system, resulting in data loss and a denial of service due to the path traversal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367</cve>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659981" comment="chrony-4.1-5.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531930" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552128" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538177" comment="grub2-powerpc-ieee1275-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596396" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14373" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14373" ref_url="https://www.suse.com/security/cve/CVE-2020-14373" source="SUSE CVE"/>
    <description>
    A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14373/">CVE-2020-14373</cve>
	<bugzilla href="https://bugzilla.suse.com/1176133">SUSE bug 1176133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14381" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14381" ref_url="https://www.suse.com/security/cve/CVE-2020-14381" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14381/">CVE-2020-14381</cve>
	<bugzilla href="https://bugzilla.suse.com/1176011">SUSE bug 1176011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176012">SUSE bug 1176012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552467" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552466" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552468" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552465" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552464" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537828" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537827" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537829" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537826" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537825" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1379-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1382-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552467" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552466" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552468" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552465" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551682" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551683" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551684" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551686" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537828" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537827" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537829" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537826" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537689" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595775" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595776" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595777" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595778" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14392" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00218.html" source="SUSE-SU"/>
    <description>
    An untrusted pointer dereference flaw was found in Perl-DBI &lt; 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531302" comment="perl-DBI-1.628-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551687" comment="perl-DBI-1.628-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595783" comment="perl-DBI-1.628-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007439.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1483-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1502-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00218.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was found in perl-DBI &lt; 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531302" comment="perl-DBI-1.628-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551687" comment="perl-DBI-1.628-5.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595783" comment="perl-DBI-1.628-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14397" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14398" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14399" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly "no trust boundary crossed."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14400" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0988-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1025-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1056-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00066.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/corre.c allows out-of-bounds access via encodings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14403" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14403" ref_url="https://www.suse.com/security/cve/CVE-2020-14403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/hextile.c allows out-of-bounds access via encodings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14403/">CVE-2020-14403</cve>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14404" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14404" ref_url="https://www.suse.com/security/cve/CVE-2020-14404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007241.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rre.c allows out-of-bounds access via encodings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14404/">CVE-2020-14404</cve>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531163" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531164" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551587" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551588" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595702" comment="libvncclient0-0.9.9-17.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595703" comment="libvncserver0-0.9.9-17.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14409" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010802.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GCAJV7QU7NXYUTY7OMBOV6LAES2X326R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0104-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG2DES77OYKEDNAIOARFYYX34EY75ACT/" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 2.0.12 has an Integer Overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679549" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679539" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14410" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010802.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GCAJV7QU7NXYUTY7OMBOV6LAES2X326R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0104-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG2DES77OYKEDNAIOARFYYX34EY75ACT/" source="SUSE-SU"/>
    <description>
    SDL (Simple DirectMedia Layer) through 2.0.12 has a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679549" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679539" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14415" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14415" ref_url="https://www.suse.com/security/cve/CVE-2020-14415" source="SUSE CVE"/>
    <description>
    oss_write in audio/ossaudio.c in QEMU before 5.0.0 mishandles a buffer position.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14415/">CVE-2020-14415</cve>
	<bugzilla href="https://bugzilla.suse.com/1173109">SUSE bug 1173109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.4.16, a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531154" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531155" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531156" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531160" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551582" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551583" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551584" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551586" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537606" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595696" comment="kernel-default-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595697" comment="kernel-default-base-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595698" comment="kernel-default-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551585" comment="kernel-default-man-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531157" comment="kernel-devel-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531158" comment="kernel-macros-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531159" comment="kernel-source-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595699" comment="kernel-syms-4.4.121-92.138.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531161" comment="kgraft-patch-4_4_121-92_138-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0931-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0940-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0989-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1002-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334160" comment="python3 is affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531307" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531303" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531304" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531305" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531306" comment="python3-curses-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551688" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551689" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551690" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551691" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551692" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595786" comment="libpython3_4m1_0-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531162" comment="python-ipaddress-1.0.18-3.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595787" comment="python3-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595788" comment="python3-base-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595789" comment="python3-curses-3.4.10-25.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595790" comment="python3-devel-3.4.10-25.52.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551755" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551756" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551757" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551758" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551677" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542900" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551678" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595832" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595833" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595834" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595835" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595769" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595770" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595771" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551755" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551756" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551757" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551758" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551677" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542900" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551678" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595832" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595833" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595834" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595835" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595769" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595770" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595771" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551755" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551756" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551757" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551758" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551677" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542900" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551678" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595832" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595833" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595834" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595835" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595769" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595770" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595771" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14581" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551755" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551756" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551757" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551758" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595832" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595833" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595834" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595835" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551755" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551756" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551757" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551758" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551677" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542900" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551678" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595832" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595833" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595834" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595835" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595769" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595770" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595771" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551755" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551756" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551757" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551758" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551677" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542900" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551678" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595832" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595833" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595834" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595835" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595769" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595770" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595771" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1175-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1191-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531377" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531378" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531379" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531380" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531275" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531277" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531278" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531265" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531267" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551755" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551756" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551757" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551758" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551677" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542900" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551678" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551671" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542898" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595832" comment="java-1_7_0-openjdk-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595833" comment="java-1_7_0-openjdk-demo-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595834" comment="java-1_7_0-openjdk-devel-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595835" comment="java-1_7_0-openjdk-headless-1.7.0.271-43.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595769" comment="java-1_7_1-ibm-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531276" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595770" comment="java-1_7_1-ibm-devel-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595771" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531279" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.70-38.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595763" comment="java-1_8_0-ibm-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531266" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595764" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531268" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-30.72.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472" source="SUSE CVE"/>
		<reference ref_id="BLOG-ZEROLOGON" ref_url="https://www.suse.com/c/suse-addresses-zerologon-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007469.html" source="SUSE-SU"/>
		<reference ref_id="TID000019713" ref_url="https://www.suse.com/support/kb/doc/?id=000019713" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1513-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1526-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531308" comment="libdcerpc-binding0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531309" comment="libdcerpc-binding0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531310" comment="libdcerpc0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531311" comment="libdcerpc0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531312" comment="libndr-krb5pac0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531313" comment="libndr-krb5pac0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531314" comment="libndr-nbt0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531315" comment="libndr-nbt0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531316" comment="libndr-standard0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531317" comment="libndr-standard0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531318" comment="libndr0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531319" comment="libndr0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531320" comment="libnetapi0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531321" comment="libnetapi0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531322" comment="libsamba-credentials0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531323" comment="libsamba-credentials0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531324" comment="libsamba-errors0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531325" comment="libsamba-errors0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531326" comment="libsamba-hostconfig0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531327" comment="libsamba-hostconfig0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531328" comment="libsamba-passdb0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531329" comment="libsamba-passdb0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531330" comment="libsamba-util0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531331" comment="libsamba-util0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531332" comment="libsamdb0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531333" comment="libsamdb0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531334" comment="libsmbclient0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531335" comment="libsmbclient0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531336" comment="libsmbconf0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531337" comment="libsmbconf0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531338" comment="libsmbldap0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531339" comment="libsmbldap0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531340" comment="libtevent-util0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531341" comment="libtevent-util0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531342" comment="libwbclient0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531343" comment="libwbclient0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531344" comment="samba-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531345" comment="samba-client-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531346" comment="samba-client-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531347" comment="samba-doc-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531348" comment="samba-libs-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531349" comment="samba-libs-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531350" comment="samba-winbind-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531351" comment="samba-winbind-32bit-4.4.2-38.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551693" comment="libdcerpc-binding0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551694" comment="libdcerpc-binding0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551695" comment="libdcerpc0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551696" comment="libdcerpc0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551697" comment="libndr-krb5pac0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551698" comment="libndr-krb5pac0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551699" comment="libndr-nbt0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551700" comment="libndr-nbt0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551701" comment="libndr-standard0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551702" comment="libndr-standard0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551703" comment="libndr0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551704" comment="libndr0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551705" comment="libnetapi0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551706" comment="libnetapi0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551707" comment="libsamba-credentials0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551708" comment="libsamba-credentials0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551709" comment="libsamba-errors0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551710" comment="libsamba-errors0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551711" comment="libsamba-hostconfig0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551712" comment="libsamba-hostconfig0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551713" comment="libsamba-passdb0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551714" comment="libsamba-passdb0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551715" comment="libsamba-util0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551716" comment="libsamba-util0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551717" comment="libsamdb0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551718" comment="libsamdb0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551719" comment="libsmbclient0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551720" comment="libsmbclient0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551721" comment="libsmbconf0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551722" comment="libsmbconf0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551723" comment="libsmbldap0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551724" comment="libsmbldap0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551725" comment="libtevent-util0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551726" comment="libtevent-util0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551727" comment="libwbclient0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551728" comment="libwbclient0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551729" comment="samba-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551730" comment="samba-client-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551731" comment="samba-client-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531347" comment="samba-doc-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551732" comment="samba-libs-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551733" comment="samba-libs-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551734" comment="samba-winbind-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551735" comment="samba-winbind-32bit-4.4.2-38.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595791" comment="libdcerpc-binding0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551694" comment="libdcerpc-binding0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595792" comment="libdcerpc0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551696" comment="libdcerpc0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595793" comment="libndr-krb5pac0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551698" comment="libndr-krb5pac0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595794" comment="libndr-nbt0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551700" comment="libndr-nbt0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595795" comment="libndr-standard0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551702" comment="libndr-standard0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595796" comment="libndr0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551704" comment="libndr0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595797" comment="libnetapi0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551706" comment="libnetapi0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595798" comment="libsamba-credentials0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551708" comment="libsamba-credentials0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595799" comment="libsamba-errors0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551710" comment="libsamba-errors0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595800" comment="libsamba-hostconfig0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551712" comment="libsamba-hostconfig0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595801" comment="libsamba-passdb0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551714" comment="libsamba-passdb0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595802" comment="libsamba-util0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551716" comment="libsamba-util0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595803" comment="libsamdb0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551718" comment="libsamdb0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595804" comment="libsmbclient0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551720" comment="libsmbclient0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595805" comment="libsmbconf0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551722" comment="libsmbconf0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595806" comment="libsmbldap0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551724" comment="libsmbldap0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595807" comment="libtevent-util0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551726" comment="libtevent-util0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595808" comment="libwbclient0-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551728" comment="libwbclient0-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595809" comment="samba-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595810" comment="samba-client-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551731" comment="samba-client-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531347" comment="samba-doc-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595811" comment="samba-libs-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551733" comment="samba-libs-32bit-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595812" comment="samba-winbind-4.4.2-38.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551735" comment="samba-winbind-32bit-4.4.2-38.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14765</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14776</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551896" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551897" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551898" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551899" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552060" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543165" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552061" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552079" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543206" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596047" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596048" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596049" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596050" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596321" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596322" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596323" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596349" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596350" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551896" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551897" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551898" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551899" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552060" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543165" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552061" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552079" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543206" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596047" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596048" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596049" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596050" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596321" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596322" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596323" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596349" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596350" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551896" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551897" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551898" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551899" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552060" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543165" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552061" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596047" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596048" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596049" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596050" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596321" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596322" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596323" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14789</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551896" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551897" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551898" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551899" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552060" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543165" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552061" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552079" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543206" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596047" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596048" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596049" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596050" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596321" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596322" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596323" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596349" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596350" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551896" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551897" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551898" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551899" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552060" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543165" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552061" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552079" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543206" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596047" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596048" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596049" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596050" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596321" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596322" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596323" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596349" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596350" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551896" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551897" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551898" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551899" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552060" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543165" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552061" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552079" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543206" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596047" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596048" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596049" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596050" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596321" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596322" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596323" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596349" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596350" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14798" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531832" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531834" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531835" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531863" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531865" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531493" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531494" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531495" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531496" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551896" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551897" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551898" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551899" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552060" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543165" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552061" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552079" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543206" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551861" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551862" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551863" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551864" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596047" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596048" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596049" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596050" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596321" comment="java-1_7_1-ibm-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531833" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596322" comment="java-1_7_1-ibm-devel-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596323" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531836" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.75-38.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596349" comment="java-1_8_0-ibm-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531864" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596350" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531866" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-30.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596025" comment="java-1_8_0-openjdk-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596026" comment="java-1_8_0-openjdk-demo-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596027" comment="java-1_8_0-openjdk-devel-1.8.0.272-27.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596028" comment="java-1_8_0-openjdk-headless-1.8.0.272-27.48.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008363.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1893-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JSWTDWV5MMTZOHS5HIFMSHB3IUNUEUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5I3H5OR336ZSCD3OKSPETQ54YCFESWA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJAO3FCIU7U6QFGCFQBWQ7AIAFG7CCLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2083-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWRVFCOMHOVFD7QH66A4H74YOLORU4TF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IE6Q2IB2YXUXIWFBPF2P2FIHVNJLBUPC/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531526" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531527" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531528" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531529" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531909" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531920" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531922" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531916" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531917" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531918" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531919" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551896" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551897" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551898" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551899" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552114" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543223" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552115" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552122" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543254" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552118" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552119" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552120" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552121" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596047" comment="java-1_7_0-openjdk-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596048" comment="java-1_7_0-openjdk-demo-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596049" comment="java-1_7_0-openjdk-devel-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596050" comment="java-1_7_0-openjdk-headless-1.7.0.281-43.44.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596380" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596381" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596382" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596389" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596390" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596385" comment="java-1_8_0-openjdk-1.8.0.282-27.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596386" comment="java-1_8_0-openjdk-demo-1.8.0.282-27.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596387" comment="java-1_8_0-openjdk-devel-1.8.0.282-27.56.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596388" comment="java-1_8_0-openjdk-headless-1.8.0.282-27.56.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14812</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812</cve>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14871</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14871" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14871" ref_url="https://www.suse.com/security/cve/CVE-2020-14871" source="SUSE CVE"/>
    <description>
    Vulnerability in the Oracle Solaris product of Oracle Systems (component: Pluggable authentication module). Supported versions that are affected are 10 and 11. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle Solaris. Note: This CVE is not exploitable for Solaris 11.1 and later releases, and ZFSSA 8.7 and later releases, thus the CVSS Base Score is 0.0. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-14871/">CVE-2020-14871</cve>
	<bugzilla href="https://bugzilla.suse.com/1183542">SUSE bug 1183542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14954" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0903-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0915-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531064" comment="mutt-1.10.1-55.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551500" comment="mutt-1.10.1-55.11.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595637" comment="mutt-1.10.1-55.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15011" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15011" ref_url="https://www.suse.com/security/cve/CVE-2020-15011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007181.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1707-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1752-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html" source="SUSE-SU"/>
    <description>
    GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15011/">CVE-2020-15011</cve>
	<bugzilla href="https://bugzilla.suse.com/1173369">SUSE bug 1173369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531104" comment="mailman-2.1.17-3.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551538" comment="mailman-2.1.17-3.23.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595665" comment="mailman-2.1.17-3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15025" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0934-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1007-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html" source="SUSE-SU"/>
    <description>
    ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531066" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531067" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551502" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551503" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595639" comment="ntp-4.2.8p15-88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595640" comment="ntp-doc-4.2.8p15-88.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049" source="SUSE CVE"/>
		<reference ref_id="GHSA-qf3v-rc95-96j5" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-qf3v-rc95-96j5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174381">SUSE bug 1174381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531103" comment="squid-3.5.21-26.29.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551537" comment="squid-3.5.21-26.29.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595664" comment="squid-3.5.21-26.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15075</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15075" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15075" ref_url="https://www.suse.com/security/cve/CVE-2020-15075" source="SUSE CVE"/>
    <description>
    OpenVPN Connect installer for macOS version 3.2.6 and older may corrupt system critical files it should not have access via symlinks in /tmp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15075/">CVE-2020-15075</cve>
	<bugzilla href="https://bugzilla.suse.com/1184190">SUSE bug 1184190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334133" comment="openvpn is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15095</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15095" ref_url="https://www.suse.com/security/cve/CVE-2020-15095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1644-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html" source="SUSE-SU"/>
    <description>
    Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "&lt;protocol&gt;://[&lt;user&gt;[:&lt;password&gt;]@]&lt;hostname&gt;[:&lt;port&gt;][:][/]&lt;path&gt;". The password value is not redacted and is printed to stdout and also to any generated log files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15095/">CVE-2020-15095</cve>
	<bugzilla href="https://bugzilla.suse.com/1173937">SUSE bug 1173937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15169</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15169" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15169" ref_url="https://www.suse.com/security/cve/CVE-2020-15169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15169/">CVE-2020-15169</cve>
	<bugzilla href="https://bugzilla.suse.com/1176421">SUSE bug 1176421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595785" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15180</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15180" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2090-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEA5NKMLBRO6JL3F3JJPI23H6KZ5L7P2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTXANMDMHA454FKDXGYDWZBZF7VFHZXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QJBILMORHJAJO5BNYHFTZJVMAIQQRB6P/" source="SUSE-SU"/>
    <description>
    A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180</cve>
	<bugzilla href="https://bugzilla.suse.com/1177472">SUSE bug 1177472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15254</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15254" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15254" ref_url="https://www.suse.com/security/cve/CVE-2020-15254" source="SUSE CVE"/>
    <description>
    Crossbeam is a set of tools for concurrent programming. In crossbeam-channel before version 0.4.4, the bounded channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements. This has been fixed in crossbeam-channel 0.4.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15254/">CVE-2020-15254</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15304" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15304" ref_url="https://www.suse.com/security/cve/CVE-2020-15304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.5.2. An invalid tiled input file could cause invalid memory access in TiledInputFile::TiledInputFile() in IlmImf/ImfTiledInputFile.cpp, as demonstrated by a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15304/">CVE-2020-15304</cve>
	<bugzilla href="https://bugzilla.suse.com/1173466">SUSE bug 1173466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334510" comment="openexr is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15305" ref_url="https://www.suse.com/security/cve/CVE-2020-15305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before 2.5.2. Invalid input could cause a use-after-free in DeepScanLineInputFile::DeepScanLineInputFile() in IlmImf/ImfDeepScanLineInputFile.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15305/">CVE-2020-15305</cve>
	<bugzilla href="https://bugzilla.suse.com/1173467">SUSE bug 1173467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334510" comment="openexr is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15306" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15306" ref_url="https://www.suse.com/security/cve/CVE-2020-15306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0970-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1015-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00048.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenEXR before v2.5.2. Invalid chunkCount attributes could cause a heap buffer overflow in getChunkOffsetTableSize() in IlmImf/ImfMisc.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15306/">CVE-2020-15306</cve>
	<bugzilla href="https://bugzilla.suse.com/1173469">SUSE bug 1173469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334510" comment="openexr is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358</cve>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15365" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15365" ref_url="https://www.suse.com/security/cve/CVE-2020-15365" source="SUSE CVE"/>
    <description>
    LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15365/">CVE-2020-15365</cve>
	<bugzilla href="https://bugzilla.suse.com/1173517">SUSE bug 1173517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15389" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    jp2/opj_decompress.c in OpenJPEG through 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_destroy twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1062-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15436" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15437" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-&gt;serial_in pointer which uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15469" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469</cve>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15523" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15523" ref_url="https://www.suse.com/security/cve/CVE-2020-15523" source="SUSE CVE"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15523/">CVE-2020-15523</cve>
	<bugzilla href="https://bugzilla.suse.com/1173745">SUSE bug 1173745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15565" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen's free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15567" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox &lt; 79, Firefox ESR &lt; 68.11, Firefox ESR &lt; 78.1, Thunderbird &lt; 68.11, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15657" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    Firefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15658" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
    <description>
    The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This vulnerability affects Firefox ESR &lt; 78.1, Firefox &lt; 79, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 79, Firefox ESR &lt; 68.11, Firefox ESR &lt; 78.1, Thunderbird &lt; 68.11, and Thunderbird &lt; 78.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00026.html" source="SUSE-SU"/>
    <description>
    If Firefox is installed to a user-writable directory, the Mozilla Maintenance Service would execute updater.exe from the install location with system privileges. Although the Mozilla Maintenance Service does ensure that updater.exe is signed by Mozilla, the version could have been rolled back to a previous version which would have allowed exploitation of an older bug and arbitrary code execution with System Privileges. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 80, Thunderbird &lt; 78.2, Thunderbird &lt; 68.12, Firefox ESR &lt; 68.12, and Firefox ESR &lt; 78.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531280" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531281" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531282" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551679" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551680" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551681" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595772" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595773" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595774" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15664" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1383-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1392-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00026.html" source="SUSE-SU"/>
    <description>
    By holding a reference to the eval() function from an about:blank window, a malicious webpage could have gained access to the InstallTrigger object which would allow them to prompt the user to install an extension. Combined with user confusion, this could result in an unintended or malicious extension being installed. This vulnerability affects Firefox &lt; 80, Thunderbird &lt; 78.2, Thunderbird &lt; 68.12, Firefox ESR &lt; 68.12, Firefox ESR &lt; 78.2, and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531280" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531281" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531282" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551679" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551680" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551681" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595772" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595773" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595774" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1384-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1391-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00027.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox for Android 79. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 80, Firefox ESR &lt; 78.2, Thunderbird &lt; 78.2, and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531280" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531281" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531282" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551679" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551680" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551681" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595772" comment="MozillaFirefox-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595773" comment="MozillaFirefox-devel-78.2.0-112.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595774" comment="MozillaFirefox-translations-common-78.2.0-112.19.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 80 and Firefox ESR 78.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551736" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551737" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551738" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595813" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595814" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595815" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15674</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15674" ref_url="https://www.suse.com/security/cve/CVE-2020-15674" source="SUSE CVE"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 80. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 81.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15674/">CVE-2020-15674</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15675</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15675" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15675" ref_url="https://www.suse.com/security/cve/CVE-2020-15675" source="SUSE CVE"/>
    <description>
    When processing surfaces, the lifetime may outlive a persistent buffer leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 81.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15675/">CVE-2020-15675</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551736" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551737" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551738" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595813" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595814" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595815" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551736" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551737" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551738" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595813" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595814" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595815" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1574-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00106.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox &lt; 81, Thunderbird &lt; 78.3, and Firefox ESR &lt; 78.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531352" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531353" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531354" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551736" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551737" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551738" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595813" comment="MozillaFirefox-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595814" comment="MozillaFirefox-devel-78.3.0-112.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595815" comment="MozillaFirefox-translations-common-78.3.0-112.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15680</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15680" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15680" ref_url="https://www.suse.com/security/cve/CVE-2020-15680" source="SUSE CVE"/>
    <description>
    If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox &lt; 82.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15680/">CVE-2020-15680</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15681</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15681" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15681" ref_url="https://www.suse.com/security/cve/CVE-2020-15681" source="SUSE CVE"/>
    <description>
    When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 82.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15681/">CVE-2020-15681</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15682</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15682" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15682" ref_url="https://www.suse.com/security/cve/CVE-2020-15682" source="SUSE CVE"/>
    <description>
    When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing attack. This was fixed by changing external protocol prompts to be tab-modal while also ensuring they could not be incorrectly associated with a different origin. This vulnerability affects Firefox &lt; 82.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15682/">CVE-2020-15682</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.4, Firefox &lt; 82, and Thunderbird &lt; 78.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531405" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531406" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531407" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551780" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551781" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551782" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595958" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595959" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595960" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15705" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1280-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1282-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html" source="SUSE-SU"/>
    <description>
    GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182890">SUSE bug 1182890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531190" comment="grub2-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531191" comment="grub2-i386-pc-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531192" comment="grub2-snapper-plugin-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531193" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531194" comment="grub2-x86_64-efi-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531195" comment="grub2-x86_64-xen-2.02~beta2-115.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551606" comment="grub2-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531191" comment="grub2-i386-pc-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537624" comment="grub2-powerpc-ieee1275-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551607" comment="grub2-s390x-emu-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531192" comment="grub2-snapper-plugin-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531193" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531194" comment="grub2-x86_64-efi-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531195" comment="grub2-x86_64-xen-2.02~beta2-115.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595718" comment="grub2-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531191" comment="grub2-i386-pc-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551607" comment="grub2-s390x-emu-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531192" comment="grub2-snapper-plugin-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531193" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531194" comment="grub2-x86_64-efi-2.02~beta2-115.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531195" comment="grub2-x86_64-xen-2.02~beta2-115.56.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15706" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551546" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537579" comment="grub2-powerpc-ieee1275-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595673" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15707" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html" source="SUSE-SU"/>
    <description>
    Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531113" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551546" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537579" comment="grub2-powerpc-ieee1275-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595673" comment="grub2-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531114" comment="grub2-i386-pc-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551547" comment="grub2-s390x-emu-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531115" comment="grub2-snapper-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531116" comment="grub2-systemd-sleep-plugin-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531117" comment="grub2-x86_64-efi-2.02~beta2-115.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531118" comment="grub2-x86_64-xen-2.02~beta2-115.49.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15708" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html" source="SUSE-SU"/>
    <description>
    Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531456" comment="libvirt-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531457" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531458" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531459" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531460" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531461" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531463" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531464" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531465" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531466" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531467" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531468" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531469" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531470" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531471" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531472" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531474" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531475" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531476" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551827" comment="libvirt-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551828" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551829" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551830" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551831" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551832" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551833" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551834" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551835" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551836" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551837" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551838" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551839" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551840" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551841" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551842" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551843" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551844" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551845" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595991" comment="libvirt-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595992" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595993" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595994" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595995" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595996" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595997" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595998" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595999" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596000" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596001" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596002" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596003" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596004" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596005" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596006" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596007" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596008" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596009" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15780" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174186">SUSE bug 1174186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15801" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15801" ref_url="https://www.suse.com/security/cve/CVE-2020-15801" source="SUSE CVE"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The &lt;executable-name&gt;._pth file (e.g., the python._pth file) is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15801/">CVE-2020-15801</cve>
	<bugzilla href="https://bugzilla.suse.com/1174241">SUSE bug 1174241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810" source="SUSE CVE"/>
		<reference ref_id="GHSA-3365-q9qx-f98m" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-3365-q9qx-f98m" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010430.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531269" comment="squid-3.5.21-26.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551672" comment="squid-3.5.21-26.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595766" comment="squid-3.5.21-26.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811" source="SUSE CVE"/>
		<reference ref_id="GHSA-c7p8-xqhm-49wv" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-c7p8-xqhm-49wv" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531269" comment="squid-3.5.21-26.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551672" comment="squid-3.5.21-26.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595766" comment="squid-3.5.21-26.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15852" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15852" ref_url="https://www.suse.com/security/cve/CVE-2020-15852" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15852/">CVE-2020-15852</cve>
	<bugzilla href="https://bugzilla.suse.com/1174063">SUSE bug 1174063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15859" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15859" ref_url="https://www.suse.com/security/cve/CVE-2020-15859" source="SUSE CVE"/>
    <description>
    QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15859/">CVE-2020-15859</cve>
	<bugzilla href="https://bugzilla.suse.com/1174373">SUSE bug 1174373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2OQK3YBZP7LLGFOZF2RYGZC5GDDRHRI6/" source="SUSE-SU"/>
    <description>
    Net-SNMP through 5.7.3 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862</cve>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193875">SUSE bug 1193875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196341">SUSE bug 1196341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009661606" comment="libsnmp30-5.7.3-6.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009661599" comment="libsnmp30-32bit-5.7.3-6.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009661607" comment="net-snmp-5.7.3-6.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009661608" comment="perl-SNMP-5.7.3-6.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009661609" comment="snmp-mibs-5.7.3-6.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15888" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15888" ref_url="https://www.suse.com/security/cve/CVE-2020-15888" source="SUSE CVE"/>
    <description>
    Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15888/">CVE-2020-15888</cve>
	<bugzilla href="https://bugzilla.suse.com/1174367">SUSE bug 1174367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15889" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15889" ref_url="https://www.suse.com/security/cve/CVE-2020-15889" source="SUSE CVE"/>
    <description>
    Lua 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-15889/">CVE-2020-15889</cve>
	<bugzilla href="https://bugzilla.suse.com/1174371">SUSE bug 1174371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15900" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1142-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1146-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00006.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531119" comment="ghostscript-9.52-23.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531120" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551548" comment="ghostscript-9.52-23.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551549" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595674" comment="ghostscript-9.52-23.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595675" comment="ghostscript-x11-9.52-23.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15945" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15945" ref_url="https://www.suse.com/security/cve/CVE-2020-15945" source="SUSE CVE"/>
    <description>
    Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15945/">CVE-2020-15945</cve>
	<bugzilla href="https://bugzilla.suse.com/1174540">SUSE bug 1174540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1705-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1715-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00048.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1732-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1748-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1780-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1785-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<bugzilla href="https://bugzilla.suse.com/1177408">SUSE bug 1177408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531405" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531406" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531407" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551780" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551781" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551782" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595958" comment="MozillaFirefox-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595959" comment="MozillaFirefox-devel-78.4.0-112.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595960" comment="MozillaFirefox-translations-common-78.4.0-112.28.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00055.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1734-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00059.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1744-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531390" comment="ft2demos-2.6.3-7.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531391" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531392" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551768" comment="ft2demos-2.6.3-7.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551769" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551770" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595951" comment="ft2demos-2.6.3-7.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595952" comment="libfreetype6-2.6.3-7.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551770" comment="libfreetype6-32bit-2.6.3-7.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334204" comment="freetype is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QY4HVSGBXI6UWJK3O7NRFLCCCLNP2X5N/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYG4UYLBRBIOTJZ2AK7WUVPNH52MH5CG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVE6T2JL6PI433CTW6BAFC3ROZDJMVMC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3EEK4JCTZ6ZUPXX2R7FXWU4SEGDRFMY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2032-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIZKUW3YM4QYNE4MWWJG47ZVOOWCF43S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2RCNJJSY7TUK4IYHVCSUVEBMIXTWCWM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Side-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178923">SUSE bug 1178923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDMZGVMNSMD6LDMI25NDRZ36NEBSFUHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCC4XLQNOV2QXKDOJAWY34R26577RWDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPQHVY33MWDC273XBHHGBLLDEBESEZOU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVYWJ3IDOZBKDSDO2ORAHQLOXALQJEGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKN6XFMHGSU5TFVYGT3C4SOLOD7IXLXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD5O6DYQGK2VKG37ZUD4DXDFLTSCZFGY/" source="SUSE-SU"/>
    <description>
    Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<bugzilla href="https://bugzilla.suse.com/1179576">SUSE bug 1179576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552008" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552009" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552010" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596161" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596162" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596163" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWW23OVUF57OUUNFOOBPRID66YRCNBPH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R64OG7KLB7DVCRVNOYE46AZ266XQ2F23/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72PBD5PFZIW6WZ7R65QRFVISRDWYC6WO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3236IRHAJFLO3NB3KMMBI5XYZOZFL6S7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJLGW3JAYRVM7Z2KD5X5WM5BVADC7BWN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GKJ4GOW4YBBVDHM3PN6ELURRBVPFRRJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VTDULA6C5LKSUE5KO6PVLSSHYEEXC2I4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOOA23IRO3YBKSJ5CXVBQQVXGGHUF7QV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TAIJROLXEDDASYPE5FNK2OGKN4IAJT5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA7FANKJNI72BRIWJCZ3TLBXXZJS7GLL/" source="SUSE-SU"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181137">SUSE bug 1181137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531977" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531978" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531979" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552164" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552165" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552166" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596426" comment="MozillaFirefox-78.6.1-112.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596427" comment="MozillaFirefox-devel-78.6.1-112.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596428" comment="MozillaFirefox-translations-common-78.6.1-112.42.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092</cve>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16119</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16119" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16119" ref_url="https://www.suse.com/security/cve/CVE-2020-16119" source="SUSE CVE"/>
    <description>
    Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16119/">CVE-2020-16119</cve>
	<bugzilla href="https://bugzilla.suse.com/1177471">SUSE bug 1177471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177742">SUSE bug 1177742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16120</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16120" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef ("ovl: stack file ops"). This was fixed in kernel version 5.8 by commits 56230d9 ("ovl: verify permissions in ovl_path_open()"), 48bd024 ("ovl: switch to mounter creds in readdir") and 05acefb ("ovl: check permission to open real file"). Additionally, commits 130fdbc ("ovl: pass correct flags for opening real directory") and 292f902 ("ovl: call secutiry hook in ovl_real_ioctl()") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da ("ovl: do not fail because of O_NOATIMEi") in kernel 5.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16125" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008065.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZX3UTGQD6BVLNXN2RQDQJAGIEKRWA7A4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2264-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSCPFN6UQDWHTSA3DT4W6QWNTQE4X4HE/" source="SUSE-SU"/>
    <description>
    gdm3 versions before 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can't contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to create a new privileged account.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125</cve>
	<bugzilla href="https://bugzilla.suse.com/1140851">SUSE bug 1140851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531629" comment="gdm-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531632" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531633" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551973" comment="gdm-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551974" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551975" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596120" comment="gdm-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531630" comment="gdm-lang-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531631" comment="gdmflexiserver-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596121" comment="libgdm1-3.10.0.1-54.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596122" comment="typelib-1_0-Gdm-1_0-3.10.0.1-54.17.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16126</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16126" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16126" ref_url="https://www.suse.com/security/cve/CVE-2020-16126" source="SUSE CVE"/>
    <description>
    An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, improperly dropped the ruid, allowing untrusted users to send signals to AccountService, thus stopping it from handling D-Bus messages in a timely fashion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-16126/">CVE-2020-16126</cve>
	<bugzilla href="https://bugzilla.suse.com/1178425">SUSE bug 1178425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338842" comment="accountsservice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16127</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16127" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16127" ref_url="https://www.suse.com/security/cve/CVE-2020-16127" source="SUSE CVE"/>
    <description>
    An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, would perform unbounded read operations on user-controlled ~/.pam_environment files, allowing an infinite loop if /dev/zero is symlinked to this location.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-16127/">CVE-2020-16127</cve>
	<bugzilla href="https://bugzilla.suse.com/1178424">SUSE bug 1178424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338842" comment="accountsservice is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531283" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531284" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531285" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531289" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551682" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551683" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551684" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551686" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537689" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595775" comment="kernel-default-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595776" comment="kernel-default-base-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595777" comment="kernel-default-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551685" comment="kernel-default-man-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531286" comment="kernel-devel-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531287" comment="kernel-macros-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531288" comment="kernel-source-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595778" comment="kernel-syms-4.4.121-92.141.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531290" comment="kgraft-patch-4_4_121-92_141-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16590" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A double free vulnerability exists in the Binary File Descriptor (BFD) (aka libbrd) in GNU Binutils 2.35 in the process_symbol_table, as demonstrated in readelf, via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590</cve>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16591" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A Denial of Service vulnerability exists in the Binary File Descriptor (BFD) in GNU Binutils 2.35 due to an invalid read in process_symbol_table, as demonstrated in readeif.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591</cve>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A use after free issue exists in the Binary File Descriptor (BFD) library (aka libbfd) in GNU Binutils 2.34 in bfd_hash_lookup, as demonstrated in nm-new, that can cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592</cve>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593</cve>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16598" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598</cve>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16599" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35, in _bfd_elf_get_symbol_version_string, as demonstrated in nm-new, that can cause a denial of service via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599</cve>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530990" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530991" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530993" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530994" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530996" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530997" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531000" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551454" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551455" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551456" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551457" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551459" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537488" comment="qemu-ppc-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551461" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595592" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595593" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595594" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595595" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595596" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595597" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:46-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:47-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:48-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:98-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:99-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006464.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0208-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html" source="SUSE-SU"/>
    <description>
    A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522619" comment="libsystemd0-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522620" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531525" comment="libudev-devel-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522621" comment="libudev1-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522622" comment="libudev1-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522623" comment="systemd-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522624" comment="systemd-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522626" comment="systemd-sysvinit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522627" comment="udev-228-150.82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551887" comment="libsystemd0-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551888" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551889" comment="libudev-devel-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551890" comment="libudev1-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551891" comment="libudev1-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551892" comment="systemd-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551893" comment="systemd-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551894" comment="systemd-sysvinit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551895" comment="udev-228-150.82.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596041" comment="libsystemd0-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551888" comment="libsystemd0-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596042" comment="libudev-devel-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596043" comment="libudev1-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551891" comment="libudev1-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596044" comment="systemd-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551893" comment="systemd-32bit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522625" comment="systemd-bash-completion-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596045" comment="systemd-sysvinit-228-150.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596046" comment="udev-228-150.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1720" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0331-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1227-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION", where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<bugzilla href="https://bugzilla.suse.com/1163985">SUSE bug 1163985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522670" comment="libecpg6-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522671" comment="libpq5-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522672" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522673" comment="postgresql10-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531765" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531767" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531768" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531769" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531770" comment="postgresql10-server-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531754" comment="postgresql96-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531755" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531757" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531758" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531759" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531760" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549102" comment="libecpg6-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549103" comment="libpq5-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549104" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549105" comment="postgresql10-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549106" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549107" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549108" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549109" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549110" comment="postgresql10-server-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549089" comment="postgresql96-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549090" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549091" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549092" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549093" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549094" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596236" comment="libecpg6-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596237" comment="libpq5-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549104" comment="libpq5-32bit-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596238" comment="postgresql10-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596239" comment="postgresql10-contrib-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531766" comment="postgresql10-docs-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596240" comment="postgresql10-plperl-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596241" comment="postgresql10-plpython-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596242" comment="postgresql10-pltcl-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596243" comment="postgresql10-server-10.12-1.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596222" comment="postgresql96-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596223" comment="postgresql96-contrib-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531756" comment="postgresql96-docs-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596224" comment="postgresql96-plperl-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596225" comment="postgresql96-plpython-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596226" comment="postgresql96-pltcl-9.6.17-3.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596227" comment="postgresql96-server-9.6.17-3.33.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1733</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1733" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1733" ref_url="https://www.suse.com/security/cve/CVE-2020-1733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
    <description>
    A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 &amp;&amp; mkdir -p &lt;dir&gt;"; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc/&lt;pid&gt;/cmdline'.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1733/">CVE-2020-1733</cve>
	<bugzilla href="https://bugzilla.suse.com/1164140">SUSE bug 1164140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17376</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17376" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17376" ref_url="https://www.suse.com/security/cve/CVE-2020-17376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Guest.migrate in virt/libvirt/guest.py in OpenStack Nova before 19.3.1, 20.x before 20.3.1, and 21.0.0. By performing a soft reboot of an instance that has previously undergone live migration, a user may gain access to destination host devices that share the same paths as host devices previously referenced by the virtual machine on the source host. This can include block devices that map to different Cinder volumes at the destination than at the source. Only deployments allowing host-based connections (for instance, root and ephemeral devices) are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17376/">CVE-2020-17376</cve>
	<bugzilla href="https://bugzilla.suse.com/1175484">SUSE bug 1175484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595843" comment="ansible-2.2.3.0-17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595844" comment="crowbar-core-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595845" comment="crowbar-core-branding-upstream-4.0+git.1600767499.0615a418f-9.69.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595846" comment="crowbar-openstack-4.0+git.1599037255.25b759234-9.74.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595847" comment="grafana-6.7.4-1.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595848" comment="grafana-natel-discrete-panel-0.0.9-1.6.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595849" comment="openstack-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595850" comment="openstack-aodh-api-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595851" comment="openstack-aodh-doc-3.0.5~dev2-2.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595852" comment="openstack-aodh-evaluator-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595853" comment="openstack-aodh-expirer-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595854" comment="openstack-aodh-listener-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595855" comment="openstack-aodh-notifier-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595856" comment="openstack-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595857" comment="openstack-barbican-api-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595858" comment="openstack-barbican-doc-3.0.1~dev9-2.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595859" comment="openstack-barbican-keystone-listener-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595860" comment="openstack-barbican-retry-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595861" comment="openstack-barbican-worker-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595862" comment="openstack-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595863" comment="openstack-cinder-api-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595864" comment="openstack-cinder-backup-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595865" comment="openstack-cinder-doc-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595866" comment="openstack-cinder-scheduler-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595867" comment="openstack-cinder-volume-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595868" comment="openstack-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595869" comment="openstack-gnocchi-api-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595870" comment="openstack-gnocchi-carbonara-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595871" comment="openstack-gnocchi-indexer-sqlalchemy-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595872" comment="openstack-gnocchi-metricd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595873" comment="openstack-gnocchi-statsd-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595874" comment="openstack-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595875" comment="openstack-heat-api-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595876" comment="openstack-heat-api-cfn-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595877" comment="openstack-heat-api-cloudwatch-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595878" comment="openstack-heat-doc-7.0.7~dev10-5.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595879" comment="openstack-heat-engine-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595880" comment="openstack-heat-plugin-heat_docker-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595881" comment="openstack-heat-test-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595882" comment="openstack-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595883" comment="openstack-ironic-api-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595884" comment="openstack-ironic-conductor-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595885" comment="openstack-ironic-doc-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595886" comment="openstack-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595887" comment="openstack-magnum-api-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595888" comment="openstack-magnum-conductor-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595889" comment="openstack-magnum-doc-3.3.2~dev7-14.14.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595890" comment="openstack-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595891" comment="openstack-manila-api-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595892" comment="openstack-manila-data-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595893" comment="openstack-manila-doc-3.0.1~dev30-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595894" comment="openstack-manila-scheduler-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595895" comment="openstack-manila-share-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595896" comment="openstack-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595897" comment="openstack-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595898" comment="openstack-murano-api-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595899" comment="openstack-murano-doc-3.0.1~dev21-7.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595900" comment="openstack-murano-engine-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595901" comment="openstack-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595902" comment="openstack-neutron-dhcp-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595903" comment="openstack-neutron-doc-9.4.2~dev21-7.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595904" comment="openstack-neutron-ha-tool-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595905" comment="openstack-neutron-l3-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595906" comment="openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595907" comment="openstack-neutron-macvtap-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595908" comment="openstack-neutron-metadata-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595909" comment="openstack-neutron-metering-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595910" comment="openstack-neutron-openvswitch-agent-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595911" comment="openstack-neutron-server-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595912" comment="openstack-neutron-vpn-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595913" comment="openstack-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595914" comment="openstack-neutron-vpnaas-doc-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595915" comment="openstack-neutron-vyatta-agent-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595916" comment="openstack-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595917" comment="openstack-nova-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595918" comment="openstack-nova-cells-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595919" comment="openstack-nova-cert-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595920" comment="openstack-nova-compute-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595921" comment="openstack-nova-conductor-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595922" comment="openstack-nova-console-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595923" comment="openstack-nova-consoleauth-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595924" comment="openstack-nova-doc-14.0.11~dev13-4.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595925" comment="openstack-nova-novncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595926" comment="openstack-nova-placement-api-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595927" comment="openstack-nova-scheduler-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595928" comment="openstack-nova-serialproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595929" comment="openstack-nova-vncproxy-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595930" comment="openstack-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595931" comment="openstack-sahara-api-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595932" comment="openstack-sahara-doc-5.0.2~dev3-14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595933" comment="openstack-sahara-engine-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595934" comment="python-Pillow-2.8.1-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595935" comment="python-aodh-3.0.5~dev2-2.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595936" comment="python-barbican-3.0.1~dev9-2.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595937" comment="python-cinder-9.1.5~dev6-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595938" comment="python-gnocchi-3.0.7~dev1-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595939" comment="python-heat-7.0.7~dev10-5.17.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595940" comment="python-ironic-6.2.5~dev3-2.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595941" comment="python-magnum-3.3.2~dev7-14.14.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595942" comment="python-manila-3.0.1~dev30-4.17.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595943" comment="python-monasca-agent-1.10.1~dev4-13.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595944" comment="python-murano-3.0.1~dev21-7.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595945" comment="python-neutron-9.4.2~dev21-7.43.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595946" comment="python-neutron-vpnaas-9.0.1~dev8-5.8.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595947" comment="python-nova-14.0.11~dev13-4.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595948" comment="python-sahara-5.0.2~dev3-14.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595949" comment="ruby2.1-rubygem-crowbar-client-3.9.3-7.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17380" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17380" ref_url="https://www.suse.com/security/cve/CVE-2020-17380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-17380/">CVE-2020-17380</cve>
	<bugzilla href="https://bugzilla.suse.com/1175144">SUSE bug 1175144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182282">SUSE bug 1182282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1746</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1746" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1746" ref_url="https://www.suse.com/security/cve/CVE-2020-1746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the bind_pw in the parameters field. The highest threat from this vulnerability is data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1746/">CVE-2020-1746</cve>
	<bugzilla href="https://bugzilla.suse.com/1165393">SUSE bug 1165393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1747</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1747" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006820.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0507-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0630-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747</cve>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595579" comment="python-PyYAML-5.1.2-26.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17489" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17489" ref_url="https://www.suse.com/security/cve/CVE-2020-17489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1861-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00028.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible for a brief moment upon a logout. (If the password were never shown in cleartext, only the password length is revealed.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17489/">CVE-2020-17489</cve>
	<bugzilla href="https://bugzilla.suse.com/1175155">SUSE bug 1175155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334171" comment="gnome-shell is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009538074" comment="kgraft-patch-4_4_121-92_104-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538073" comment="kgraft-patch-4_4_121-92_109-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538072" comment="kgraft-patch-4_4_121-92_114-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538071" comment="kgraft-patch-4_4_121-92_117-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538070" comment="kgraft-patch-4_4_121-92_120-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538069" comment="kgraft-patch-4_4_121-92_125-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537472" comment="kgraft-patch-4_4_121-92_129-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537680" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537681" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537825" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537943" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538219" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552484" comment="kgraft-patch-4_4_121-92_104-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552483" comment="kgraft-patch-4_4_121-92_109-default-9-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552482" comment="kgraft-patch-4_4_121-92_114-default-8-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552481" comment="kgraft-patch-4_4_121-92_117-default-7-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552480" comment="kgraft-patch-4_4_121-92_120-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552479" comment="kgraft-patch-4_4_121-92_125-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552446" comment="kgraft-patch-4_4_121-92_129-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552462" comment="kgraft-patch-4_4_121-92_135-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552463" comment="kgraft-patch-4_4_121-92_138-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552464" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552478" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552490" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17507" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1452-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1500-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1501-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1530-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1564-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1568-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLSRXEMNPXJ5APSF7LPSU6DIH47XLGMI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt through 5.12.9, and 5.13.x through 5.15.x before 5.15.1. read_xbm_body in gui/image/qxbmhandler.cpp has a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531355" comment="libQt5Concurrent5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531356" comment="libQt5Core5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531357" comment="libQt5DBus5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531358" comment="libQt5Gui5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531359" comment="libQt5Network5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531360" comment="libQt5OpenGL5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531361" comment="libQt5PrintSupport5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531362" comment="libQt5Sql5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531363" comment="libQt5Sql5-mysql-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531364" comment="libQt5Sql5-postgresql-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531365" comment="libQt5Sql5-sqlite-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531366" comment="libQt5Sql5-unixODBC-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531367" comment="libQt5Test5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531368" comment="libQt5Widgets5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531369" comment="libQt5Xml5-5.6.1-17.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551739" comment="libQt5Concurrent5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551740" comment="libQt5Core5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551741" comment="libQt5DBus5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551742" comment="libQt5Gui5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551743" comment="libQt5Network5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551744" comment="libQt5OpenGL5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551745" comment="libQt5PrintSupport5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551746" comment="libQt5Sql5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551747" comment="libQt5Sql5-mysql-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551748" comment="libQt5Sql5-postgresql-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551749" comment="libQt5Sql5-sqlite-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551750" comment="libQt5Sql5-unixODBC-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551751" comment="libQt5Test5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551752" comment="libQt5Widgets5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551753" comment="libQt5Xml5-5.6.1-17.16.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595816" comment="libQt5Concurrent5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595817" comment="libQt5Core5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595818" comment="libQt5DBus5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595819" comment="libQt5Gui5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595820" comment="libQt5Network5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595821" comment="libQt5OpenGL5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595822" comment="libQt5PrintSupport5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595823" comment="libQt5Sql5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595824" comment="libQt5Sql5-mysql-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595825" comment="libQt5Sql5-postgresql-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595826" comment="libQt5Sql5-sqlite-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595827" comment="libQt5Sql5-unixODBC-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595828" comment="libQt5Test5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595829" comment="libQt5Widgets5-5.6.1-17.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595830" comment="libQt5Xml5-5.6.1-17.16.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0467-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00006.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752</cve>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009677624" comment="glibc-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677550" comment="glibc-32bit-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677625" comment="glibc-devel-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677552" comment="glibc-devel-32bit-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677553" comment="glibc-html-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677554" comment="glibc-i18ndata-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677555" comment="glibc-info-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677626" comment="glibc-locale-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677557" comment="glibc-locale-32bit-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677627" comment="glibc-profile-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677559" comment="glibc-profile-32bit-2.22-123.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677628" comment="nscd-2.22-123.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17527</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17527" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17527" ref_url="https://www.suse.com/security/cve/CVE-2020-17527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EA4UBW4STKIATR7VTJBCM2FBGG23C3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/633VPXBTLJ3ECQFTNOKFL457XMKHKZ32/" source="SUSE-SU"/>
    <description>
    While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17527/">CVE-2020-17527</cve>
	<bugzilla href="https://bugzilla.suse.com/1179602">SUSE bug 1179602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180830">SUSE bug 1180830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1753</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1753" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
    <description>
    A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line, not using an environment variable or an input configuration file. This will disclose passwords and tokens from process list and no_log directive from debug module would not have any effect making these secrets being disclosed on stdout and log files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753</cve>
	<bugzilla href="https://bugzilla.suse.com/1166389">SUSE bug 1166389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202018032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-18032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-18032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18032" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0757-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTXOIYNDR72EDFNCBXMS56IU6ZLZOJMB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1651-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GTVENJITKPNO2UD2FTT2WK4SNRNME6PL/" source="SUSE-SU"/>
    <description>
    Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the "lib/common/shapes.c" component.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032</cve>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552308" comment="graphviz-2.28.0-29.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552309" comment="graphviz-gd-2.28.0-29.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552310" comment="graphviz-gnome-2.28.0-29.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552311" comment="graphviz-tcl-2.28.0-29.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202019131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-19131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-19131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19131" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    Buffer Overflow in LibTiff v4.0.10 allows attackers to cause a denial of service via the "invertImage()" function in the component "tiffcrop".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131</cve>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1927" ref_url="https://www.suse.com/security/cve/CVE-2020-1927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1927/">CVE-2020-1927</cve>
	<bugzilla href="https://bugzilla.suse.com/1145738">SUSE bug 1145738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168407">SUSE bug 1168407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530955" comment="apache2-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530957" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530958" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530959" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530960" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551449" comment="apache2-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551450" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551451" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551452" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551453" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595574" comment="apache2-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595575" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595576" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595577" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595578" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1930" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00003.html" source="SUSE-SU"/>
    <description>
    A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious rule configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. With this bug unpatched, exploits can be injected in a number of scenarios including the same privileges as spamd is run which may be elevated though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places. If you cannot upgrade, do not use 3rd party rulesets, do not use sa-compile and do not run spamd as an account with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930</cve>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334005" comment="spamassassin is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531788" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531789" comment="spamassassin-3.4.2-44.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549119" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549120" comment="spamassassin-3.4.2-44.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596275" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596276" comment="spamassassin-3.4.2-44.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1931" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006650.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0446-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00003.html" source="SUSE-SU"/>
    <description>
    A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931</cve>
	<bugzilla href="https://bugzilla.suse.com/1162197">SUSE bug 1162197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162200">SUSE bug 1162200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334005" comment="spamassassin is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531788" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531789" comment="spamassassin-3.4.2-44.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549119" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549120" comment="spamassassin-3.4.2-44.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596275" comment="perl-Mail-SpamAssassin-3.4.2-44.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596276" comment="spamassassin-3.4.2-44.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1934" ref_url="https://www.suse.com/security/cve/CVE-2020-1934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1934/">CVE-2020-1934</cve>
	<bugzilla href="https://bugzilla.suse.com/1168404">SUSE bug 1168404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530955" comment="apache2-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530957" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530958" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530959" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530960" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551449" comment="apache2-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551450" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551451" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551452" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551453" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595574" comment="apache2-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595575" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595576" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595577" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595578" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html" source="SUSE-SU"/>
    <description>
    In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935</cve>
	<bugzilla href="https://bugzilla.suse.com/1164860">SUSE bug 1164860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531293" comment="tomcat-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531294" comment="tomcat-admin-webapps-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531295" comment="tomcat-docs-webapp-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531296" comment="tomcat-el-3_0-api-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531297" comment="tomcat-javadoc-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531298" comment="tomcat-jsp-2_3-api-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531299" comment="tomcat-lib-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531300" comment="tomcat-servlet-3_1-api-8.0.53-29.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531301" comment="tomcat-webapps-8.0.53-29.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006719.html" source="SUSE-SU"/>
		<reference ref_id="TID000019606" ref_url="https://www.suse.com/support/kb/doc/?id=000019606" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0345-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0597-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html" source="SUSE-SU"/>
    <description>
    When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<bugzilla href="https://bugzilla.suse.com/1164692">SUSE bug 1164692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169066">SUSE bug 1169066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530955" comment="apache2-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530957" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530958" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530959" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530960" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551449" comment="apache2-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551450" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551451" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551452" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551453" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595574" comment="apache2-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530956" comment="apache2-doc-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595575" comment="apache2-example-pages-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595576" comment="apache2-prefork-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595577" comment="apache2-utils-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595578" comment="apache2-worker-2.4.23-29.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531774" comment="tomcat-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531775" comment="tomcat-admin-webapps-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531776" comment="tomcat-docs-webapp-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531777" comment="tomcat-el-3_0-api-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531778" comment="tomcat-javadoc-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531779" comment="tomcat-jsp-2_3-api-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531780" comment="tomcat-lib-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531781" comment="tomcat-servlet-3_1-api-8.0.53-29.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531782" comment="tomcat-webapps-8.0.53-29.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1946" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0551-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXHYC7MWI2M6Y32ROZZBS5HOZOAF2HAN/" source="SUSE-SU"/>
    <description>
    In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946</cve>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186513">SUSE bug 1186513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334005" comment="spamassassin is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552206" comment="perl-Mail-SpamAssassin-3.4.5-44.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552207" comment="spamassassin-3.4.5-44.13.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1955</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1955" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1955" ref_url="https://www.suse.com/security/cve/CVE-2020-1955" source="SUSE CVE"/>
    <description>
    CouchDB version 3.0.0 shipped with a new configuration setting that governs access control to the entire database server called `require_valid_user_except_for_up`. It was meant as an extension to the long standing setting `require_valid_user`, which in turn requires that any and all requests to CouchDB will have to be made with valid credentials, effectively forbidding any anonymous requests. The new `require_valid_user_except_for_up` is an off-by-default setting that was meant to allow requiring valid credentials for all endpoints except for the `/_up` endpoint. However, the implementation of this made an error that lead to not enforcing credentials on any endpoint, when enabled. CouchDB versions 3.0.1[1] and 3.1.0[2] fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1955/">CVE-2020-1955</cve>
	<bugzilla href="https://bugzilla.suse.com/1171890">SUSE bug 1171890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339431" comment="couchdb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202019667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-19667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-19667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19667" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow and unconditional jump in ReadXPMImage in coders/xpm.c in ImageMagick 7.0.10-7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0933-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0945-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html" source="SUSE-SU"/>
    <description>
    Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967</cve>
	<bugzilla href="https://bugzilla.suse.com/1169407">SUSE bug 1169407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1968" ref_url="https://www.suse.com/security/cve/CVE-2020-1968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007427.html" source="SUSE-SU"/>
		<reference ref_id="TID000019697" ref_url="https://www.suse.com/support/kb/doc/?id=000019697" source="SUSE-SU"/>
    <description>
    The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1968/">CVE-2020-1968</cve>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177243">SUSE bug 1177243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMYUDIGG7RM42AIH4Q3WW4VZGFRAPLQ7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YDLYD3JFZSOPG5DPXOHFTMZTUOLPOK5J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DET3T3KBOIXDZC2VZ5XGHXVGQ54LOAI5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2269-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGJECGZC6A7C36WKBWL3FKK6U7IGO4OK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
    <description>
    The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196179">SUSE bug 1196179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199303">SUSE bug 1199303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531646" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531647" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531648" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531649" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531650" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531651" comment="openssl-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551982" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551983" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551984" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551985" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551986" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551987" comment="openssl-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596137" comment="libopenssl-devel-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596138" comment="libopenssl1_0_0-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551984" comment="libopenssl1_0_0-32bit-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596139" comment="libopenssl1_0_0-hmac-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551986" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596140" comment="openssl-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531652" comment="openssl-doc-1.0.2j-60.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0636-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0756-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00001.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530990" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530991" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530993" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530994" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530996" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530997" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531000" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551454" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551455" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551456" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551457" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551459" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537488" comment="qemu-ppc-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551461" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595592" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595593" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595594" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595595" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595596" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595597" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21529" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline function in genepic.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21530" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a segmentation fault in the read_objects function in read.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21531" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_index function in gencgm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21532" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a global buffer overflow in the setfigfont function in genepic.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21533" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21534" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a global buffer overflow in the get_line function in read.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21535" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    fig2dev 3.2.7b contains a segmentation fault in the gencgm_start function in gencgm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21674</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21674" ref_url="https://www.suse.com/security/cve/CVE-2020-21674" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-21674/">CVE-2020-21674</cve>
	<bugzilla href="https://bugzilla.suse.com/1177934">SUSE bug 1177934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334081" comment="libarchive is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21680" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow in the put_arrow() component in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21681" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    A global buffer overflow in the set_color component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21682" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    A global buffer overflow in the set_fill component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202021683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-21683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-21683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24303</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24303" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24303" ref_url="https://www.suse.com/security/cve/CVE-2020-24303" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
    <description>
    Grafana before 7.1.0-beta 1 allows XSS via a query alias for the ElasticSearch datasource.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24303/">CVE-2020-24303</cve>
	<bugzilla href="https://bugzilla.suse.com/1178243">SUSE bug 1178243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596123" comment="crowbar-openstack-4.0+git.1604938545.30c10db18-9.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596124" comment="grafana-6.7.4-1.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596125" comment="influxdb-1.2.4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596126" comment="python-urllib3-1.16-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24330" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24330" ref_url="https://www.suse.com/security/cve/CVE-2020-24330" source="SUSE CVE"/>
    <description>
    An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24330/">CVE-2020-24330</cve>
	<bugzilla href="https://bugzilla.suse.com/1164472">SUSE bug 1164472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334638" comment="trousers is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24331" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24331" ref_url="https://www.suse.com/security/cve/CVE-2020-24331" source="SUSE CVE"/>
    <description>
    An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24331/">CVE-2020-24331</cve>
	<bugzilla href="https://bugzilla.suse.com/1164472">SUSE bug 1164472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334638" comment="trousers is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24332" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24332" ref_url="https://www.suse.com/security/cve/CVE-2020-24332" source="SUSE CVE"/>
    <description>
    An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24332/">CVE-2020-24332</cve>
	<bugzilla href="https://bugzilla.suse.com/1164472">SUSE bug 1164472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334638" comment="trousers is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24342" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24342" ref_url="https://www.suse.com/security/cve/CVE-2020-24342" source="SUSE CVE"/>
    <description>
    Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24342/">CVE-2020-24342</cve>
	<bugzilla href="https://bugzilla.suse.com/1175339">SUSE bug 1175339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24352" ref_url="https://www.suse.com/security/cve/CVE-2020-24352" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24352/">CVE-2020-24352</cve>
	<bugzilla href="https://bugzilla.suse.com/1175370">SUSE bug 1175370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24369" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24369" ref_url="https://www.suse.com/security/cve/CVE-2020-24369" source="SUSE CVE"/>
    <description>
    ldebug.c in Lua 5.4.0 attempts to access debug information via the line hook of a stripped function, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24369/">CVE-2020-24369</cve>
	<bugzilla href="https://bugzilla.suse.com/1175447">SUSE bug 1175447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370</cve>
	<bugzilla href="https://bugzilla.suse.com/1175448">SUSE bug 1175448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24371" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371</cve>
	<bugzilla href="https://bugzilla.suse.com/1175449">SUSE bug 1175449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334180" comment="lua is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334181" comment="lua51 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008153.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLBPVUTTVOKCDH7OSMVSVIQEI7TKHOMX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0072-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUR6FYAW4F7DJJAFNZ7FNLNEQNDU6ZEZ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Dovecot before 2.3.13. By using IMAP IDLE, an authenticated attacker can trigger unhibernation via attacker-controlled parameters, leading to access to other users' email messages (and path disclosure).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386</cve>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531828" comment="dovecot22-2.2.31-19.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531829" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531830" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531831" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552056" comment="dovecot22-2.2.31-19.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552057" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552058" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552059" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596316" comment="dovecot22-2.2.31-19.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596317" comment="dovecot22-backend-mysql-2.2.31-19.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596318" comment="dovecot22-backend-pgsql-2.2.31-19.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596319" comment="dovecot22-backend-sqlite-2.2.31-19.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24394" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24394" ref_url="https://www.suse.com/security/cve/CVE-2020-24394" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24394/">CVE-2020-24394</cve>
	<bugzilla href="https://bugzilla.suse.com/1175518">SUSE bug 1175518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175992">SUSE bug 1175992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489</cve>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192359">SUSE bug 1192359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24490</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177727">SUSE bug 1177727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511</cve>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512</cve>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513</cve>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539041" comment="ucode-intel-20210525-13.90.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24583</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24583" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24583" ref_url="https://www.suse.com/security/cve/CVE-2020-24583" source="SUSE CVE"/>
    <description>
    An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24583/">CVE-2020-24583</cve>
	<bugzilla href="https://bugzilla.suse.com/1175784">SUSE bug 1175784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24584</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24584" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24584" ref_url="https://www.suse.com/security/cve/CVE-2020-24584" source="SUSE CVE"/>
    <description>
    An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-24584/">CVE-2020-24584</cve>
	<bugzilla href="https://bugzilla.suse.com/1175784">SUSE bug 1175784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199701">SUSE bug 1199701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24606" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606" source="SUSE CVE"/>
		<reference ref_id="GHSA-vvj7-xjgq-g2jg" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-vvj7-xjgq-g2jg" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1346-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1369-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00017.html" source="SUSE-SU"/>
    <description>
    Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531269" comment="squid-3.5.21-26.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551672" comment="squid-3.5.21-26.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595766" comment="squid-3.5.21-26.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24741" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24741" ref_url="https://www.suse.com/security/cve/CVE-2020-24741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009527.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-0570. Reason: This candidate is a duplicate of CVE-2020-0570. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2020-0570 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24741/">CVE-2020-24741</cve>
	<bugzilla href="https://bugzilla.suse.com/1189408">SUSE bug 1189408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634372" comment="libQt5Concurrent5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634373" comment="libQt5Core5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634374" comment="libQt5DBus5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634375" comment="libQt5Gui5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634376" comment="libQt5Network5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634377" comment="libQt5OpenGL5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634378" comment="libQt5PrintSupport5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634379" comment="libQt5Sql5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634380" comment="libQt5Sql5-mysql-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634381" comment="libQt5Sql5-postgresql-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634382" comment="libQt5Sql5-sqlite-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634383" comment="libQt5Sql5-unixODBC-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634384" comment="libQt5Test5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634385" comment="libQt5Widgets5-5.6.1-17.21.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634386" comment="libQt5Xml5-5.6.1-17.21.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25084" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084</cve>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25097</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25097" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097" source="SUSE CVE"/>
		<reference ref_id="GHSA-jvf6-h9gj-pmj6" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-jvf6-h9gj-pmj6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010444.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0879-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E33JWP5CXQF3EVKKDRECX4457F2ILQP2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR56WJLXVU76BKBW5SFENNPKF5TJSS5K/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097</cve>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333991" comment="squid is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192356">SUSE bug 1192356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552467" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552466" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552468" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552465" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552464" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537828" comment="kgraft-patch-4_4_121-92_125-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537827" comment="kgraft-patch-4_4_121-92_129-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537829" comment="kgraft-patch-4_4_121-92_135-default-3-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537826" comment="kgraft-patch-4_4_121-92_138-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537825" comment="kgraft-patch-4_4_121-92_141-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25219" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1676-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html" source="SUSE-SU"/>
    <description>
    url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531384" comment="libproxy1-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531385" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531386" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531387" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531388" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531389" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551762" comment="libproxy1-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551763" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551764" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551765" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551766" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551767" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595839" comment="libproxy1-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551763" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595840" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551765" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595841" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595842" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25221</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25221" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25221" ref_url="https://www.suse.com/security/cve/CVE-2020-25221" source="SUSE CVE"/>
    <description>
    get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25221/">CVE-2020-25221</cve>
	<bugzilla href="https://bugzilla.suse.com/1176286">SUSE bug 1176286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn't be able to affect these registers, experience shows that it's very common for devices to have out-of-spec "backdoor" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec ("backdoor") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it's better to assume that it does.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599</cve>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn't get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00008.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn't acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531370" comment="xen-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531371" comment="xen-doc-html-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531372" comment="xen-libs-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531373" comment="xen-libs-32bit-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531374" comment="xen-tools-4.7.6_10-43.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531375" comment="xen-tools-domU-4.7.6_10-43.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25613" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RPFN4SV4JCJUNCQC4PQZ6VEJN63VN2FS/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613</cve>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334050" comment="ruby is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657553" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657554" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657555" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25623</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25623" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25623" ref_url="https://www.suse.com/security/cve/CVE-2020-25623" source="SUSE CVE"/>
    <description>
    Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-25623/">CVE-2020-25623</cve>
	<bugzilla href="https://bugzilla.suse.com/1177354">SUSE bug 1177354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339432" comment="erlang is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25624" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624</cve>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    hw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD list has a loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625</cve>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531930" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552128" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538177" comment="grub2-powerpc-ieee1275-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596396" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1777-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1778-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html" source="SUSE-SU"/>
    <description>
    A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531456" comment="libvirt-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531457" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531458" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531459" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531460" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531461" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531463" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531464" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531465" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531466" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531467" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531468" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531469" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531470" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531471" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531472" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531474" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531475" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531476" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551827" comment="libvirt-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551828" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551829" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551830" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551831" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551832" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551833" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551834" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551835" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551836" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551837" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551838" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551839" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551840" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551841" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551842" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551843" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551844" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551845" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595991" comment="libvirt-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595992" comment="libvirt-client-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595993" comment="libvirt-daemon-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595994" comment="libvirt-daemon-config-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595995" comment="libvirt-daemon-config-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595996" comment="libvirt-daemon-driver-interface-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531462" comment="libvirt-daemon-driver-libxl-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595997" comment="libvirt-daemon-driver-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595998" comment="libvirt-daemon-driver-network-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595999" comment="libvirt-daemon-driver-nodedev-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596000" comment="libvirt-daemon-driver-nwfilter-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596001" comment="libvirt-daemon-driver-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596002" comment="libvirt-daemon-driver-secret-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596003" comment="libvirt-daemon-driver-storage-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596004" comment="libvirt-daemon-hooks-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596005" comment="libvirt-daemon-lxc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596006" comment="libvirt-daemon-qemu-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531473" comment="libvirt-daemon-xen-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596007" comment="libvirt-doc-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596008" comment="libvirt-lock-sanlock-2.0.0-27.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596009" comment="libvirt-nss-2.0.0-27.64.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25639</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25639" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25641</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25641" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25645" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552473" comment="kgraft-patch-4_4_121-92_125-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552472" comment="kgraft-patch-4_4_121-92_129-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552471" comment="kgraft-patch-4_4_121-92_135-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552470" comment="kgraft-patch-4_4_121-92_138-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552469" comment="kgraft-patch-4_4_121-92_141-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552478" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552490" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537899" comment="kgraft-patch-4_4_121-92_125-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537898" comment="kgraft-patch-4_4_121-92_129-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537897" comment="kgraft-patch-4_4_121-92_135-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537896" comment="kgraft-patch-4_4_121-92_138-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537895" comment="kgraft-patch-4_4_121-92_141-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537943" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538219" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. During USB device initialization, descriptors are read with very little bounds checking and assumes the USB device is providing sane values. If properly exploited, an attacker could trigger memory corruption leading to arbitrary code execution allowing a bypass of the Secure Boot mechanism. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531930" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552128" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538177" comment="grub2-powerpc-ieee1275-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596396" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648</cve>
	<bugzilla href="https://bugzilla.suse.com/1177917">SUSE bug 1177917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334629" comment="mozilla-nss is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633044" comment="libfreebl3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633046" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633048" comment="libsoftokn3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633050" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633052" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633054" comment="mozilla-nss-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633056" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633058" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633060" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25650</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25650" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25650" ref_url="https://www.suse.com/security/cve/CVE-2020-25650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU4MAHRZUXACEK4PTFMFULLO5A7INQM5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25650/">CVE-2020-25650</cve>
	<bugzilla href="https://bugzilla.suse.com/1177780">SUSE bug 1177780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334606" comment="spice-vdagent is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25651</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25651" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25651" ref_url="https://www.suse.com/security/cve/CVE-2020-25651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU4MAHRZUXACEK4PTFMFULLO5A7INQM5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25651/">CVE-2020-25651</cve>
	<bugzilla href="https://bugzilla.suse.com/1177781">SUSE bug 1177781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334606" comment="spice-vdagent is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25652</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25652" ref_url="https://www.suse.com/security/cve/CVE-2020-25652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU4MAHRZUXACEK4PTFMFULLO5A7INQM5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the spice-vdagentd daemon, where it did not properly handle client connections that can be established via the UNIX domain socket in `/run/spice-vdagentd/spice-vdagent-sock`. Any unprivileged local guest user could use this flaw to prevent legitimate agents from connecting to the spice-vdagentd daemon, resulting in a denial of service. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and prior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25652/">CVE-2020-25652</cve>
	<bugzilla href="https://bugzilla.suse.com/1177782">SUSE bug 1177782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334606" comment="spice-vdagent is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25653</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25653" ref_url="https://www.suse.com/security/cve/CVE-2020-25653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU4MAHRZUXACEK4PTFMFULLO5A7INQM5/" source="SUSE-SU"/>
    <description>
    A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections. This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting in a denial of service or information leakage from the host. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25653/">CVE-2020-25653</cve>
	<bugzilla href="https://bugzilla.suse.com/1177783">SUSE bug 1177783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334606" comment="spice-vdagent is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HSP2RSDCASVO7P7KBUV5GDZ6SYI6L7I/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531634" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531635" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551976" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551977" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596132" comment="python-cryptography-2.1.4-7.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596133" comment="python3-cryptography-2.1.4-7.31.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25660</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25660" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25660" ref_url="https://www.suse.com/security/cve/CVE-2020-25660" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3473-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYSOMAWYA2XHVHZ46F322TCUWNWMG4GU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWM64T57Y7IVDW2JWVLZSHPUKMYGWGAH/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25660/">CVE-2020-25660</cve>
	<bugzilla href="https://bugzilla.suse.com/1177843">SUSE bug 1177843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334046" comment="ceph is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25661</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25661" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25661" ref_url="https://www.suse.com/security/cve/CVE-2020-25661" source="SUSE CVE"/>
    <description>
    A Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel's Bluetooth implementation handled L2CAP packets with A2MP CID. This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25661/">CVE-2020-25661</cve>
	<bugzilla href="https://bugzilla.suse.com/1178397">SUSE bug 1178397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25662</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25662" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25662" ref_url="https://www.suse.com/security/cve/CVE-2020-25662" source="SUSE CVE"/>
    <description>
    A Red Hat only CVE-2020-12352 regression issue was found in the way the Linux kernel's Bluetooth stack implementation handled the initialization of stack memory when handling certain AMP packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25662/">CVE-2020-25662</cve>
	<bugzilla href="https://bugzilla.suse.com/1178398">SUSE bug 1178398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25663</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25663" ref_url="https://www.suse.com/security/cve/CVE-2020-25663" source="SUSE CVE"/>
    <description>
    A call to ConformPixelInfo() in the SetImageAlphaChannel() routine of /MagickCore/channel.c caused a subsequent heap-use-after-free or heap-buffer-overflow READ when GetPixelRed() or GetPixelBlue() was called. This could occur if an attacker is able to submit a malicious image file to be processed by ImageMagick and could lead to denial of service. It likely would not lead to anything further because the memory is used as pixel data and not e.g. a function pointer. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25663/">CVE-2020-25663</cve>
	<bugzilla href="https://bugzilla.suse.com/1179200">SUSE bug 1179200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25664" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In WriteOnePNGImage() of the PNG coder at coders/png.c, an improper call to AcquireVirtualMemory() and memset() allows for an out-of-bounds write later when PopShortPixel() from MagickCore/quantum-private.h is called. The patch fixes the calls by adding 256 to rowbytes. An attacker who is able to supply a specially crafted image could affect availability with a low impact to data integrity. This flaw affects ImageMagick versions prior to 6.9.10-68 and 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25665" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    The PALM image coder at coders/palm.c makes an improper call to AcquireQuantumMemory() in routine WritePALMImage() because it needs to be offset by 256. This can cause a out-of-bounds read later on in the routine. The patch adds 256 to bytes_per_row in the call to AcquireQuantumMemory(). This could cause impact to reliability. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25666" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    There are 4 places in HistogramCompare() in MagickCore/histogram.c where an integer overflow is possible during simple math calculations. This occurs in the rgb values and `count` value for a color. The patch uses casts to `ssize_t` type for these calculations, instead of `int`. This flaw could impact application reliability in the event that ImageMagick processes a crafted input file. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25667</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25667" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25667" ref_url="https://www.suse.com/security/cve/CVE-2020-25667" source="SUSE CVE"/>
    <description>
    TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25667/">CVE-2020-25667</cve>
	<bugzilla href="https://bugzilla.suse.com/1179218">SUSE bug 1179218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25668" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552474" comment="kgraft-patch-4_4_121-92_129-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552475" comment="kgraft-patch-4_4_121-92_135-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552476" comment="kgraft-patch-4_4_121-92_138-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552477" comment="kgraft-patch-4_4_121-92_141-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552478" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537939" comment="kgraft-patch-4_4_121-92_129-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537940" comment="kgraft-patch-4_4_121-92_135-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537941" comment="kgraft-patch-4_4_121-92_138-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537942" comment="kgraft-patch-4_4_121-92_141-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537943" comment="kgraft-patch-4_4_121-92_146-default-2-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25669" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194680">SUSE bug 1194680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25671" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25672" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A memory leak vulnerability was found in Linux kernel in llcp_sock_connect
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25675" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25676" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In CatromWeights(), MeshInterpolate(), InterpolatePixelChannel(), InterpolatePixelChannels(), and InterpolatePixelInfo(), which are all functions in /MagickCore/pixel.c, there were multiple unconstrained pixel offset calculations which were being used with the floor() function. These calculations produced undefined behavior in the form of out-of-range and integer overflows, as identified by UndefinedBehaviorSanitizer. These instances of undefined behavior could be triggered by an attacker who is able to supply a crafted input file to be processed by ImageMagick. These issues could impact application availability or potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25677</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25677" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25677" ref_url="https://www.suse.com/security/cve/CVE-2020-25677" source="SUSE CVE"/>
    <description>
    A flaw was found in Ceph-ansible v4.0.41 where it creates an /etc/ceph/iscsi-gateway.conf with insecure default permissions. This flaw allows any user on the system to read sensitive information within this file. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-25677/">CVE-2020-25677</cve>
	<bugzilla href="https://bugzilla.suse.com/1177843">SUSE bug 1177843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334046" comment="ceph is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25681" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552052" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596312" comment="dnsmasq-2.78-18.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596313" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25682" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552052" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596312" comment="dnsmasq-2.78-18.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596313" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25683" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552052" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596312" comment="dnsmasq-2.78-18.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596313" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25684" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552052" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596312" comment="dnsmasq-2.78-18.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596313" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25685" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552052" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596312" comment="dnsmasq-2.78-18.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596313" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25686" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the "Birthday Attacks" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552052" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596312" comment="dnsmasq-2.78-18.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596313" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25687" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008226.html" source="SUSE-SU"/>
		<reference ref_id="TID000019824" ref_url="https://www.suse.com/support/kb/doc/?id=000019824" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GY5KV2WHBZG4XCWVKZOU4DFCHSMBT5KV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B57K75B7OP43O3RNF2Q6TTLL4DZ6KPE/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531824" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552052" comment="dnsmasq-2.78-18.15.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596312" comment="dnsmasq-2.78-18.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596313" comment="dnsmasq-utils-2.78-18.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007764.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3VC65YBN4WMTACGDQE7SGD2ZBAJBKS3O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1920-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5OV5ACOVPOXU3LAYTZRU6RI5XRK4L6W/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531530" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531531" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531532" comment="openldap2-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531533" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531534" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531536" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531530" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531531" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531532" comment="openldap2-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531533" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531534" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551900" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551901" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551902" comment="openldap2-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551903" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551904" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551905" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596051" comment="libldap-2_4-2-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551901" comment="libldap-2_4-2-32bit-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596052" comment="openldap2-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596053" comment="openldap2-back-meta-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596054" comment="openldap2-client-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531535" comment="openldap2-doc-2.4.41-18.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596055" comment="openldap2-ppolicy-check-password-1.2-18.77.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531841" comment="libecpg6-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531842" comment="libpq5-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552066" comment="libecpg6-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552067" comment="libpq5-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552068" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551942" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551943" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551944" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551945" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551946" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551947" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551948" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551949" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551950" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551951" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551952" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551953" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596337" comment="libecpg6-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596338" comment="libpq5-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552068" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596090" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596091" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596092" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596093" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596094" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596095" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596096" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596097" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596098" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596099" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596100" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596101" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531841" comment="libecpg6-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531842" comment="libpq5-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552066" comment="libecpg6-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552067" comment="libpq5-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552068" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551942" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551943" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551944" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551945" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551946" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551947" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551948" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551949" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551950" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551951" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551952" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551953" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596337" comment="libecpg6-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596338" comment="libpq5-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552068" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596090" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596091" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596092" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596093" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596094" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596095" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596096" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596097" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596098" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596099" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596100" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596101" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POYD3IAUBQT7S6ZQCAA74X6IBDUAZLMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6VHIJFOQOSKIFV42ZSMOTHSA5DC24KC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2028-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L5R6PO3JMYKK4HQNK7WZVASGEFWHGSV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKSTAWI2GC3DK7OVNMCBYUONUED4FQJM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQQBNVIVAXDZCJPFZE43ZEZ3C6DSC3WG/" source="SUSE-SU"/>
    <description>
    A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating system account running psql. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179870">SUSE bug 1179870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531841" comment="libecpg6-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531842" comment="libpq5-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531843" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531592" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531593" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531595" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531596" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531597" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531598" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531599" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531600" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531602" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531603" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531604" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531605" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552066" comment="libecpg6-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552067" comment="libpq5-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552068" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551942" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551943" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551944" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551945" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551946" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551947" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551948" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551949" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551950" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551951" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551952" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551953" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596337" comment="libecpg6-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596338" comment="libpq5-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552068" comment="libpq5-32bit-13.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531844" comment="postgresql-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531845" comment="postgresql-contrib-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531846" comment="postgresql-docs-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531847" comment="postgresql-plperl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531848" comment="postgresql-plpython-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531849" comment="postgresql-pltcl-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531850" comment="postgresql-server-13-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596090" comment="postgresql10-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596091" comment="postgresql10-contrib-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531594" comment="postgresql10-docs-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596092" comment="postgresql10-plperl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596093" comment="postgresql10-plpython-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596094" comment="postgresql10-pltcl-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596095" comment="postgresql10-server-10.15-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596096" comment="postgresql96-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596097" comment="postgresql96-contrib-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531601" comment="postgresql96-docs-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596098" comment="postgresql96-plperl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596099" comment="postgresql96-plpython-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596100" comment="postgresql96-pltcl-9.6.20-6.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596101" comment="postgresql96-server-9.6.20-6.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25704</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25705" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705" source="SUSE CVE"/>
		<reference ref_id="SADDNS-BLOG" ref_url="https://www.suse.com/c/suse-releases-fix-for-saddns-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="TID000019786" ref_url="https://www.suse.com/support/kb/doc/?id=000019786" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552474" comment="kgraft-patch-4_4_121-92_129-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552475" comment="kgraft-patch-4_4_121-92_135-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552476" comment="kgraft-patch-4_4_121-92_138-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552477" comment="kgraft-patch-4_4_121-92_141-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537939" comment="kgraft-patch-4_4_121-92_129-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537940" comment="kgraft-patch-4_4_121-92_135-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537941" comment="kgraft-patch-4_4_121-92_138-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537942" comment="kgraft-patch-4_4_121-92_141-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25708" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007885.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RE5HT53OIOVH6753LHKM4XRKGN6GM3K6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WZC6Q36DSCUZTCIKGNLVYAKNWAL4N775/" source="SUSE-SU"/>
    <description>
    A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531620" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531621" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551964" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551965" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596111" comment="libvncclient0-0.9.9-17.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596112" comment="libvncserver0-0.9.9-17.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334130" comment="LibVNCServer is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25709</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334211" comment="openldap2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25710</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334211" comment="openldap2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007897.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HP4SY5GPVDDNTXYVZ6YALLHT7B5RVDBJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LJUVPABDGLSKQJMNPJUJBYOQTIDGD67K/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531622" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531623" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551966" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551967" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596113" comment="xorg-x11-server-7.6_1.18.3-76.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596114" comment="xorg-x11-server-extra-7.6_1.18.3-76.37.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="TID000020533" ref_url="https://www.suse.com/support/kb/doc/?id=000020533" source="SUSE-SU"/>
		<reference ref_id="TID000020593" ref_url="https://www.suse.com/support/kb/doc/?id=000020593" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6W4QSQCTUGSIZCTRT4FGJNMRLZDUZS6Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36K5HNX67LYX5XOVQRL3MSIC5YSJ5M5W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ZU5FWTEOBTHR7WNP3HEICT3NJTBNV2V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJMHDQABDOOUGOYNHF2X56XA57GXYYSN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3674-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYEHJEQQ7LEL2T775B7QLR3IFR6LJGLZ/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192505">SUSE bug 1192505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192601">SUSE bug 1192601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192849">SUSE bug 1192849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193011">SUSE bug 1193011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194049">SUSE bug 1194049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194307">SUSE bug 1194307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195815">SUSE bug 1195815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196344">SUSE bug 1196344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196717">SUSE bug 1196717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196920">SUSE bug 1196920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655206" comment="libdcerpc-binding0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655207" comment="libdcerpc-binding0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655208" comment="libdcerpc0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655209" comment="libdcerpc0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655210" comment="libndr-krb5pac0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655211" comment="libndr-krb5pac0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655212" comment="libndr-nbt0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655213" comment="libndr-nbt0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655214" comment="libndr-standard0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655215" comment="libndr-standard0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655216" comment="libndr0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655217" comment="libndr0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655218" comment="libnetapi0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655219" comment="libnetapi0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655220" comment="libsamba-credentials0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655221" comment="libsamba-credentials0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655222" comment="libsamba-errors0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655223" comment="libsamba-errors0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655224" comment="libsamba-hostconfig0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655225" comment="libsamba-hostconfig0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655226" comment="libsamba-passdb0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655227" comment="libsamba-passdb0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655228" comment="libsamba-util0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655229" comment="libsamba-util0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655230" comment="libsamdb0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655231" comment="libsamdb0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655232" comment="libsmbclient0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655233" comment="libsmbclient0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655234" comment="libsmbconf0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655235" comment="libsmbconf0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655236" comment="libsmbldap0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655237" comment="libsmbldap0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655238" comment="libtevent-util0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655239" comment="libtevent-util0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655240" comment="libwbclient0-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655241" comment="libwbclient0-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655242" comment="samba-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655243" comment="samba-client-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655244" comment="samba-client-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655245" comment="samba-doc-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655246" comment="samba-libs-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655247" comment="samba-libs-32bit-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655248" comment="samba-winbind-4.4.2-38.45.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655249" comment="samba-winbind-32bit-4.4.2-38.45.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25723" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25725</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25725" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25725" ref_url="https://www.suse.com/security/cve/CVE-2020-25725" source="SUSE CVE"/>
    <description>
    In Xpdf 4.02, SplashOutputDev::endType3Char(GfxState *state) SplashOutputDev.cc:3079 is trying to use the freed `t3GlyphStack-&gt;cache`, which causes an `heap-use-after-free` problem. The codes of a previous fix for nested Type 3 characters wasn't correctly handling the case where a Type 3 char referred to another char in the same Type 3 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25725/">CVE-2020-25725</cve>
	<bugzilla href="https://bugzilla.suse.com/1179026">SUSE bug 1179026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2574</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0289-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574</cve>
	<bugzilla href="https://bugzilla.suse.com/1161085">SUSE bug 1161085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162388">SUSE bug 1162388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596277" comment="mariadb-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596278" comment="mariadb-client-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596279" comment="mariadb-errormessages-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596280" comment="mariadb-galera-10.2.31-16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596281" comment="mariadb-tools-10.2.31-16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549095" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549096" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549097" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549098" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549059" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542713" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549060" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549086" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542735" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549013" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549014" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549015" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549016" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596228" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596229" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596230" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596231" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596184" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596185" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596186" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596217" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596218" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595779" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595780" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595781" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595782" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25862</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25862" ref_url="https://www.suse.com/security/cve/CVE-2020-25862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25862/">CVE-2020-25862</cve>
	<bugzilla href="https://bugzilla.suse.com/1176909">SUSE bug 1176909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25863</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25863" ref_url="https://www.suse.com/security/cve/CVE-2020-25863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the MIME Multipart dissector could crash. This was addressed in epan/dissectors/packet-multipart.c by correcting the deallocation of invalid MIME parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25863/">CVE-2020-25863</cve>
	<bugzilla href="https://bugzilla.suse.com/1176908">SUSE bug 1176908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25866</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25866" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25866" ref_url="https://www.suse.com/security/cve/CVE-2020-25866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1878-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1882-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00038.html" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25866/">CVE-2020-25866</cve>
	<bugzilla href="https://bugzilla.suse.com/1176910">SUSE bug 1176910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549095" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549096" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549097" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549098" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549013" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549014" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549015" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549016" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596228" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596229" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596230" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596231" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595779" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595780" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595781" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595782" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549095" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549096" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549097" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549098" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549059" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542713" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549060" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549086" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542735" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549013" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549014" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549015" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549016" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596228" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596229" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596230" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596231" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596184" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596185" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596186" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596217" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596218" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595779" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595780" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595781" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595782" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549095" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549096" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549097" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549098" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549013" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549014" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549015" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549016" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596228" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596229" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596230" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596231" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595779" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595780" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595781" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595782" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549095" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549096" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549097" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549098" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549059" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542713" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549060" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549086" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542735" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549013" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549014" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549015" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549016" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596228" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596229" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596230" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596231" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596184" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596185" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596186" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596217" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596218" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595779" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595780" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595781" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595782" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26088" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26116</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008345.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1859-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQJZUPSO3MIAIYJBX2VTZETYQSLUJQPN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192361">SUSE bug 1192361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596373" comment="python-urllib3-1.16-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26117" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007542.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1666-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00024.html" source="SUSE-SU"/>
    <description>
    In rfb/CSecurityTLS.cxx and rfb/CSecurityTLS.java in TigerVNC before 1.11.0, viewers mishandle TLS certificate exceptions. They store the certificates as authorities, meaning that the owner of a certificate could impersonate any server after a client had added an exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531381" comment="libXvnc1-1.6.0-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531382" comment="tigervnc-1.6.0-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531383" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551759" comment="libXvnc1-1.6.0-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551760" comment="tigervnc-1.6.0-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551761" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595836" comment="libXvnc1-1.6.0-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595837" comment="tigervnc-1.6.0-27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595838" comment="xorg-x11-Xvnc-1.6.0-27.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3Y5UAWOTOHQRGI2VNSOUDC2SOAHGJLAH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VS7J7DOJY26YMLJIUVHRH7UQFVLGBWIQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6CAFSANHH6TU43VSKAJ5JA2EMHSREMKP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOZI5ZFPFR2BACIE74HUJWDXC2ZWXNGD/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631062" comment="python3-urllib3-1.25.10-3.31.2 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596123" comment="crowbar-openstack-4.0+git.1604938545.30c10db18-9.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596124" comment="grafana-6.7.4-1.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596125" comment="influxdb-1.2.4-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596126" comment="python-urllib3-1.16-3.12.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26154" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1676-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1680-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00033.html" source="SUSE-SU"/>
    <description>
    url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531384" comment="libproxy1-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531385" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531386" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531387" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531388" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531389" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551762" comment="libproxy1-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551763" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551764" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551765" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551766" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551767" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595839" comment="libproxy1-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551763" comment="libproxy1-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595840" comment="libproxy1-config-gnome3-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551765" comment="libproxy1-config-gnome3-32bit-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595841" comment="libproxy1-networkmanager-0.4.13-18.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595842" comment="libproxy1-pacrunner-webkit-0.4.13-18.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26247</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26247" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26247" ref_url="https://www.suse.com/security/cve/CVE-2020-26247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLEJCRYIVSTKE34ZJIXITKLZOOKOAMWQ/" source="SUSE-SU"/>
    <description>
    Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26247/">CVE-2020-26247</cve>
	<bugzilla href="https://bugzilla.suse.com/1180507">SUSE bug 1180507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596336" comment="ruby2.1-rubygem-nokogiri-1.6.1-5.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26418</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26418" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26418" ref_url="https://www.suse.com/security/cve/CVE-2020-26418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Memory leak in Kafka protocol dissector in Wireshark 3.4.0 and 3.2.0 to 3.2.8 allows denial of service via packet injection or crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26418/">CVE-2020-26418</cve>
	<bugzilla href="https://bugzilla.suse.com/1179930">SUSE bug 1179930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26419</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26419" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26419" ref_url="https://www.suse.com/security/cve/CVE-2020-26419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Memory leak in the dissection engine in Wireshark 3.4.0 allows denial of service via packet injection or crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26419/">CVE-2020-26419</cve>
	<bugzilla href="https://bugzilla.suse.com/1179931">SUSE bug 1179931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26422</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26422" ref_url="https://www.suse.com/security/cve/CVE-2020-26422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Buffer overflow in QUIC dissector in Wireshark 3.4.0 to 3.4.1 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26422/">CVE-2020-26422</cve>
	<bugzilla href="https://bugzilla.suse.com/1180232">SUSE bug 1180232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0113-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549095" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549096" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549097" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549098" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549013" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549014" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549015" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549016" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596228" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596229" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596230" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596231" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595626" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595627" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595628" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595779" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595780" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595781" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595782" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26555</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555" source="SUSE CVE"/>
    <description>
    Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555</cve>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26556</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26556" ref_url="https://www.suse.com/security/cve/CVE-2020-26556" source="SUSE CVE"/>
    <description>
    Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, able to conduct a successful brute-force attack on an insufficiently random AuthValue before the provisioning procedure times out, to complete authentication by leveraging Malleable Commitment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26556/">CVE-2020-26556</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26557</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26557" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26557" ref_url="https://www.suse.com/security/cve/CVE-2020-26557" source="SUSE CVE"/>
    <description>
    Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (without possession of the AuthValue used in the provisioning protocol) to determine the AuthValue via a brute-force attack (unless the AuthValue is sufficiently random and changed each time).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26557/">CVE-2020-26557</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26559</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26559" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26559" ref_url="https://www.suse.com/security/cve/CVE-2020-26559" source="SUSE CVE"/>
    <description>
    Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (participating in the provisioning protocol) to identify the AuthValue used given the Provisioner’s public key, and the confirmation number and nonce provided by the provisioning device. This could permit a device without the AuthValue to complete provisioning without brute-forcing the AuthValue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26559/">CVE-2020-26559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26560</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26560" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26560" ref_url="https://www.suse.com/security/cve/CVE-2020-26560" source="SUSE CVE"/>
    <description>
    Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, reflecting the authentication evidence from a Provisioner, to complete authentication without possessing the AuthValue, and potentially acquire a NetKey and AppKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26560/">CVE-2020-26560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26575</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26575" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26575" ref_url="https://www.suse.com/security/cve/CVE-2020-26575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007794.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5P4NEYKGIIBUWVHMTUJCIGGFEUIWBFC7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DRKIYJDZYHG7KXDJ3T5Y3UU4KEC2QGD/" source="SUSE-SU"/>
    <description>
    In Wireshark through 3.2.7, the Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop. This was addressed in epan/dissectors/packet-fbzero.c by correcting the implementation of offset advancement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26575/">CVE-2020-26575</cve>
	<bugzilla href="https://bugzilla.suse.com/1177406">SUSE bug 1177406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178290">SUSE bug 1178290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0231-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200231-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162972">SUSE bug 1162972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522665" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531761" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531762" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522666" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531724" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531726" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531727" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531748" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531750" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522598" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531291" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531292" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522599" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549095" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549096" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549097" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549098" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549059" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542713" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549060" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549086" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542735" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549013" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549014" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549015" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549016" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596228" comment="java-1_7_0-openjdk-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596229" comment="java-1_7_0-openjdk-demo-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596230" comment="java-1_7_0-openjdk-devel-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596231" comment="java-1_7_0-openjdk-headless-1.7.0.251-43.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596184" comment="java-1_7_1-ibm-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531725" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596185" comment="java-1_7_1-ibm-devel-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596186" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531728" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.60-38.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596217" comment="java-1_8_0-ibm-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531749" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596218" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531751" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-30.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595779" comment="java-1_8_0-openjdk-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595780" comment="java-1_8_0-openjdk-demo-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595781" comment="java-1_8_0-openjdk-devel-1.8.0.242-27.41.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595782" comment="java-1_8_0-openjdk-headless-1.8.0.242-27.41.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26682</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26682" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26682" ref_url="https://www.suse.com/security/cve/CVE-2020-26682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008546.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0472-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGQ6Q6RCVRPDWCXGFBVQDFSYE4QKBYMU/" source="SUSE-SU"/>
    <description>
    In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26682/">CVE-2020-26682</cve>
	<bugzilla href="https://bugzilla.suse.com/1177862">SUSE bug 1177862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339189" comment="libass is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AMXWTXD2SXOW4LKFZ4XU2QOQYXVDMOL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6SUAYN7JWUE2A26Q6GJ5JMMXTKYHZSL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMGXD75QZYXYUNEY2A43RG5HRUA6C7BT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3SMMQGPABLYJBCFGYFKI43SSCXS244L/" source="SUSE-SU"/>
    <description>
    In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox &lt; 82.0.3, Firefox ESR &lt; 78.4.1, and Thunderbird &lt; 78.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178611">SUSE bug 1178611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531537" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531538" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531539" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551906" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551907" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551908" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596056" comment="MozillaFirefox-78.4.1-112.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596057" comment="MozillaFirefox-devel-78.4.1-112.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596058" comment="MozillaFirefox-translations-common-78.4.1-112.32.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26952</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26952" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26952" ref_url="https://www.suse.com/security/cve/CVE-2020-26952" source="SUSE CVE"/>
    <description>
    Incorrect bookkeeping of functions inlined during JIT compilation could have led to memory corruption and a potentially exploitable crash when handling out-of-memory errors. This vulnerability affects Firefox &lt; 83.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-26952/">CVE-2020-26952</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    In some cases, removing HTML elements during sanitization would keep existing SVG event handlers and therefore lead to XSS. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    During browser shutdown, reference decrementing could have occured on a previously freed object, resulting in a use-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    When DNS over HTTPS is in use, it intentionally filters RFC1918 and related IP ranges from the responses as these do not make sense coming from a DoH resolver. However when an IPv4 address was mapped through IPv6, these addresses were erroneously let through, leading to a potential DNS Rebinding attack. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26962</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26962" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26962" ref_url="https://www.suse.com/security/cve/CVE-2020-26962" source="SUSE CVE"/>
    <description>
    Cross-origin iframes that contained a login form could have been recognized by the login autofill service, and populated. This could have been used in clickjacking attacks, as well as be read across partitions in dynamic first party isolation. This vulnerability affects Firefox &lt; 83.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26962/">CVE-2020-26962</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26963</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26963" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26963" ref_url="https://www.suse.com/security/cve/CVE-2020-26963" source="SUSE CVE"/>
    <description>
    Repeated calls to the history and location interfaces could have been used to hang the browser. This was addressed by introducing rate-limiting to these API calls. This vulnerability affects Firefox &lt; 83.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26963/">CVE-2020-26963</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26967</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26967" ref_url="https://www.suse.com/security/cve/CVE-2020-26967" source="SUSE CVE"/>
    <description>
    When listening for page changes with a Mutation Observer, a malicious web page could confuse Firefox Screenshots into interacting with elements other than those that it injected into the page. This would lead to internal errors and unexpected behavior in the Screenshots code. This vulnerability affects Firefox &lt; 83.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26967/">CVE-2020-26967</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 82 and Firefox ESR 78.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 83, Firefox ESR &lt; 78.5, and Thunderbird &lt; 78.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531617" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531618" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531619" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551961" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551962" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551963" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596108" comment="MozillaFirefox-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596109" comment="MozillaFirefox-devel-78.5.0-112.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596110" comment="MozillaFirefox-translations-common-78.5.0-112.36.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26969</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26969" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26969" ref_url="https://www.suse.com/security/cve/CVE-2020-26969" source="SUSE CVE"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 82. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 83.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26969/">CVE-2020-26969</cve>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552008" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552009" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552010" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596161" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596162" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596163" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552008" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552009" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552010" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596161" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596162" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596163" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552008" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552009" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552010" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596161" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596162" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596163" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. This vulnerability affects Firefox &lt; 84.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552074" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552075" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552076" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596344" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596345" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596346" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552008" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552009" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552010" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596161" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596162" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596163" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27068" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-119770583
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27152</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27152" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27152" ref_url="https://www.suse.com/security/cve/CVE-2020-27152" source="SUSE CVE"/>
    <description>
    An issue was discovered in ioapic_lazy_update_eoi in arch/x86/kvm/ioapic.c in the Linux kernel before 5.9.2. It has an infinite loop related to improper interaction between a resampler and edge triggering, aka CID-77377064c3a9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27152/">CVE-2020-27152</cve>
	<bugzilla href="https://bugzilla.suse.com/1177785">SUSE bug 1177785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27153</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27153" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27153" ref_url="https://www.suse.com/security/cve/CVE-2020-27153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1876-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1880-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00036.html" source="SUSE-SU"/>
    <description>
    In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-27153/">CVE-2020-27153</cve>
	<bugzilla href="https://bugzilla.suse.com/1177895">SUSE bug 1177895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334185" comment="bluez is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27194</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27194" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27194" ref_url="https://www.suse.com/security/cve/CVE-2020-27194" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-27194/">CVE-2020-27194</cve>
	<bugzilla href="https://bugzilla.suse.com/1177889">SUSE bug 1177889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27221" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008363.html" source="SUSE-SU"/>
    <description>
    In Eclipse OpenJ9 up to and including version 0.23, there is potential for a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531909" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531911" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531912" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531920" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531922" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552114" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543223" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552115" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552122" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009543254" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596380" comment="java-1_7_1-ibm-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531910" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596381" comment="java-1_7_1-ibm-devel-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596382" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531913" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.80-38.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596389" comment="java-1_8_0-ibm-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531921" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596390" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-30.81.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531923" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-30.81.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2752</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551473" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551474" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551475" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551476" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595610" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595611" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595612" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595613" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595626" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595627" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595628" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27560</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27560" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1884-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1927-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AGPRC7JUH4MGYAWLWPLVA5TLIICGY75B/" source="SUSE-SU"/>
    <description>
    ImageMagick 7.0.10-34 allows Division by Zero in OptimizeLayerFrames in MagickCore/layer.c, which may cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560</cve>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334300" comment="ImageMagick is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551473" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551474" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551475" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551476" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595610" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595611" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595612" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595613" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595626" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595627" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595628" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2760</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2760" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2760" ref_url="https://www.suse.com/security/cve/CVE-2020-2760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2760/">CVE-2020-2760</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27616</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27616" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27616" ref_url="https://www.suse.com/security/cve/CVE-2020-27616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27616/">CVE-2020-27616</cve>
	<bugzilla href="https://bugzilla.suse.com/1178400">SUSE bug 1178400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27617" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617</cve>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619</cve>
	<bugzilla href="https://bugzilla.suse.com/1178009">SUSE bug 1178009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180254">SUSE bug 1180254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193386">SUSE bug 1193386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552303" comment="libpython3_4m1_0-3.4.10-25.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552304" comment="python3-3.4.10-25.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552305" comment="python3-base-3.4.10-25.71.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552306" comment="python3-curses-3.4.10-25.71.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27661</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27661" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27661" ref_url="https://www.suse.com/security/cve/CVE-2020-27661" source="SUSE CVE"/>
    <description>
    A divide-by-zero issue was found in dwc2_handle_packet in hw/usb/hcd-dwc2.c in the hcd-dwc2 USB host controller emulation of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27661/">CVE-2020-27661</cve>
	<bugzilla href="https://bugzilla.suse.com/1178069">SUSE bug 1178069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531640" comment="xen-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531641" comment="xen-doc-html-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531642" comment="xen-libs-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531643" comment="xen-libs-32bit-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531644" comment="xen-tools-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531645" comment="xen-tools-domU-4.7.6_12-43.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531640" comment="xen-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531641" comment="xen-doc-html-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531642" comment="xen-libs-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531643" comment="xen-libs-32bit-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531644" comment="xen-tools-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531645" comment="xen-tools-domU-4.7.6_12-43.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531640" comment="xen-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531641" comment="xen-doc-html-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531642" comment="xen-libs-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531643" comment="xen-libs-32bit-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531644" comment="xen-tools-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531645" comment="xen-tools-domU-4.7.6_12-43.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00075.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-11/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531640" comment="xen-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531641" comment="xen-doc-html-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531642" comment="xen-libs-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531643" comment="xen-libs-32bit-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531644" comment="xen-tools-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531645" comment="xen-tools-domU-4.7.6_12-43.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27675</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27675" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27675" ref_url="https://www.suse.com/security/cve/CVE-2020-27675" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27675/">CVE-2020-27675</cve>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333995" comment="kernel-source is affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551473" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551474" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551475" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551476" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595610" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595611" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595612" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595613" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531930" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552128" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538177" comment="grub2-powerpc-ieee1275-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596396" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27750" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27751" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum-export.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long` as well as a shift exponent that is too large for 64-bit type. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27752" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27753" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27754" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be within the proper bounds in the event of an overflow. This flaw affects ImageMagick versions prior to 6.9.10-69 and 7.0.8-69.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27755" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27756</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27756" ref_url="https://www.suse.com/security/cve/CVE-2020-27756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in addition to the function `PerceptibleReciprocal()` in order to prevent such divide-by-zero conditions. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27756/">CVE-2020-27756</cve>
	<bugzilla href="https://bugzilla.suse.com/1179221">SUSE bug 1179221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A floating point math calculation in ScaleAnyToQuantum() of /MagickCore/quantum-private.h could lead to undefined behavior in the form of a value outside the range of type unsigned long long. The flaw could be triggered by a crafted input file under certain conditions when it is processed by ImageMagick. Red Hat Product Security marked this as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27758</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27758" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27758" ref_url="https://www.suse.com/security/cve/CVE-2020-27758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27758/">CVE-2020-27758</cve>
	<bugzilla href="https://bugzilla.suse.com/1179276">SUSE bug 1179276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27759" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In IntensityCompare() of /MagickCore/quantize.c, a double value was being casted to int and returned, which in some cases caused a value outside the range of type `int` to be returned. The flaw could be triggered by a crafted input file under certain conditions when processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27760" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In `GammaImage()` of /MagickCore/enhance.c, depending on the `gamma` value, it's possible to trigger a divide-by-zero condition when a crafted input file is processed by ImageMagick. This could lead to an impact to application availability. The patch uses the `PerceptibleReciprocal()` to prevent the divide-by-zero from occurring. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product Security marked the Severity as Low because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to ImageMagick 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27762" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/hdr.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to ImageMagick 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27763" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27764" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In /MagickCore/statistic.c, there are several areas in ApplyEvaluateOperator() where a size_t cast should have been a ssize_t cast, which causes out-of-range values under some circumstances when a crafted input file is processed by ImageMagick. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was shown in this case. This flaw affects ImageMagick versions prior to 6.9.10-69.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27765" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27766" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-69.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In ImageMagick, there is an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27770" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27771" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27772" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned int`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27774" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27775" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27776" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMIDOKTR355FMU6NNJAZYI3VSQVSKBVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HHVDAUG64ZZXILYBSYFLJC2X5Q3ZAHD/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531837" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531838" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531839" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531840" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552062" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552063" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552064" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552065" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596332" comment="ImageMagick-config-6-SUSE-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596333" comment="ImageMagick-config-6-upstream-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596334" comment="libMagickCore-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596335" comment="libMagickWand-6_Q16-1-6.8.8.1-71.154.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub's memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531930" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552128" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538177" comment="grub2-powerpc-ieee1275-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596396" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27780</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27780" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27780" ref_url="https://www.suse.com/security/cve/CVE-2020-27780" source="SUSE CVE"/>
    <description>
    A flaw was found in Linux-Pam in versions prior to 1.5.1 in the way it handle empty passwords for non-existing users. When the user doesn't exist PAM try to authenticate with root and in the case of an empty password it successfully authenticate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27780/">CVE-2020-27780</cve>
	<bugzilla href="https://bugzilla.suse.com/1179166">SUSE bug 1179166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334112" comment="pam is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27786" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552494" comment="kgraft-patch-4_4_121-92_129-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552493" comment="kgraft-patch-4_4_121-92_135-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531992" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552492" comment="kgraft-patch-4_4_121-92_141-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552491" comment="kgraft-patch-4_4_121-92_146-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552490" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538223" comment="kgraft-patch-4_4_121-92_129-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538222" comment="kgraft-patch-4_4_121-92_135-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538224" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538221" comment="kgraft-patch-4_4_121-92_141-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538220" comment="kgraft-patch-4_4_121-92_146-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538219" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531992" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551473" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551474" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551475" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551476" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595610" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595611" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595612" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595613" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595626" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595627" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595628" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27814</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27814" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27814" ref_url="https://www.suse.com/security/cve/CVE-2020-27814" source="SUSE CVE"/>
    <description>
    A heap-buffer overflow was found in the way openjpeg2 handled certain PNG format files. An attacker could use this flaw to cause an application crash or in some cases execute arbitrary code with the permission of the user running such an application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27814/">CVE-2020-27814</cve>
	<bugzilla href="https://bugzilla.suse.com/1179594">SUSE bug 1179594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27815</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179458">SUSE bug 1179458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27823" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27827" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008270.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBHQUGIHMXL62CWXH7ZTZ3HUSFCNG7DW/" source="SUSE-SU"/>
    <description>
    A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827</cve>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531859" comment="openvswitch-2.5.11-25.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531860" comment="openvswitch-dpdk-2.5.11-25.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531861" comment="openvswitch-dpdk-switch-2.5.11-25.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531862" comment="openvswitch-switch-2.5.11-25.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552077" comment="openvswitch-2.5.11-25.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531860" comment="openvswitch-dpdk-2.5.11-25.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531861" comment="openvswitch-dpdk-switch-2.5.11-25.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552078" comment="openvswitch-switch-2.5.11-25.26.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596347" comment="openvswitch-2.5.11-25.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531860" comment="openvswitch-dpdk-2.5.11-25.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531861" comment="openvswitch-dpdk-switch-2.5.11-25.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596348" comment="openvswitch-switch-2.5.11-25.26.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27828" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ZF7VRY24X2GVC7MCP6MQKQBRKCSJ2A/" source="SUSE-SU"/>
    <description>
    There's a flaw in jasper's jpc encoder in versions prior to 2.0.23. Crafted input provided to jasper by an attacker could cause an arbitrary out-of-bounds write. This could potentially affect data confidentiality, integrity, or application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531900" comment="libjasper1-1.900.14-195.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531901" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552106" comment="libjasper1-1.900.14-195.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552107" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596374" comment="libjasper1-1.900.14-195.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552107" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27829</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27829" ref_url="https://www.suse.com/security/cve/CVE-2020-27829" source="SUSE CVE"/>
    <description>
    A heap based buffer overflow in coders/tiff.c may result in program crash and denial of service in ImageMagick before 7.0.10-45.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-27829/">CVE-2020-27829</cve>
	<bugzilla href="https://bugzilla.suse.com/1181697">SUSE bug 1181697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27830</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27830" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27835</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
    <description>
    A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27837</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27837" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27837" ref_url="https://www.suse.com/security/cve/CVE-2020-27837" source="SUSE CVE"/>
    <description>
    A flaw was found in GDM in versions prior to 3.38.2.1. A race condition in the handling of session shutdown makes it possible to bypass the lock screen for a user that has autologin enabled, accessing their session without authentication. This is similar to CVE-2017-12164, but requires more difficult conditions to exploit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27837/">CVE-2020-27837</cve>
	<bugzilla href="https://bugzilla.suse.com/1180206">SUSE bug 1180206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334029" comment="gdm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27840</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27840" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0469-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLNA72I7E6KKMIQOHXHYRPDYGMW5KH4K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJGQFNCBDL3CAZODHIFOKKWU3XGKLEKA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANLZ3MSWRYNRTSO7FPC7CORZ4WAS3YKE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
    <description>
    A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<bugzilla href="https://bugzilla.suse.com/1183572">SUSE bug 1183572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27841</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27841" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27841" ref_url="https://www.suse.com/security/cve/CVE-2020-27841" source="SUSE CVE"/>
    <description>
    There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by the openjpeg encoder, this could cause an out-of-bounds read. The greatest impact from this flaw is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27841/">CVE-2020-27841</cve>
	<bugzilla href="https://bugzilla.suse.com/1180042">SUSE bug 1180042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27843</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27843" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27843" ref_url="https://www.suse.com/security/cve/CVE-2020-27843" source="SUSE CVE"/>
    <description>
    A flaw was found in OpenJPEG in versions prior to 2.4.0. This flaw allows an attacker to provide specially crafted input to the conversion or encoding functionality, causing an out-of-bounds read. The highest threat from this vulnerability is system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27843/">CVE-2020-27843</cve>
	<bugzilla href="https://bugzilla.suse.com/1180044">SUSE bug 1180044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27844</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27844" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27844" ref_url="https://www.suse.com/security/cve/CVE-2020-27844" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S66YPMC4VLRMKQGSTL3XFAVYDCVH7ADY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0401-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5HQTB6OX4JN5OFGWK6KZIS4UD7TGBXF/" source="SUSE-SU"/>
    <description>
    A flaw was found in openjpeg's src/lib/openjp2/t2.c in versions prior to 2.4.0. This flaw allows an attacker to provide crafted input to openjpeg during conversion and encoding, causing an out-of-bounds write. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27844/">CVE-2020-27844</cve>
	<bugzilla href="https://bugzilla.suse.com/1180045">SUSE bug 1180045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182960">SUSE bug 1182960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183514">SUSE bug 1183514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334004" comment="openjpeg2 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27845</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27845" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27845" ref_url="https://www.suse.com/security/cve/CVE-2020-27845" source="SUSE CVE"/>
    <description>
    There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions prior to 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conversion/encoding functionality, they could cause an out-of-bounds read. The highest impact of this flaw is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27845/">CVE-2020-27845</cve>
	<bugzilla href="https://bugzilla.suse.com/1180046">SUSE bug 1180046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551473" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551474" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551475" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551476" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595610" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595611" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595612" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595613" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595626" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595627" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595628" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551473" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551474" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551475" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551476" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595610" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595611" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595612" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595613" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595626" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595627" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595628" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28030</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28030" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28030" ref_url="https://www.suse.com/security/cve/CVE-2020-28030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007794.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5P4NEYKGIIBUWVHMTUJCIGGFEUIWBFC7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DRKIYJDZYHG7KXDJ3T5Y3UU4KEC2QGD/" source="SUSE-SU"/>
    <description>
    In Wireshark 3.2.0 to 3.2.7, the GQUIC dissector could crash. This was addressed in epan/dissectors/packet-gquic.c by correcting the implementation of offset advancement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28030/">CVE-2020-28030</cve>
	<bugzilla href="https://bugzilla.suse.com/1178291">SUSE bug 1178291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551473" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551474" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551475" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551476" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595610" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595611" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595612" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595613" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595626" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595627" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595628" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2812</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2812" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2814</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2814" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2814" ref_url="https://www.suse.com/security/cve/CVE-2020-2814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007915.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0870-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.6.47 and prior, 5.7.28 and prior and 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2814/">CVE-2020-2814</cve>
	<bugzilla href="https://bugzilla.suse.com/1171550">SUSE bug 1171550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596127" comment="mariadb-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596128" comment="mariadb-client-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596129" comment="mariadb-errormessages-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596130" comment="mariadb-galera-10.2.36-19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596131" comment="mariadb-tools-10.2.36-19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2CMUQ7G43OCIKDTP2ILYUJLUD37RPPA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6PZTATZYCUQYKCJ6QBS7JJHNWPXIDNL/" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531584" comment="krb5-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531585" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531586" comment="krb5-client-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531587" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531588" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531589" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531590" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531591" comment="krb5-server-1.12.5-40.40.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551934" comment="krb5-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551935" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551936" comment="krb5-client-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551937" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551938" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551939" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551940" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551941" comment="krb5-server-1.12.5-40.40.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596083" comment="krb5-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551935" comment="krb5-32bit-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596084" comment="krb5-client-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596085" comment="krb5-doc-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596086" comment="krb5-plugin-kdb-ldap-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596087" comment="krb5-plugin-preauth-otp-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596088" comment="krb5-plugin-preauth-pkinit-1.12.5-40.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596089" comment="krb5-server-1.12.5-40.40.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0757-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0800-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0841-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531017" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531018" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531019" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531020" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531038" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531040" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531041" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531043" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531045" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531047" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531048" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531049" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531050" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551473" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551474" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551475" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551476" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551490" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542540" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551491" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551492" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009542541" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551493" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551494" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551495" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551496" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595610" comment="java-1_7_0-openjdk-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595611" comment="java-1_7_0-openjdk-demo-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595612" comment="java-1_7_0-openjdk-devel-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595613" comment="java-1_7_0-openjdk-headless-1.7.0.261-43.38.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595626" comment="java-1_7_1-ibm-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531039" comment="java-1_7_1-ibm-alsa-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595627" comment="java-1_7_1-ibm-devel-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595628" comment="java-1_7_1-ibm-jdbc-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531042" comment="java-1_7_1-ibm-plugin-1.7.1_sr4.65-38.53.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595629" comment="java-1_8_0-ibm-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531044" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595630" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531046" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-30.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595631" comment="java-1_8_0-openjdk-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595632" comment="java-1_8_0-openjdk-demo-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595633" comment="java-1_8_0-openjdk-devel-1.8.0.252-27.45.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595634" comment="java-1_8_0-openjdk-headless-1.8.0.252-27.45.6 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NHV4EWRFFS4A6PZIGBZQ2KTQFUWF52LY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4ZVHN5CZEV5SEFNJFHEB2GTN3V6YCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531640" comment="xen-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531641" comment="xen-doc-html-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531642" comment="xen-libs-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531643" comment="xen-libs-32bit-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531644" comment="xen-tools-4.7.6_12-43.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531645" comment="xen-tools-domU-4.7.6_12-43.70.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552494" comment="kgraft-patch-4_4_121-92_129-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552493" comment="kgraft-patch-4_4_121-92_135-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531992" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552492" comment="kgraft-patch-4_4_121-92_141-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552491" comment="kgraft-patch-4_4_121-92_146-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552490" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552136" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552137" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552138" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552140" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538223" comment="kgraft-patch-4_4_121-92_129-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538222" comment="kgraft-patch-4_4_121-92_135-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538224" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538221" comment="kgraft-patch-4_4_121-92_141-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538220" comment="kgraft-patch-4_4_121-92_146-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538219" comment="kgraft-patch-4_4_121-92_149-default-2-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538188" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596402" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596403" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596404" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596405" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531992" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28493</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28493" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008377.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493</cve>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530079" comment="python-Jinja2-2.8-22.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28588</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28588" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28588" ref_url="https://www.suse.com/security/cve/CVE-2020-28588" source="SUSE CVE"/>
    <description>
    An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28588/">CVE-2020-28588</cve>
	<bugzilla href="https://bugzilla.suse.com/1182806">SUSE bug 1182806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28896" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007921.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDM45YGFPRPSTCQV554CQT4P74X6HNGI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDEIF6HZ3PYQV7UDRJUX7FTYYPTVCBVB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2141-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RYE5B2QAZHGR4OUGARLIROGTKWRSGYPL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SO2YEN5NDIBWU3W774SS3UQQJQHS3Y2L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LP3RDP5YFHOILA5LLZD7YQXIDYSTUJ2A/" source="SUSE-SU"/>
    <description>
    Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an unencrypted connection, or to a machine-in-the-middle.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531639" comment="mutt-1.10.1-55.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551981" comment="mutt-1.10.1-55.18.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596136" comment="mutt-1.10.1-55.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28915" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28916</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28916" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916</cve>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28941</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28941" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29129</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29129" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<bugzilla href="https://bugzilla.suse.com/1179466">SUSE bug 1179466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179484">SUSE bug 1179484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29130" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0943-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010763.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JBLIOF4HVH74MTJYI7P5QNH2RNAYWU5E/" source="SUSE-SU"/>
    <description>
    slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29361</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010181.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1611-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZHKPKPZEQIHCU2R54QWFT3X2C4JOWBT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWY3OJFF4O6KAVNTWISEXMD7X5Y2XL6I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339494" comment="p11-kit is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29362</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29362" ref_url="https://www.suse.com/security/cve/CVE-2020-29362" source="SUSE CVE"/>
    <description>
    An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29362/">CVE-2020-29362</cve>
	<bugzilla href="https://bugzilla.suse.com/1180065">SUSE bug 1180065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339494" comment="p11-kit is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29363</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29363" ref_url="https://www.suse.com/security/cve/CVE-2020-29363" source="SUSE CVE"/>
    <description>
    An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29363/">CVE-2020-29363</cve>
	<bugzilla href="https://bugzilla.suse.com/1180066">SUSE bug 1180066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339494" comment="p11-kit is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29368</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29369</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29369" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179646">SUSE bug 1179646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182109">SUSE bug 1182109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29370</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179648">SUSE bug 1179648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29371</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29371" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29372</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29372" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29372" ref_url="https://www.suse.com/security/cve/CVE-2020-29372" source="SUSE CVE"/>
    <description>
    An issue was discovered in do_madvise in mm/madvise.c in the Linux kernel before 5.6.8. There is a race condition between coredump operations and the IORING_OP_MADVISE implementation, aka CID-bc0c4d1e176e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29372/">CVE-2020-29372</cve>
	<bugzilla href="https://bugzilla.suse.com/1179433">SUSE bug 1179433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29373</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29373" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29385</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29385" ref_url="https://www.suse.com/security/cve/CVE-2020-29385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008233.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z47MEXBMS3R7XMG63LBJMBIYUX3ZTEJI/" source="SUSE-SU"/>
    <description>
    GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c-&gt;self_code equals 10, self-&gt;code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self-&gt;code_table[11].extends to c, which will give the value of 10. This will make the loop run infinitely. This bug can, for example, be triggered by calling this function with a GIF image with LZW compression that is crafted in a special way.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29385/">CVE-2020-29385</cve>
	<bugzilla href="https://bugzilla.suse.com/1180393">SUSE bug 1180393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333994" comment="gdk-pixbuf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29443" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443</cve>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29479</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29479" ref_url="https://www.suse.com/security/cve/CVE-2020-29479" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.14.x. In the Ocaml xenstored implementation, the internal representation of the tree has special cases for the root node, because this node has no parent. Unfortunately, permissions were not checked for certain operations on the root node. Unprivileged guests can get and modify permissions, list, and delete the root node. (Deleting the whole xenstore tree is a host-wide denial of service.) Achieving xenstore write access is also possible. All systems using oxenstored are vulnerable. Building and using oxenstored is the default in the upstream Xen distribution, if the Ocaml compiler is available. Systems using C xenstored are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-29479/">CVE-2020-29479</cve>
	<bugzilla href="https://bugzilla.suse.com/1179511">SUSE bug 1179511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests' devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/&lt;domid&gt; are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29482</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29482" ref_url="https://www.suse.com/security/cve/CVE-2020-29482" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.14.x. A guest may access xenstore paths via absolute paths containing a full pathname, or via a relative path, which implicitly includes /local/domain/$DOMID for their own domain id. Management tools must access paths in guests' namespaces, necessarily using absolute paths. oxenstored imposes a pathname limit that is applied solely to the relative or absolute path specified by the client. Therefore, a guest can create paths in its own namespace which are too long for management tools to access. Depending on the toolstack in use, a malicious guest administrator might cause some management tools and debugging operations to fail. For example, a guest administrator can cause "xenstore-ls -r" to fail. However, a guest administrator cannot prevent the host administrator from tearing down the domain. All systems using oxenstored are vulnerable. Building and using oxenstored is the default in the upstream Xen distribution, if the Ocaml compiler is available. Systems using C xenstored are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29482/">CVE-2020-29482</cve>
	<bugzilla href="https://bugzilla.suse.com/1179500">SUSE bug 1179500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored's internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest's memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29485</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29485" ref_url="https://www.suse.com/security/cve/CVE-2020-29485" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen 4.6 through 4.14.x. When acting upon a guest XS_RESET_WATCHES request, not all tracking information is freed. A guest can cause unbounded memory usage in oxenstored. This can lead to a system-wide DoS. Only systems using the Ocaml Xenstored implementation are vulnerable. Systems using the C Xenstored implementation are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29485/">CVE-2020-29485</cve>
	<bugzilla href="https://bugzilla.suse.com/1179504">SUSE bug 1179504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29486</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29486" ref_url="https://www.suse.com/security/cve/CVE-2020-29486" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Nodes in xenstore have an ownership. In oxenstored, a owner could give a node away. However, node ownership has quota implications. Any guest can run another guest out of quota, or create an unbounded number of nodes owned by dom0, thus running xenstored out of memory A malicious guest administrator can cause a denial of service against a specific guest or against the whole host. All systems using oxenstored are vulnerable. Building and using oxenstored is the default in the upstream Xen distribution, if the Ocaml compiler is available. Systems using C xenstored are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-29486/">CVE-2020-29486</cve>
	<bugzilla href="https://bugzilla.suse.com/1179510">SUSE bug 1179510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29487</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29487" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29487" ref_url="https://www.suse.com/security/cve/CVE-2020-29487" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen XAPI before 2020-12-15. Certain xenstore keys provide feedback from the guest, and are therefore watched by toolstack. Specifically, keys are watched by xenopsd, and data are forwarded via RPC through message-switch to xapi. The watching logic in xenopsd sends one RPC update containing all data, any time any single xenstore key is updated, and therefore has O(N^2) time complexity. Furthermore, message-switch retains recent (currently 128) RPC messages for diagnostic purposes, yielding O(M*N) space complexity. The quantity of memory a single guest can monopolise is bounded by xenstored quota, but the quota is fairly large. It is believed to be in excess of 1G per malicious guest. In practice, this manifests as a host denial of service, either through message-switch thrashing against swap, or OOMing entirely, depending on dom0's configuration. (There are no quotas in xenopsd to limit the quantity of keys that result in RPC traffic.) A buggy or malicious guest can cause unreasonable memory usage in dom0, resulting in a host denial of service. All versions of XAPI are vulnerable. Systems that are not using the XAPI toolstack are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29487/">CVE-2020-29487</cve>
	<bugzilla href="https://bugzilla.suse.com/1179512">SUSE bug 1179512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29534</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29534" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29534" ref_url="https://www.suse.com/security/cve/CVE-2020-29534" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29534/">CVE-2020-29534</cve>
	<bugzilla href="https://bugzilla.suse.com/1179598">SUSE bug 1179598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180564">SUSE bug 1180564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29567</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29567" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29567" ref_url="https://www.suse.com/security/cve/CVE-2020-29567" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29567/">CVE-2020-29567</cve>
	<bugzilla href="https://bugzilla.suse.com/1179513">SUSE bug 1179513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-&gt;xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552489" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552488" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552487" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552486" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552485" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538135" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538134" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538133" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538132" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538131" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531680" comment="xen-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531681" comment="xen-doc-html-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531682" comment="xen-libs-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531683" comment="xen-libs-32bit-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531684" comment="xen-tools-4.7.6_14-43.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531685" comment="xen-tools-domU-4.7.6_14-43.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    "Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. A user may be unable to fully delete browsing history.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29651</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29651" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0851-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J5N5MI5XRBM5X46XPGTD3CVA6C5MMBQJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1859-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B5MZ7NDWQ2PACIOK5L2D7CNODUCJCARI/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651</cve>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552489" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552488" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552487" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552486" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552485" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538135" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538134" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538133" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538132" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538131" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552489" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552488" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552487" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552486" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552485" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538135" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538134" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538133" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538132" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538131" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3123" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<bugzilla href="https://bugzilla.suse.com/1162921">SUSE bug 1162921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552011" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596164" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<bugzilla href="https://bugzilla.suse.com/1171980">SUSE bug 1171980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552011" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596164" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<bugzilla href="https://bugzilla.suse.com/1171981">SUSE bug 1171981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552011" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596164" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3350" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174255">SUSE bug 1174255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552011" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596164" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3481" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008156.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<bugzilla href="https://bugzilla.suse.com/1174250">SUSE bug 1174250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531686" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552011" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596164" comment="clamav-0.103.0-33.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    When an extension with the proxy permission registered to receive &lt;all_urls&gt;, the proxy.onRequest callback was not triggered for view-source URLs. While web content cannot navigate to such URLs, a user opening View Source could have inadvertently leaked their IP address. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552008" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552009" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552010" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596161" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596162" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596163" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35112" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552008" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552009" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552010" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596161" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596162" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596163" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRYMYUEZXYQNBK2DWV7DAYE5EXEQPBUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LL2B6S5KIA4HGLES3CDLSB4VRZW275H2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2324-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFGNB2YB4LDKDYXRSTS5R357XYHABN5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZN3OVPTOCIWBAWJK4JZQDXFN752D6AR/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 84, Thunderbird &lt; 78.6, and Firefox ESR &lt; 78.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531677" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531678" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531679" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552008" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552009" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552010" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596161" comment="MozillaFirefox-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596162" comment="MozillaFirefox-devel-78.6.0-112.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596163" comment="MozillaFirefox-translations-common-78.6.0-112.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35448" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.35.1. A heap-based buffer over-read can occur in bfd_getl_signed_32 in libbfd.c because sh_entsize is not validated in _bfd_elf_slurp_secondary_reloc_section in elf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448</cve>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35492</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35492" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35492" ref_url="https://www.suse.com/security/cve/CVE-2020-35492" source="SUSE CVE"/>
    <description>
    A flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example, by convincing a user to open a file in an application using cairo, or if an application uses cairo on untrusted input) to cause a stack buffer overflow -&gt; out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35492/">CVE-2020-35492</cve>
	<bugzilla href="https://bugzilla.suse.com/1180436">SUSE bug 1180436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334276" comment="cairo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35493" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -&gt; out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493</cve>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35494</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35494" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35494" ref_url="https://www.suse.com/security/cve/CVE-2020-35494" source="SUSE CVE"/>
    <description>
    There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who is able to submit a crafted input file to be processed by binutils could cause usage of uninitialized memory. The highest threat is to application availability with a lower threat to data confidentiality. This flaw affects binutils versions prior to 2.34.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35494/">CVE-2020-35494</cve>
	<bugzilla href="https://bugzilla.suse.com/1180452">SUSE bug 1180452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35496" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496</cve>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35498" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008326.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22ERXODNOFS7IPNUWPYF2BEMIM5BQTMZ/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498</cve>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531895" comment="openvswitch-2.5.11-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531896" comment="openvswitch-dpdk-2.5.11-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531897" comment="openvswitch-dpdk-switch-2.5.11-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531898" comment="openvswitch-switch-2.5.11-25.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552103" comment="openvswitch-2.5.11-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531896" comment="openvswitch-dpdk-2.5.11-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531897" comment="openvswitch-dpdk-switch-2.5.11-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552104" comment="openvswitch-switch-2.5.11-25.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596370" comment="openvswitch-2.5.11-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531896" comment="openvswitch-dpdk-2.5.11-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531897" comment="openvswitch-dpdk-switch-2.5.11-25.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596371" comment="openvswitch-switch-2.5.11-25.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35499</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35499" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35499" ref_url="https://www.suse.com/security/cve/CVE-2020-35499" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference flaw in Linux kernel versions prior to 5.11 may be seen if sco_sock_getsockopt function in net/bluetooth/sco.c do not have a sanity check for a socket connection, when using BT_SNDMTU/BT_RCVMTU for SCO sockets. This could allow a local attacker with a special user privilege to crash the system (DOS) or leak kernel internal information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35499/">CVE-2020-35499</cve>
	<bugzilla href="https://bugzilla.suse.com/1180460">SUSE bug 1180460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35501</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35501" ref_url="https://www.suse.com/security/cve/CVE-2020-35501" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-35501/">CVE-2020-35501</cve>
	<bugzilla href="https://bugzilla.suse.com/1182435">SUSE bug 1182435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35503" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503</cve>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653168" comment="qemu-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653169" comment="qemu-block-curl-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653170" comment="qemu-block-rbd-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653171" comment="qemu-block-ssh-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653172" comment="qemu-guest-agent-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653173" comment="qemu-ipxe-1.0.0-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653174" comment="qemu-kvm-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653175" comment="qemu-lang-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653176" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653177" comment="qemu-sgabios-8-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653178" comment="qemu-tools-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653179" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653180" comment="qemu-x86-2.6.2-41.73.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35504" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504</cve>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653168" comment="qemu-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653169" comment="qemu-block-curl-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653170" comment="qemu-block-rbd-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653171" comment="qemu-block-ssh-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653172" comment="qemu-guest-agent-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653173" comment="qemu-ipxe-1.0.0-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653174" comment="qemu-kvm-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653175" comment="qemu-lang-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653176" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653177" comment="qemu-sgabios-8-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653178" comment="qemu-tools-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653179" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653180" comment="qemu-x86-2.6.2-41.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35505" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505</cve>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653168" comment="qemu-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653169" comment="qemu-block-curl-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653170" comment="qemu-block-rbd-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653171" comment="qemu-block-ssh-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653172" comment="qemu-guest-agent-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653173" comment="qemu-ipxe-1.0.0-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653174" comment="qemu-kvm-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653175" comment="qemu-lang-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653176" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653177" comment="qemu-sgabios-8-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653178" comment="qemu-tools-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653179" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653180" comment="qemu-x86-2.6.2-41.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35506" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506</cve>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653168" comment="qemu-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653169" comment="qemu-block-curl-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653170" comment="qemu-block-rbd-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653171" comment="qemu-block-ssh-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653172" comment="qemu-guest-agent-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653173" comment="qemu-ipxe-1.0.0-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653174" comment="qemu-kvm-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653175" comment="qemu-lang-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653176" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653177" comment="qemu-sgabios-8-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653178" comment="qemu-tools-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653179" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653180" comment="qemu-x86-2.6.2-41.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35507" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507</cve>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35508</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35508" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35508" ref_url="https://www.suse.com/security/cve/CVE-2020-35508" source="SUSE CVE"/>
    <description>
    A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-35508/">CVE-2020-35508</cve>
	<bugzilla href="https://bugzilla.suse.com/1180529">SUSE bug 1180529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35513</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35513" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35513" ref_url="https://www.suse.com/security/cve/CVE-2020-35513" source="SUSE CVE"/>
    <description>
    A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other process that is not using new NFSv4.2. A user with access to the NFS could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35513/">CVE-2020-35513</cve>
	<bugzilla href="https://bugzilla.suse.com/1181362">SUSE bug 1181362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35517</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35517" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35517" ref_url="https://www.suse.com/security/cve/CVE-2020-35517" source="SUSE CVE"/>
    <description>
    A flaw was found in qemu. A host privilege escalation issue was found in the virtio-fs shared file system daemon where a privileged guest user is able to create a device special file in the shared directory and use it to r/w access host devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-35517/">CVE-2020-35517</cve>
	<bugzilla href="https://bugzilla.suse.com/1182126">SUSE bug 1182126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35519" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184953">SUSE bug 1184953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35521" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c, a crafted TIFF file can lead to an abort, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35522" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    In LibTIFF, there is a memory malloc failure in tif_pixarlog.c. A crafted TIFF document can lead to an abort, resulting in a remote denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35523" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35524" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35653</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35653" ref_url="https://www.suse.com/security/cve/CVE-2020-35653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35653/">CVE-2020-35653</cve>
	<bugzilla href="https://bugzilla.suse.com/1180834">SUSE bug 1180834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35654</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35654" ref_url="https://www.suse.com/security/cve/CVE-2020-35654" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35654/">CVE-2020-35654</cve>
	<bugzilla href="https://bugzilla.suse.com/1180833">SUSE bug 1180833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183103">SUSE bug 1183103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334396" comment="python-Pillow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35655</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35655" ref_url="https://www.suse.com/security/cve/CVE-2020-35655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35655/">CVE-2020-35655</cve>
	<bugzilla href="https://bugzilla.suse.com/1180832">SUSE bug 1180832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334396" comment="python-Pillow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35681</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35681" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35681" ref_url="https://www.suse.com/security/cve/CVE-2020-35681" source="SUSE CVE"/>
    <description>
    Django Channels 3.x before 3.0.3 allows remote attackers to obtain sensitive information from a different request scope. The legacy channels.http.AsgiHandler class, used for handling HTTP type requests in an ASGI environment prior to Django 3.0, did not correctly separate request scopes in Channels 3.0. In many cases this would result in a crash but, with correct timing, responses could be sent to the wrong client, resulting in potential leakage of session identifiers and other sensitive data. Note that this affects only the legacy Channels provided class, and not Django's similar ASGIHandler, available from Django 3.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-35681/">CVE-2020-35681</cve>
	<bugzilla href="https://bugzilla.suse.com/1180462">SUSE bug 1180462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35702</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35702" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35702" ref_url="https://www.suse.com/security/cve/CVE-2020-35702" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. However, several third-party Open Source projects directly rely on Poppler git clones made at arbitrary times, and therefore the CVE remains useful to users of those projects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-35702/">CVE-2020-35702</cve>
	<bugzilla href="https://bugzilla.suse.com/1180397">SUSE bug 1180397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334297" comment="poppler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35733</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35733" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35733" ref_url="https://www.suse.com/security/cve/CVE-2020-35733" source="SUSE CVE"/>
    <description>
    An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-35733/">CVE-2020-35733</cve>
	<bugzilla href="https://bugzilla.suse.com/1181073">SUSE bug 1181073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339432" comment="erlang is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35738" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008521.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK4DH6BBB2WPBM677O7MFUOO5UBKUW37/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD5IPNZ6LGJLORJOQVT3MAHBWF3ORQPT/" source="SUSE-SU"/>
    <description>
    WavPack 5.3.0 has an out-of-bounds write in WavpackPackSamples in pack_utils.c because of an integer overflow in a malloc argument. NOTE: some third-parties claim that there are later "unofficial" releases through 5.3.2, which are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531994" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552179" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596436" comment="libwavpack1-4.60.99-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552489" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552488" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552487" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552486" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552485" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538135" comment="kgraft-patch-4_4_121-92_129-default-8-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538134" comment="kgraft-patch-4_4_121-92_135-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538133" comment="kgraft-patch-4_4_121-92_138-default-6-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538132" comment="kgraft-patch-4_4_121-92_141-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538131" comment="kgraft-patch-4_4_121-92_146-default-3-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36223" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36224" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36225" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36226" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-&gt;bv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36229" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36230" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36242" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008429.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQZIOJTSAUNBJZ24KXLCQWD35GCPXJF/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531928" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531929" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552126" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552127" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596394" comment="python-cryptography-2.1.4-7.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596395" comment="python3-cryptography-2.1.4-7.34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36312" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36313</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36313" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36313" ref_url="https://www.suse.com/security/cve/CVE-2020-36313" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.7. The KVM subsystem allows out-of-range access to memslots after a deletion, aka CID-0774a964ef56. This affects arch/s390/kvm/kvm-s390.c, include/linux/kvm_host.h, and virt/kvm/kvm_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-36313/">CVE-2020-36313</cve>
	<bugzilla href="https://bugzilla.suse.com/1184504">SUSE bug 1184504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36327</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36327" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36327" ref_url="https://www.suse.com/security/cve/CVE-2020-36327" source="SUSE CVE"/>
    <description>
    Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36327/">CVE-2020-36327</cve>
	<bugzilla href="https://bugzilla.suse.com/1185842">SUSE bug 1185842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334174" comment="rubygem-bundler is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36328</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36328" ref_url="https://www.suse.com/security/cve/CVE-2020-36328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36328/">CVE-2020-36328</cve>
	<bugzilla href="https://bugzilla.suse.com/1185688">SUSE bug 1185688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338941" comment="libwebp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329</cve>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187486">SUSE bug 1187486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36330" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkVerifyAndAssign. The highest threat from this vulnerability is to data confidentiality and to the service availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330</cve>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187486">SUSE bug 1187486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36331" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331</cve>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187486">SUSE bug 1187486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36332" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZIJ3ZK5FGNGJN6E65XZKMQPSQ3RKNVG/" source="SUSE-SU"/>
    <description>
    A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332</cve>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187486">SUSE bug 1187486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552333" comment="libwebp5-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538993" comment="libwebp5-32bit-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552334" comment="libwebpdemux1-0.4.3-4.7.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596320" comment="libwebpmux1-0.4.3-4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684537" comment="libwebp is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196174">SUSE bug 1196174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. A malicious website may be able to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3864" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17, iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS 13.3.1. A DOM object context may not have had a unique security origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3865" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3867" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3868" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006752.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0278-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00004.html" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868</cve>
	<bugzilla href="https://bugzilla.suse.com/1163809">SUSE bug 1163809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530908" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530909" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530911" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530912" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530913" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530914" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530915" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551423" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551424" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551425" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551426" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551427" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551428" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551429" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595536" comment="libjavascriptcoregtk-4_0-18-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595537" comment="libwebkit2gtk-4_0-37-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530910" comment="libwebkit2gtk3-lang-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595538" comment="typelib-1_0-JavaScriptCore-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595539" comment="typelib-1_0-WebKit2-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595540" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595541" comment="webkit2gtk-4_0-injected-bundles-2.28.1-2.50.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595542" comment="webkit2gtk3-devel-2.28.1-2.50.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A file URL may be incorrectly processed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A race condition was addressed with additional validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. An application may be able to read restricted memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3898" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006729.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0555-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00040.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<bugzilla href="https://bugzilla.suse.com/1168422">SUSE bug 1168422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170671">SUSE bug 1170671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530902" comment="cups-1.7.5-20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530903" comment="cups-client-1.7.5-20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530904" comment="cups-libs-1.7.5-20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530905" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548953" comment="cups-1.7.5-20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548954" comment="cups-client-1.7.5-20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548955" comment="cups-libs-1.7.5-20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548956" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595532" comment="cups-1.7.5-20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595533" comment="cups-client-1.7.5-20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595534" comment="cups-libs-1.7.5-20.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548956" comment="cups-libs-32bit-1.7.5-20.29.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0646-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00015.html" source="SUSE-SU"/>
    <description>
    A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530932" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530933" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530935" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530936" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530937" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530938" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530939" comment="webkit2gtk3-devel-2.28.2-2.53.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551436" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551437" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551438" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551439" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551440" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551441" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551442" comment="webkit2gtk3-devel-2.28.2-2.53.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595556" comment="libjavascriptcoregtk-4_0-18-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595557" comment="libwebkit2gtk-4_0-37-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530934" comment="libwebkit2gtk3-lang-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595558" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595559" comment="typelib-1_0-WebKit2-4_0-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595560" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595561" comment="webkit2gtk-4_0-injected-bundles-2.28.2-2.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595562" comment="webkit2gtk3-devel-2.28.2-2.53.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to a cross site scripting attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<bugzilla href="https://bugzilla.suse.com/1170643">SUSE bug 1170643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4044" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-July/015437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007230.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0999-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00036.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1200-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00037.html" source="SUSE-SU"/>
    <description>
    The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044</cve>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531102" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551536" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595663" comment="xrdp-0.9.0~git.1456906198.f422461-16.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4054</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4054" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4054" ref_url="https://www.suse.com/security/cve/CVE-2020-4054" source="SUSE CVE"/>
    <description>
    In Sanitize (RubyGem sanitize) greater than or equal to 3.0.0 and less than 5.2.1, there is a cross-site scripting vulnerability. When HTML is sanitized using Sanitize's "relaxed" config, or a custom config that allows certain elements, some content in a math or svg element may not be sanitized correctly even if math and svg are not in the allowlist. You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements: iframe, math, noembed, noframes, noscript, plaintext, script, style, svg, xmp. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. This has been fixed in 5.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-4054/">CVE-2020-4054</cve>
	<bugzilla href="https://bugzilla.suse.com/1173255">SUSE bug 1173255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009340775" comment="rubygem-rails-html-sanitizer is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5236</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5236" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5236" ref_url="https://www.suse.com/security/cve/CVE-2020-5236" source="SUSE CVE"/>
    <description>
    Waitress version 1.4.2 allows a DOS attack When waitress receives a header that contains invalid characters. When a header like "Bad-header: xxxxxxxxxxxxxxx\x10" is received, it will cause the regular expression engine to catastrophically backtrack causing the process to use 100% CPU time and blocking any other interactions. This allows an attacker to send a single request with an invalid header and take the service offline. This issue was introduced in version 1.4.2 when the regular expression was updated to attempt to match the behaviour required by errata associated with RFC7230. The regular expression that is used to validate incoming headers has been updated in version 1.4.3, it is recommended that people upgrade to the new version of Waitress as soon as possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5236/">CVE-2020-5236</cve>
	<bugzilla href="https://bugzilla.suse.com/1162656">SUSE bug 1162656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339435" comment="python-waitress is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5247</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5247" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5247" ref_url="https://www.suse.com/security/cve/CVE-2020-5247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-5247/">CVE-2020-5247</cve>
	<bugzilla href="https://bugzilla.suse.com/1165402">SUSE bug 1165402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165524">SUSE bug 1165524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5260" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006829.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0524-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0598-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html" source="SUSE-SU"/>
    <description>
    Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<bugzilla href="https://bugzilla.suse.com/1168930">SUSE bug 1168930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169936">SUSE bug 1169936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170741">SUSE bug 1170741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530961" comment="git-core-2.26.2-27.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531810" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531811" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531812" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531813" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548984" comment="git-core-2.26.2-27.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549152" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549153" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549154" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549155" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595580" comment="git-core-2.26.2-27.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530962" comment="git-doc-2.26.2-27.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596306" comment="libpcre2-16-0-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596307" comment="libpcre2-32-0-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596308" comment="libpcre2-8-0-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596309" comment="libpcre2-posix2-10.34-1.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531814" comment="perl-CGI-4.38-1.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5267</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5267" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5267" ref_url="https://www.suse.com/security/cve/CVE-2020-5267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0627-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5267/">CVE-2020-5267</cve>
	<bugzilla href="https://bugzilla.suse.com/1167240">SUSE bug 1167240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596301" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5311</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5311" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5311" ref_url="https://www.suse.com/security/cve/CVE-2020-5311" source="SUSE CVE"/>
    <description>
    libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5311/">CVE-2020-5311</cve>
	<bugzilla href="https://bugzilla.suse.com/1160151">SUSE bug 1160151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173420">SUSE bug 1173420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334396" comment="python-Pillow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5312</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5312" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5312" ref_url="https://www.suse.com/security/cve/CVE-2020-5312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
    <description>
    libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5312/">CVE-2020-5312</cve>
	<bugzilla href="https://bugzilla.suse.com/1160152">SUSE bug 1160152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5313</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5313" ref_url="https://www.suse.com/security/cve/CVE-2020-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007188.html" source="SUSE-SU"/>
    <description>
    libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5313/">CVE-2020-5313</cve>
	<bugzilla href="https://bugzilla.suse.com/1160153">SUSE bug 1160153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5390</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5390" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5390" ref_url="https://www.suse.com/security/cve/CVE-2020-5390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
    <description>
    PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5390/">CVE-2020-5390</cve>
	<bugzilla href="https://bugzilla.suse.com/1160851">SUSE bug 1160851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20205419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-5419</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-5419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5419" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-5419" ref_url="https://www.suse.com/security/cve/CVE-2020-5419" source="SUSE CVE"/>
    <description>
    RabbitMQ versions 3.8.x prior to 3.8.7 are prone to a Windows-specific binary planting security vulnerability that allows for arbitrary code execution. An attacker with write privileges to the RabbitMQ installation directory and local access on Windows could carry out a local binary hijacking (planting) attack and execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5419/">CVE-2020-5419</cve>
	<bugzilla href="https://bugzilla.suse.com/1175985">SUSE bug 1175985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334397" comment="rabbitmq-server is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6463" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0823-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0832-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00038.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<bugzilla href="https://bugzilla.suse.com/1171975">SUSE bug 1171975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1020-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1021-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1048-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-09/msg00130.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1061-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1147-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1148-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1155-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1172-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1179-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1189-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1205-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html" source="SUSE-SU"/>
    <description>
    Inappropriate implementation in WebRTC in Google Chrome prior to 84.0.4147.89 allowed an attacker in a privileged network position to potentially exploit heap corruption via a crafted SCTP stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<bugzilla href="https://bugzilla.suse.com/1174189">SUSE bug 1174189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531121" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531122" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531123" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551550" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551551" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551552" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595676" comment="MozillaFirefox-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595677" comment="MozillaFirefox-devel-78.1.0-112.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595678" comment="MozillaFirefox-translations-common-78.1.0-112.8.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
    <description>
    A content process could have modified shared memory relating to crash reporting information, crash itself, and cause an out-of-bound write. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 73 and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531668" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549026" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549027" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549028" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596151" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596152" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596153" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6797" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    By downloading a file with the .fileloc extension, a semi-privileged extension could launch an arbitrary application on the user's computer. The attacker is restricted as they are unable to download non-quarantined files or supply command line arguments to the application, limiting the impact. Note: this issue only occurs on Mac OSX. Other operating systems are unaffected. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531668" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549026" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549027" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549028" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596151" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596152" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596153" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but is potentially a risk in browser or browser-like contexts. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531668" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549026" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549027" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549028" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596151" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596152" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596153" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6799" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
    <description>
    Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 73 and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531668" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549026" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549027" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549028" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596151" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596152" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596153" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0230-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0231-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-02/msg00023.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 72 and Firefox ESR 68.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. This vulnerability affects Thunderbird &lt; 68.5, Firefox &lt; 73, and Firefox &lt; ESR68.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<bugzilla href="https://bugzilla.suse.com/1163368">SUSE bug 1163368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009522638" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531668" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522639" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549026" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549027" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549028" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596151" comment="MozillaFirefox-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596152" comment="MozillaFirefox-devel-68.5.0-109.106.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596153" comment="MozillaFirefox-translations-common-68.5.0-109.106.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531772" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549111" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549112" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549113" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596244" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596245" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596246" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531772" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549111" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549112" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549113" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596244" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596245" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596246" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    When a device was changed while a stream was about to be destroyed, the &lt;code&gt;stream-reinit&lt;/code&gt; task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531772" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549111" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549112" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549113" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596244" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596245" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596246" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531772" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549111" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549112" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549113" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596244" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596245" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596246" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531772" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549111" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549112" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549113" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596244" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596245" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596246" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0340-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0366-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox and Thunderbird 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.6, Firefox &lt; 74, Firefox &lt; ESR68.6, and Firefox ESR &lt; 68.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531771" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531772" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531773" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549111" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549112" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549113" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596244" comment="MozillaFirefox-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596245" comment="MozillaFirefox-devel-68.6.0-109.110.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596246" comment="MozillaFirefox-translations-common-68.6.0-109.110.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0461-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox &lt; 74.0.1, and Firefox ESR &lt; 68.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531802" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531803" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531804" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549145" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549146" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549147" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596298" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596299" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596300" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0461-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox &lt; 74.0.1, and Firefox ESR &lt; 68.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334013" comment="MozillaFirefox is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531802" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531803" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531804" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549145" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549146" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549147" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596298" comment="MozillaFirefox-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596299" comment="MozillaFirefox-devel-68.6.1-109.113.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596300" comment="MozillaFirefox-translations-common-68.6.1-109.113.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    When reading from areas partially or fully outside the source resource with WebGL's &lt;code&gt;copyTexSubImage&lt;/code&gt; method, the specification requires the returned values be zero. Previously, this memory was uninitialized, leading to potentially sensitive data disclosure. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox ESR &lt; 68.7, and Firefox &lt; 75.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531806" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549148" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549149" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549150" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596302" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596303" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596304" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    On 32-bit builds, an out of bounds write could have occurred when processing an image larger than 4 GB in &lt;code&gt;GMPDecodeData&lt;/code&gt;. It is possible that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox ESR &lt; 68.7, and Firefox &lt; 75.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531806" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549148" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549149" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549150" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596302" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596303" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596304" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0520-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0544-1" ref_url="https://lists.opensuse.org/opensuse-updates/2020-04/msg00106.html" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members Tyson Smith and Christian Holler reported memory safety bugs present in Firefox 74 and Firefox ESR 68.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.7.0, Firefox ESR &lt; 68.7, and Firefox &lt; 75.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<bugzilla href="https://bugzilla.suse.com/1168630">SUSE bug 1168630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531806" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549148" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549149" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549150" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596302" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596303" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596304" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6827" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
    <description>
    When following a link that opened an intent://-schemed URL, causing a custom tab to be opened, Firefox for Android could be tricked into displaying the incorrect URI. &lt;br&gt; *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531806" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549148" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549149" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549150" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596302" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596303" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596304" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6828" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006697.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0493-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00012.html" source="SUSE-SU"/>
    <description>
    A malicious Android application could craft an Intent that would have been processed by Firefox for Android and potentially result in a file overwrite in the user's profile directory. One exploitation vector for this would be to supply a user.js file providing arbitrary malicious preference values. Control of arbitrary preferences can lead to sufficient compromise such that it is generally equivalent to arbitrary code execution.&lt;br&gt; *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 68.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<bugzilla href="https://bugzilla.suse.com/1168874">SUSE bug 1168874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531805" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531806" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531807" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009549148" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549149" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549150" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596302" comment="MozillaFirefox-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596303" comment="MozillaFirefox-devel-68.7.0-109.116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596304" comment="MozillaFirefox-translations-common-68.7.0-109.116.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633044" comment="libfreebl3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633045" comment="libfreebl3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633046" comment="libfreebl3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633047" comment="libfreebl3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633048" comment="libsoftokn3-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633049" comment="libsoftokn3-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633050" comment="libsoftokn3-hmac-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633051" comment="libsoftokn3-hmac-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633052" comment="mozilla-nspr-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633053" comment="mozilla-nspr-32bit-4.32-19.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633054" comment="mozilla-nss-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633055" comment="mozilla-nss-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633056" comment="mozilla-nss-certs-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633057" comment="mozilla-nss-certs-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633058" comment="mozilla-nss-sysinit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633059" comment="mozilla-nss-sysinit-32bit-3.68-58.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633060" comment="mozilla-nss-tools-3.68-58.54.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6831" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006809.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0620-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0621-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0643-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00024.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0648-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0709-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0917-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html" source="SUSE-SU"/>
    <description>
    A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 68.8, Firefox &lt; 76, and Thunderbird &lt; 68.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<bugzilla href="https://bugzilla.suse.com/1171186">SUSE bug 1171186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171247">SUSE bug 1171247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530943" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530944" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530945" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548981" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548982" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548983" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595566" comment="MozillaFirefox-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595567" comment="MozillaFirefox-devel-68.8.0-109.119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595568" comment="MozillaFirefox-translations-common-68.8.0-109.119.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6851" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c because of lack of opj_j2k_update_image_dimensions validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334356" comment="ghostscript is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7009</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7009" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7009" ref_url="https://www.suse.com/security/cve/CVE-2020-7009" source="SUSE CVE"/>
    <description>
    Elasticsearch versions from 6.7.0 before 6.8.8 and 7.0.0 before 7.6.2 contain a privilege escalation flaw if an attacker is able to create API keys. An attacker who is able to generate an API key can perform a series of steps that result in an API key being generated with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7009/">CVE-2020-7009</cve>
	<bugzilla href="https://bugzilla.suse.com/1168277">SUSE bug 1168277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172508">SUSE bug 1172508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7012</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7012" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7012" ref_url="https://www.suse.com/security/cve/CVE-2020-7012" source="SUSE CVE"/>
    <description>
    Kibana versions 6.7.0 to 6.8.8 and 7.0.0 to 7.6.2 contain a prototype pollution flaw in the Upgrade Assistant. An authenticated attacker with privileges to write to the Kibana index could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7012/">CVE-2020-7012</cve>
	<bugzilla href="https://bugzilla.suse.com/1172569">SUSE bug 1172569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7013</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7013" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7013" ref_url="https://www.suse.com/security/cve/CVE-2020-7013" source="SUSE CVE"/>
    <description>
    Kibana versions before 6.8.9 and 7.7.0 contain a prototype pollution flaw in TSVB. An authenticated attacker with privileges to create TSVB visualizations could insert data that would cause Kibana to execute arbitrary code. This could possibly lead to an attacker executing code with the permissions of the Kibana process on the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7013/">CVE-2020-7013</cve>
	<bugzilla href="https://bugzilla.suse.com/1172568">SUSE bug 1172568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7014</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7014" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7014" ref_url="https://www.suse.com/security/cve/CVE-2020-7014" source="SUSE CVE"/>
    <description>
    The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7014/">CVE-2020-7014</cve>
	<bugzilla href="https://bugzilla.suse.com/1172508">SUSE bug 1172508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7015</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7015" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7015" ref_url="https://www.suse.com/security/cve/CVE-2020-7015" source="SUSE CVE"/>
    <description>
    Kibana versions before 6.8.9 and 7.7.0 contains a stored XSS flaw in the TSVB visualization. An attacker who is able to edit or create a TSVB visualization could allow the attacker to obtain sensitive information from, or perform destructive actions, on behalf of Kibana users who edit the TSVB visualization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-7015/">CVE-2020-7015</cve>
	<bugzilla href="https://bugzilla.suse.com/1172567">SUSE bug 1172567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7016</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7016" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7016" ref_url="https://www.suse.com/security/cve/CVE-2020-7016" source="SUSE CVE"/>
    <description>
    Kibana versions before 6.8.11 and 7.8.1 contain a denial of service (DoS) flaw in Timelion. An attacker can construct a URL that when viewed by a Kibana user can lead to the Kibana process consuming large amounts of CPU and becoming unresponsive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-7016/">CVE-2020-7016</cve>
	<bugzilla href="https://bugzilla.suse.com/1174586">SUSE bug 1174586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7017</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7017" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7017" ref_url="https://www.suse.com/security/cve/CVE-2020-7017" source="SUSE CVE"/>
    <description>
    In Kibana versions before 6.8.11 and 7.8.1 the region map visualization in contains a stored XSS flaw. An attacker who is able to edit or create a region map visualization could obtain sensitive information or perform destructive actions on behalf of Kibana users who view the region map visualization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-7017/">CVE-2020-7017</cve>
	<bugzilla href="https://bugzilla.suse.com/1044849">SUSE bug 1044849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174584">SUSE bug 1174584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7019</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7019" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7019" ref_url="https://www.suse.com/security/cve/CVE-2020-7019" source="SUSE CVE"/>
    <description>
    In Elasticsearch before 7.9.0 and 6.8.12 a field disclosure flaw was found when running a scrolling search with Field Level Security. If a user runs the same query another more privileged user recently ran, the scrolling search can leak fields that should be hidden. This could result in an attacker gaining additional permissions against a restricted index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7019/">CVE-2020-7019</cve>
	<bugzilla href="https://bugzilla.suse.com/1175473">SUSE bug 1175473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7021</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7021" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7021" ref_url="https://www.suse.com/security/cve/CVE-2020-7021" source="SUSE CVE"/>
    <description>
    Elasticsearch versions before 7.10.0 and 6.8.14 have an information disclosure issue when audit logging and the emit_request_body option is enabled. The Elasticsearch audit log could contain sensitive information such as password hashes or authentication tokens. This could allow an Elasticsearch administrator to view these details.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7021/">CVE-2020-7021</cve>
	<bugzilla href="https://bugzilla.suse.com/1182124">SUSE bug 1182124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
    <description>
    tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530990" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530991" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530993" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530994" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530996" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530997" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531000" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551454" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551455" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551456" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551457" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551459" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537488" comment="qemu-ppc-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551461" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595592" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595593" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595594" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595595" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595596" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595597" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7053</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7053" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7053" ref_url="https://www.suse.com/security/cve/CVE-2020-7053" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7053/">CVE-2020-7053</cve>
	<bugzilla href="https://bugzilla.suse.com/1160966">SUSE bug 1160966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7211" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7211" ref_url="https://www.suse.com/security/cve/CVE-2020-7211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\ directory traversal on Windows.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7211/">CVE-2020-7211</cve>
	<bugzilla href="https://bugzilla.suse.com/1161180">SUSE bug 1161180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161181">SUSE bug 1161181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531540" comment="xen-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531541" comment="xen-doc-html-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531542" comment="xen-libs-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531543" comment="xen-libs-32bit-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531544" comment="xen-tools-4.7.6_06-43.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531545" comment="xen-tools-domU-4.7.6_06-43.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7212</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7212" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7212" ref_url="https://www.suse.com/security/cve/CVE-2020-7212" source="SUSE CVE"/>
    <description>
    The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of percent_encodings may be up to O(N). The next step (normalize existing percent-encoded bytes) also takes up to O(N) for each step, so the total time is O(N^2). If percent_encodings were deduplicated, the time to compute _encode_invalid_chars would be O(kN), where k is at most 484 ((10+6*2)^2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7212/">CVE-2020-7212</cve>
	<bugzilla href="https://bugzilla.suse.com/1166069">SUSE bug 1166069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334022" comment="python-urllib3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7221</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7221" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7221" ref_url="https://www.suse.com/security/cve/CVE-2020-7221" source="SUSE CVE"/>
    <description>
    mysql_install_db in MariaDB 10.4.7 through 10.4.11 allows privilege escalation from the mysql user account to root because chown and chmod are performed unsafely, as demonstrated by a symlink attack on a chmod 04755 of auth_pam_tool_dir/auth_pam_tool. NOTE: this does not affect the Oracle MySQL product, which implements mysql_install_db differently.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7221/">CVE-2020-7221</cve>
	<bugzilla href="https://bugzilla.suse.com/1160285">SUSE bug 1160285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160868">SUSE bug 1160868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160895">SUSE bug 1160895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333992" comment="mariadb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7471</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7471" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7471" ref_url="https://www.suse.com/security/cve/CVE-2020-7471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-7471/">CVE-2020-7471</cve>
	<bugzilla href="https://bugzilla.suse.com/1161919">SUSE bug 1161919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161920">SUSE bug 1161920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7598</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7598" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7598" ref_url="https://www.suse.com/security/cve/CVE-2020-7598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" source="SUSE-SU"/>
    <description>
    minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7598/">CVE-2020-7598</cve>
	<bugzilla href="https://bugzilla.suse.com/1166916">SUSE bug 1166916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595623" comment="nodejs6-6.17.1-11.37.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7774</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7774" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF3JILGLPQ2UFZS55L7Z33X7S4K562O7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQFKBXOTTNWYS2GOQXWGPFT7H3TPVQVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYHLAI3M6J7NTEFF5DUEXHFHPTDMGRCD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZHYVND24KFSRRA7YPSSI2T72HICGJ3Z/" source="SUSE-SU"/>
    <description>
    This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7921</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7921" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7921" ref_url="https://www.suse.com/security/cve/CVE-2020-7921" source="SUSE CVE"/>
    <description>
    Improper serialization of internal state in the authorization subsystem in MongoDB Server's authorization subsystem permits a user with valid credentials to bypass IP whitelisting protection mechanisms following administrative action. This issue affects: MongoDB Inc. MongoDB Server 4.2 versions prior to 4.2.3; 4.0 versions prior to 4.0.15; 4.3 versions prior to 4.3.3; 3.6 versions prior to 3.6.18.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-7921/">CVE-2020-7921</cve>
	<bugzilla href="https://bugzilla.suse.com/1171353">SUSE bug 1171353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334386" comment="mongodb is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8013" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:81-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:82-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0302-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531753" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552042" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596219" comment="permissions-2015.09.28.1626-17.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8022" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8022" ref_url="https://www.suse.com/security/cve/CVE-2020-8022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0911-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00066.html" source="SUSE-SU"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8022/">CVE-2020-8022</cve>
	<bugzilla href="https://bugzilla.suse.com/1172405">SUSE bug 1172405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172562">SUSE bug 1172562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531054" comment="tomcat-8.0.53-29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531055" comment="tomcat-admin-webapps-8.0.53-29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531056" comment="tomcat-docs-webapp-8.0.53-29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531057" comment="tomcat-el-3_0-api-8.0.53-29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531058" comment="tomcat-javadoc-8.0.53-29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531059" comment="tomcat-jsp-2_3-api-8.0.53-29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531060" comment="tomcat-lib-8.0.53-29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531061" comment="tomcat-servlet-3_1-api-8.0.53-29.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531062" comment="tomcat-webapps-8.0.53-29.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0956-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0976-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00029.html" source="SUSE-SU"/>
    <description>
    A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SECURITY, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to escalate privileges from user ldap to root. This issue affects: SUSE Enterprise Storage 5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Debuginfo 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Debuginfo 11-SP4 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Point of Sale 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 11-SECURITY openldap2-client-openssl1 versions prior to 2.4.26-0.74.13.1. SUSE Linux Enterprise Server 11-SP4-LTSS openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 12-SP2-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP2-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP4 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.31.1. SUSE Linux Enterprise Server for SAP 12-SP2 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 12-SP3 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.31.1. SUSE OpenStack Cloud 7 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud 8 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud Crowbar 8 openldap2 versions prior to 2.4.41-18.71.2. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.12.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190347">SUSE bug 1190347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531085" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531086" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531087" comment="openldap2-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531088" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531089" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531091" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531085" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531086" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531087" comment="openldap2-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531088" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531089" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551521" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551522" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551523" comment="openldap2-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551524" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551525" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551526" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595650" comment="libldap-2_4-2-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551522" comment="libldap-2_4-2-32bit-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595651" comment="openldap2-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595652" comment="openldap2-back-meta-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595653" comment="openldap2-client-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531090" comment="openldap2-doc-2.4.41-18.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595654" comment="openldap2-ppolicy-check-password-1.2-18.71.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8025</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8025" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8025" ref_url="https://www.suse.com/security/cve/CVE-2020-8025" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:45-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010922.html" source="SUSE-SU"/>
    <description>
    A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the pcp package to unintended settings. This issue affects: SUSE Linux Enterprise Server 12-SP4 permissions versions prior to 20170707-3.24.1. SUSE Linux Enterprise Server 15-LTSS permissions versions prior to 20180125-3.27.1. SUSE Linux Enterprise Server for SAP 15 permissions versions prior to 20180125-3.27.1. openSUSE Leap 15.1 permissions versions prior to 20181116-lp151.4.24.1. openSUSE Tumbleweed permissions versions prior to 20200624.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8025/">CVE-2020-8025</cve>
	<bugzilla href="https://bugzilla.suse.com/1171883">SUSE bug 1171883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334167" comment="permissions is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8032</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8032" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8032" ref_url="https://www.suse.com/security/cve/CVE-2020-8032" source="SUSE CVE"/>
    <description>
    A Insecure Temporary File vulnerability in the packaging of cyrus-sasl of openSUSE Factory allows local attackers to escalate to root. This issue affects: openSUSE Factory cyrus-sasl version 2.1.27-4.2 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8032/">CVE-2020-8032</cve>
	<bugzilla href="https://bugzilla.suse.com/1180669">SUSE bug 1180669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625490" comment="cyrus-sasl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8036</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8036" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8036" ref_url="https://www.suse.com/security/cve/CVE-2020-8036" source="SUSE CVE"/>
    <description>
    The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8036/">CVE-2020-8036</cve>
	<bugzilla href="https://bugzilla.suse.com/1178460">SUSE bug 1178460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333975" comment="tcpdump is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8037</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8037" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007788.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LS4ETM3JSH2SWUOYCYLRBRPQPCJ7QXGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1986-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLS7QAB5MKRGXWLJ5MLIV2TPU4TWVXE5/" source="SUSE-SU"/>
    <description>
    The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037</cve>
	<bugzilla href="https://bugzilla.suse.com/1178466">SUSE bug 1178466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334501" comment="tcpdump is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    opj_t1_clbl_decode_processor in openjp2/t1.c in OpenJPEG 2.3.1 through 2020-01-28 has a heap-based buffer overflow in the qmfbid==1 case, a different issue than CVE-2020-6851.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334003" comment="ghostscript is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8151</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8151" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8151" ref_url="https://www.suse.com/security/cve/CVE-2020-8151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
    <description>
    There is a possible information disclosure issue in Active Resource &lt;v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8151/">CVE-2020-8151</cve>
	<bugzilla href="https://bugzilla.suse.com/1171560">SUSE bug 1171560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596445" comment="ansible-2.2.3.0-12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596446" comment="crowbar-core-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596447" comment="crowbar-core-branding-upstream-4.0+git.1580209654.1d112d31f-9.66.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596448" comment="crowbar-ha-4.0+git.1585316203.d6ad2c8-4.52.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596449" comment="crowbar-openstack-4.0+git.1589804581.9972163f0-9.71.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596450" comment="grafana-4.6.5-1.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596451" comment="keepalived-2.0.19-1.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596452" comment="kibana-4.6.3-5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596453" comment="memcached-1.5.17-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596454" comment="monasca-installer-20180608_12.47-12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596455" comment="openstack-dashboard-theme-SUSE-2016.2-5.12.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596456" comment="openstack-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596457" comment="openstack-manila-api-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596458" comment="openstack-manila-data-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596459" comment="openstack-manila-doc-3.0.1~dev30-4.12.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596460" comment="openstack-manila-scheduler-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596461" comment="openstack-manila-share-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596462" comment="openstack-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596463" comment="openstack-neutron-fwaas-doc-9.0.2~dev5-4.9.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596464" comment="openstack-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596465" comment="openstack-nova-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596466" comment="openstack-nova-cells-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596467" comment="openstack-nova-cert-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596468" comment="openstack-nova-compute-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596469" comment="openstack-nova-conductor-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596470" comment="openstack-nova-console-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596471" comment="openstack-nova-consoleauth-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596472" comment="openstack-nova-doc-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596473" comment="openstack-nova-novncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596474" comment="openstack-nova-placement-api-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596475" comment="openstack-nova-scheduler-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596476" comment="openstack-nova-serialproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596477" comment="openstack-nova-vncproxy-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596478" comment="openstack-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596479" comment="openstack-tempest-test-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596480" comment="python-Django-1.8.19-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596481" comment="python-Pillow-2.8.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596482" comment="python-manila-3.0.1~dev30-4.12.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596483" comment="python-neutron-fwaas-9.0.2~dev5-4.9.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596484" comment="python-nova-14.0.11~dev13-4.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596485" comment="python-psql2mysql-0.5.0+git.1589351878.4ef877c-1.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596486" comment="python-psutil-1.2.1-21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596487" comment="python-py-1.8.1-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596488" comment="python-pysaml2-4.0.2-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596489" comment="python-tempest-12.2.1~a0~dev177-4.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596490" comment="python-waitress-1.4.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596491" comment="rabbitmq-server-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596492" comment="rabbitmq-server-plugins-3.4.4-3.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596493" comment="release-notes-suse-openstack-cloud-7.20180803-3.18.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596494" comment="ruby2.1-rubygem-activeresource-4.0.0-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596495" comment="ruby2.1-rubygem-crowbar-client-3.9.2-7.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596496" comment="ruby2.1-rubygem-json-1_7-1.7.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596497" comment="ruby2.1-rubygem-puma-2.16.0-4.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596498" comment="zookeeper-server-3.4.10-6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8161</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8161" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8161" ref_url="https://www.suse.com/security/cve/CVE-2020-8161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007441.html" source="SUSE-SU"/>
    <description>
    A directory traversal vulnerability exists in rack &lt; 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8161/">CVE-2020-8161</cve>
	<bugzilla href="https://bugzilla.suse.com/1172037">SUSE bug 1172037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595784" comment="ruby2.1-rubygem-rack-1.6.13-3.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8162</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8162" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8162" ref_url="https://www.suse.com/security/cve/CVE-2020-8162" source="SUSE CVE"/>
    <description>
    A client side enforcement of server side security vulnerability exists in rails &lt; 5.2.4.2 and rails &lt; 6.0.3.1 ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user bypassing upload limits.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8162/">CVE-2020-8162</cve>
	<bugzilla href="https://bugzilla.suse.com/1172163">SUSE bug 1172163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334392" comment="rubygem-rails-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8163</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8163" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8163" ref_url="https://www.suse.com/security/cve/CVE-2020-8163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007231.html" source="SUSE-SU"/>
    <description>
    The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8163/">CVE-2020-8163</cve>
	<bugzilla href="https://bugzilla.suse.com/1173144">SUSE bug 1173144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595700" comment="ruby2.1-rubygem-actionview-4_2-4.2.9-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595701" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8164</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8164" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1533-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1536-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1575-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A deserialization of untrusted data vulnerability exists in rails &lt; 5.2.4.3, rails &lt; 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164</cve>
	<bugzilla href="https://bugzilla.suse.com/1172177">SUSE bug 1172177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334393" comment="rubygem-actionpack-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8165</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8165" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1677-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1679-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A deserialization of untrusted data vulnernerability exists in rails &lt; 5.2.4.3, rails &lt; 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165</cve>
	<bugzilla href="https://bugzilla.suse.com/1172186">SUSE bug 1172186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595950" comment="ruby2.1-rubygem-activesupport-4_2-4.2.9-7.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8166</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A CSRF forgery vulnerability exists in rails &lt; 5.2.5, rails &lt; 6.0.4 that makes it possible for an attacker to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166</cve>
	<bugzilla href="https://bugzilla.suse.com/1172182">SUSE bug 1172182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334392" comment="rubygem-rails-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8167</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8167" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8167" ref_url="https://www.suse.com/security/cve/CVE-2020-8167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A CSRF vulnerability exists in rails &lt;= 6.0.3 rails-ujs module that could allow attackers to send CSRF tokens to wrong domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8167/">CVE-2020-8167</cve>
	<bugzilla href="https://bugzilla.suse.com/1172184">SUSE bug 1172184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334393" comment="rubygem-actionpack-4_2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334394" comment="rubygem-actionview-4_2 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8172</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8172" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8172" ref_url="https://www.suse.com/security/cve/CVE-2020-8172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006933.html" source="SUSE-SU"/>
    <description>
    TLS session reuse can lead to host certificate verification bypass in node version &lt; 12.18.0 and &lt; 14.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8172/">CVE-2020-8172</cve>
	<bugzilla href="https://bugzilla.suse.com/1172441">SUSE bug 1172441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8174</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8174" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0802-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html" source="SUSE-SU"/>
    <description>
    napi_get_value_string_*() allows various kinds of memory corruption in node &lt; 10.21.0, 12.18.0, and &lt; 14.4.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174</cve>
	<bugzilla href="https://bugzilla.suse.com/1172443">SUSE bug 1172443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595623" comment="nodejs6-6.17.1-11.37.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0883-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00058.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0908-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-06/msg00072.html" source="SUSE-SU"/>
    <description>
    curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531051" comment="curl-7.37.0-37.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531052" comment="libcurl4-7.37.0-37.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531053" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551497" comment="curl-7.37.0-37.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551498" comment="libcurl4-7.37.0-37.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551499" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595635" comment="curl-7.37.0-37.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595636" comment="libcurl4-7.37.0-37.47.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551499" comment="libcurl4-32bit-7.37.0-37.47.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8184</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8184" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A reliance on cookies without validation/integrity check security vulnerability exists in rack &lt; 2.2.3, rack &lt; 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184</cve>
	<bugzilla href="https://bugzilla.suse.com/1173351">SUSE bug 1173351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193081">SUSE bug 1193081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595784" comment="ruby2.1-rubygem-rack-1.6.13-3.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8185</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8185" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007702.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W26GJJ7QXIADWB6ZCQWC2BUZD2ALYVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7MCDUWQEXA3XGI7X2XPATA7YTNVDYTSF/" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability exists in Rails &lt;6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185</cve>
	<bugzilla href="https://bugzilla.suse.com/1173564">SUSE bug 1173564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334392" comment="rubygem-rails-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8201</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8201" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8201" ref_url="https://www.suse.com/security/cve/CVE-2020-8201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html" source="SUSE-SU"/>
    <description>
    Node.js &lt; 12.18.4 and &lt; 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8201/">CVE-2020-8201</cve>
	<bugzilla href="https://bugzilla.suse.com/1176605">SUSE bug 1176605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8251</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8251" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8251" ref_url="https://www.suse.com/security/cve/CVE-2020-8251" source="SUSE CVE"/>
    <description>
    Node.js &lt; 14.11.0 is vulnerable to HTTP denial of service (DoS) attacks based on delayed requests submission which can make the server unable to accept new connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8251/">CVE-2020-8251</cve>
	<bugzilla href="https://bugzilla.suse.com/1176604">SUSE bug 1176604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334390" comment="nodejs6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8252</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8252" ref_url="https://www.suse.com/security/cve/CVE-2020-8252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007514.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1616-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1660-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html" source="SUSE-SU"/>
    <description>
    The implementation of realpath in libuv &lt; 10.22.1, &lt; 12.18.4, and &lt; 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8252/">CVE-2020-8252</cve>
	<bugzilla href="https://bugzilla.suse.com/1176589">SUSE bug 1176589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8264</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8264" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8264" ref_url="https://www.suse.com/security/cve/CVE-2020-8264" source="SUSE CVE"/>
    <description>
    In actionpack gem &gt;= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8264/">CVE-2020-8264</cve>
	<bugzilla href="https://bugzilla.suse.com/1177521">SUSE bug 1177521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334393" comment="rubygem-actionpack-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8265</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYFKSVZAWD7RDU5OST2FANHMDWL4VNM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
    <description>
    Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265</cve>
	<bugzilla href="https://bugzilla.suse.com/1180553">SUSE bug 1180553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8277</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8277" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MTWRQJHU72Z3SIFY23FTPWRPBJZFDROF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7UCQ5MCCDUAGSMKN2NKE5XIFE37DNED/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYFKSVZAWD7RDU5OST2FANHMDWL4VNM7/" source="SUSE-SU"/>
    <description>
    A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions &lt; 15.2.1, &lt; 14.15.1, and &lt; 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277</cve>
	<bugzilla href="https://bugzilla.suse.com/1178882">SUSE bug 1178882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8286</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286</cve>
	<bugzilla href="https://bugzilla.suse.com/1179593">SUSE bug 1179593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8287</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYFKSVZAWD7RDU5OST2FANHMDWL4VNM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0195-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBRCEZ5AUMB5RCV3OQ3WB7MSZEL755XF/" source="SUSE-SU"/>
    <description>
    Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287</cve>
	<bugzilla href="https://bugzilla.suse.com/1180554">SUSE bug 1180554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8315" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8315" ref_url="https://www.suse.com/security/cve/CVE-2020-8315" source="SUSE CVE"/>
    <description>
    In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker's copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system's copy. Windows 8 and later are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8315/">CVE-2020-8315</cve>
	<bugzilla href="https://bugzilla.suse.com/1173935">SUSE bug 1173935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<bugzilla href="https://bugzilla.suse.com/1162109">SUSE bug 1162109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8449" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8450" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<bugzilla href="https://bugzilla.suse.com/1162687">SUSE bug 1162687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0274-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530981" comment="python-devel-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531794" comment="python3-devel-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530973" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530974" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531790" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530975" comment="python-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530976" comment="python-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530977" comment="python-base-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530978" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530979" comment="python-curses-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530980" comment="python-demo-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530984" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530985" comment="python-idle-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530987" comment="python-tk-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530988" comment="python-xml-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531791" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531792" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531793" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009548994" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548995" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549121" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548996" comment="python-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548997" comment="python-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548998" comment="python-base-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548999" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549000" comment="python-curses-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549001" comment="python-demo-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549002" comment="python-devel-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549003" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549004" comment="python-idle-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549005" comment="python-tk-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549006" comment="python-xml-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549122" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549123" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549124" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549125" comment="python3-devel-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595582" comment="libpython2_7-1_0-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548995" comment="libpython2_7-1_0-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596282" comment="libpython3_4m1_0-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595583" comment="python-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548997" comment="python-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595584" comment="python-base-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009548999" comment="python-base-32bit-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595585" comment="python-curses-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595586" comment="python-demo-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595587" comment="python-devel-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530982" comment="python-doc-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530983" comment="python-doc-pdf-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595588" comment="python-gdbm-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595589" comment="python-idle-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530986" comment="python-rpm-macros-20200207.5feb6c1-3.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595590" comment="python-tk-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595591" comment="python-xml-2.7.17-28.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596283" comment="python3-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596284" comment="python3-base-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596285" comment="python3-curses-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596286" comment="python3-devel-3.4.10-25.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530989" comment="shared-python-startup-0.1-1.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8517" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0307-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0606-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0623-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00018.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Squid before 4.10. Due to incorrect input validation, the NTLM authentication credentials parser in ext_lm_group_acl may write to memory outside the credentials buffer. On systems with memory access protections, this can result in the helper process being terminated unexpectedly. This leads to the Squid process also terminating and a denial of service for all clients using the proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<bugzilla href="https://bugzilla.suse.com/1162691">SUSE bug 1162691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531763" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552043" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596232" comment="squid-3.5.21-26.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8597" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0286-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00006.html" source="SUSE-SU"/>
    <description>
    eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<bugzilla href="https://bugzilla.suse.com/1162610">SUSE bug 1162610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009522651" comment="ppp-2.4.7-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009549063" comment="ppp-2.4.7-4.3.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596193" comment="ppp-2.4.7-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530990" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530991" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530993" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530994" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530996" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530997" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531000" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551454" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551455" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551456" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551457" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551459" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537488" comment="qemu-ppc-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551461" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595592" comment="qemu-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595593" comment="qemu-block-curl-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530992" comment="qemu-block-rbd-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595594" comment="qemu-block-ssh-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595595" comment="qemu-guest-agent-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530995" comment="qemu-ipxe-1.0.0-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551458" comment="qemu-kvm-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595596" comment="qemu-lang-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551460" comment="qemu-s390-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530998" comment="qemu-seabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530999" comment="qemu-sgabios-8-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595597" comment="qemu-tools-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531001" comment="qemu-vgabios-1.9.1-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531002" comment="qemu-x86-2.6.2-41.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531180" comment="xen-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531181" comment="xen-doc-html-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531182" comment="xen-libs-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531183" comment="xen-libs-32bit-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531184" comment="xen-tools-4.7.6_08-43.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531185" comment="xen-tools-domU-4.7.6_08-43.64.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetches in an attempt to process the referral. This has at least two potential effects: The performance of the recursing server can potentially be degraded by the additional work required to perform these fetches, and The attacker can exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531096" comment="bind-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531097" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531099" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531100" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531101" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551531" comment="bind-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551532" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551533" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551534" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551535" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595659" comment="bind-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595660" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595661" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551534" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595662" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531096" comment="bind-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531097" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531099" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531100" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531101" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551531" comment="bind-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551532" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551533" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551534" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551535" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595659" comment="bind-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595660" comment="bind-chrootenv-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531098" comment="bind-doc-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595661" comment="bind-libs-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551534" comment="bind-libs-32bit-9.9.9P1-63.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595662" comment="bind-utils-9.9.9P1-63.17.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1699-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1701-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html" source="SUSE-SU"/>
    <description>
    In BIND 9.0.0 -&gt; 9.11.21, 9.12.0 -&gt; 9.16.5, 9.17.0 -&gt; 9.17.3, also affects 9.9.3-S1 -&gt; 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622</cve>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188888">SUSE bug 1188888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191120">SUSE bug 1191120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627796" comment="bind-9.9.9P1-63.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627797" comment="bind-chrootenv-9.9.9P1-63.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627784" comment="bind-doc-9.9.9P1-63.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627798" comment="bind-libs-9.9.9P1-63.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627786" comment="bind-libs-32bit-9.9.9P1-63.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627799" comment="bind-utils-9.9.9P1-63.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008341.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0375-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTREZMKE6OIOIY3CLBWV3GIOPB4EM4DX/" source="SUSE-SU"/>
    <description>
    BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -&gt; 9.11.27, 9.12.0 -&gt; 9.16.11, and versions BIND 9.11.3-S1 -&gt; 9.11.27-S1 and 9.16.8-S1 -&gt; 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -&gt; 9.17.1 of the BIND 9.17 development branch
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182483">SUSE bug 1182483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192708">SUSE bug 1192708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196172">SUSE bug 1196172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531903" comment="bind-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531904" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531906" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531907" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531908" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552109" comment="bind-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552110" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552111" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552112" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552113" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596376" comment="bind-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596377" comment="bind-chrootenv-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531905" comment="bind-doc-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596378" comment="bind-libs-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552112" comment="bind-libs-32bit-9.9.9P1-63.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596379" comment="bind-utils-9.9.9P1-63.20.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179661">SUSE bug 1179661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552474" comment="kgraft-patch-4_4_121-92_129-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552475" comment="kgraft-patch-4_4_121-92_135-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552476" comment="kgraft-patch-4_4_121-92_138-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552477" comment="kgraft-patch-4_4_121-92_141-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531606" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531607" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531608" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531612" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551954" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551955" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551956" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551958" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537939" comment="kgraft-patch-4_4_121-92_129-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537940" comment="kgraft-patch-4_4_121-92_135-default-5-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537941" comment="kgraft-patch-4_4_121-92_138-default-5-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537942" comment="kgraft-patch-4_4_121-92_141-default-4-2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537916" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596102" comment="kernel-default-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596103" comment="kernel-default-base-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596104" comment="kernel-default-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551957" comment="kernel-default-man-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531609" comment="kernel-devel-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531610" comment="kernel-macros-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531611" comment="kernel-source-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596105" comment="kernel-syms-4.4.121-92.146.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531613" comment="kgraft-patch-4_4_121-92_146-default-1-3.5.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531614" comment="ucode-intel-20201118-13.81.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8834</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8834" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8834" ref_url="https://www.suse.com/security/cve/CVE-2020-8834" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html" source="SUSE-SU"/>
    <description>
    KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can cause the host kernel to panic. There were two commits that, according to the reporter, introduced the vulnerability: f024ee098476 ("KVM: PPC: Book3S HV: Pull out TM state save/restore into separate procedures") 87a11bb6a7f7 ("KVM: PPC: Book3S HV: Work around XER[SO] bug in fake suspend mode") The former landed in 4.8, the latter in 4.17. This was fixed without realizing the impact in 4.18 with the following three commits, though it's believed the first is the only strictly necessary commit: 6f597c6b63b6 ("KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm()") 7b0e827c6970 ("KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm") 009c872a8bc4 ("KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file")
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8834/">CVE-2020-8834</cve>
	<bugzilla href="https://bugzilla.suse.com/1168276">SUSE bug 1168276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173945">SUSE bug 1173945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8835</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8835" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the introducing commit was backported to that branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue is aka ZDI-CAN-10780)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835</cve>
	<bugzilla href="https://bugzilla.suse.com/1167722">SUSE bug 1167722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173755">SUSE bug 1173755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8991</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8991" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8991" ref_url="https://www.suse.com/security/cve/CVE-2020-8991" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** vg_lookup in daemons/lvmetad/lvmetad-core.c in LVM2 2.02 mismanages memory, leading to an lvmetad memory leak, as demonstrated by running pvs. NOTE: RedHat disputes CVE-2020-8991 as not being a vulnerability since there’s no apparent route to either privilege escalation or to denial of service through the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8991/">CVE-2020-8991</cve>
	<bugzilla href="https://bugzilla.suse.com/1164126">SUSE bug 1164126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339282" comment="lvm2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8992" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html" source="SUSE-SU"/>
    <description>
    ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327</cve>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633614" comment="libsqlite3-0-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633604" comment="libsqlite3-0-32bit-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633615" comment="sqlite3-3.36.0-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633616" comment="sqlite3-devel-3.36.0-9.18.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530947" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530948" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530949" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530953" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551444" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551445" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551446" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551448" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009537459" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595570" comment="kernel-default-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595571" comment="kernel-default-base-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595572" comment="kernel-default-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551447" comment="kernel-default-man-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530950" comment="kernel-devel-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530951" comment="kernel-macros-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530952" comment="kernel-source-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595573" comment="kernel-syms-4.4.121-92.129.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530954" comment="kgraft-patch-4_4_121-92_129-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9402</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9402" ref_url="https://www.suse.com/security/cve/CVE-2020-9402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
    <description>
    Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9402/">CVE-2020-9402</cve>
	<bugzilla href="https://bugzilla.suse.com/1165022">SUSE bug 1165022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0711-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html" source="SUSE-SU"/>
    <description>
    When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<bugzilla href="https://bugzilla.suse.com/1171928">SUSE bug 1171928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196395">SUSE bug 1196395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009530964" comment="tomcat-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530965" comment="tomcat-admin-webapps-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530966" comment="tomcat-docs-webapp-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530967" comment="tomcat-el-3_0-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530968" comment="tomcat-javadoc-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530969" comment="tomcat-jsp-2_3-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530970" comment="tomcat-lib-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530971" comment="tomcat-servlet-3_1-api-8.0.53-29.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009530972" comment="tomcat-webapps-8.0.53-29.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007655.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1285-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00068.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1293-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1792-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-10/msg00081.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178074">SUSE bug 1178074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531259" comment="apache2-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531261" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531262" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531263" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531264" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551666" comment="apache2-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551667" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551668" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551669" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551670" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595758" comment="apache2-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531260" comment="apache2-doc-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595759" comment="apache2-example-pages-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595760" comment="apache2-prefork-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595761" comment="apache2-utils-2.4.23-29.63.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595762" comment="apache2-worker-2.4.23-29.63.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551539" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551540" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551541" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551542" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551543" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551544" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551545" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595666" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595667" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595668" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595669" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595671" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595672" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551539" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551540" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551541" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551542" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551543" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551544" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551545" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595666" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595667" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595668" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595669" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595671" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595672" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551539" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551540" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551541" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551542" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551543" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551544" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551545" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595666" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595667" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595668" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595669" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595671" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595672" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551539" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551540" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551541" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551542" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551543" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551544" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551545" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595666" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595667" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595668" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595669" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595671" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595672" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551539" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551540" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551541" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551542" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551543" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551544" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551545" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595666" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595667" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595668" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595669" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595671" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595672" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
    <description>
    An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551539" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551540" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551541" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551542" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551543" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551544" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551545" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595666" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595667" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595668" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595669" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595671" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595672" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1064-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A remote attacker may be able to cause arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850</cve>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531105" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531106" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531108" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531109" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531110" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531111" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531112" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551539" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551540" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551541" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551542" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551543" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551544" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551545" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595666" comment="libjavascriptcoregtk-4_0-18-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595667" comment="libwebkit2gtk-4_0-37-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531107" comment="libwebkit2gtk3-lang-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595668" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595669" comment="typelib-1_0-WebKit2-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595671" comment="webkit2gtk-4_0-injected-bundles-2.28.3-2.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595672" comment="webkit2gtk3-devel-2.28.3-2.56.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531179" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551595" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551596" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551597" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551598" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551599" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551600" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551601" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595707" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595708" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595709" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595710" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595711" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595713" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531179" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551595" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551596" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551597" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551598" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551599" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551600" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551601" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595707" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595708" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595709" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595710" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595711" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595713" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531179" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551595" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551596" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551597" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551598" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551599" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551600" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551601" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595707" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595708" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595709" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595710" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595711" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595713" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531179" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551595" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551596" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551597" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551598" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551599" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551600" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551601" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595707" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595708" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595709" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595710" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595711" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595713" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531179" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551595" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551596" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551597" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551598" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551599" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551600" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551601" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595707" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595708" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595709" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595710" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595711" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595713" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1256-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00054.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1275-1" ref_url="https://lists.opensuse.org/opensuse-security-announce/2020-08/msg00062.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531172" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531173" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531175" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531176" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531177" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531178" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531179" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009551595" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551596" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551597" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551598" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551599" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551600" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009551601" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009595707" comment="libjavascriptcoregtk-4_0-18-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595708" comment="libwebkit2gtk-4_0-37-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531174" comment="libwebkit2gtk3-lang-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595709" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595710" comment="typelib-1_0-WebKit2-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595711" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595712" comment="webkit2gtk-4_0-injected-bundles-2.28.4-2.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009595713" comment="webkit2gtk3-devel-2.28.4-2.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0, Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334506" comment="webkit2gtk3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334506" comment="webkit2gtk3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IUIQR7TXEJAY36F5QQB7QCCGHWKYG7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFB3TOJ4CYRIFTJV3HUC6V24BQQDJYA4/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983</cve>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179910">SUSE bug 1179910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179911">SUSE bug 1179911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179912">SUSE bug 1179912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334506" comment="webkit2gtk3 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552376" comment="webkit2gtk3-devel-2.32.1-2.63.3 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089</cve>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0127" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/" source="SUSE-SU"/>
    <description>
    Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/" source="SUSE-SU"/>
    <description>
    Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0146" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/" source="SUSE-SU"/>
    <description>
    Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193500">SUSE bug 1193500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0326" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0284-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YI2F4UP2SUM3KDNM2O5RK57I3NEYBJ26/" source="SUSE-SU"/>
    <description>
    In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326</cve>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531899" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552105" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596372" comment="wpa_supplicant-2.6-15.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0342</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0342" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009202.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0605" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188381">SUSE bug 1188381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671786" comment="kernel-default-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671787" comment="kernel-default-base-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671788" comment="kernel-default-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671789" comment="kernel-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671790" comment="kernel-macros-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671791" comment="kernel-source-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671792" comment="kernel-syms-4.4.121-92.169.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0935" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0935" ref_url="https://www.suse.com/security/cve/CVE-2021-0935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    In ip6_xmit of ip6_output.c, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-168607263References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0935/">CVE-2021-0935</cve>
	<bugzilla href="https://bugzilla.suse.com/1192032">SUSE bug 1192032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192042">SUSE bug 1192042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1252" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6VSAMGIC5SWPJK6HWIGRENALM6YMT46/" source="SUSE-SU"/>
    <description>
    A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252</cve>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552210" comment="clamav-0.103.2-33.35.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1404" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6VSAMGIC5SWPJK6HWIGRENALM6YMT46/" source="SUSE-SU"/>
    <description>
    A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404</cve>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552210" comment="clamav-0.103.2-33.35.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1405" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6VSAMGIC5SWPJK6HWIGRENALM6YMT46/" source="SUSE-SU"/>
    <description>
    A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405</cve>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552210" comment="clamav-0.103.2-33.35.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Maliciously crafted web content may violate iframe sandboxing policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552376" comment="webkit2gtk3-devel-2.32.1-2.63.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
    <description>
    A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on arbitrary servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552376" comment="webkit2gtk3-devel-2.32.1-2.63.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Maliciously crafted web content may violate iframe sandboxing policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552376" comment="webkit2gtk3-devel-2.32.1-2.63.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870</cve>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552370" comment="libjavascriptcoregtk-4_0-18-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552371" comment="libwebkit2gtk-4_0-37-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539068" comment="libwebkit2gtk3-lang-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552372" comment="typelib-1_0-JavaScriptCore-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552373" comment="typelib-1_0-WebKit2-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552374" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552375" comment="webkit2gtk-4_0-injected-bundles-2.32.1-2.63.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552376" comment="webkit2gtk3-devel-2.32.1-2.63.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20177</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20178</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20178" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20178" ref_url="https://www.suse.com/security/cve/CVE-2021-20178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
    <description>
    A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20178/">CVE-2021-20178</cve>
	<bugzilla href="https://bugzilla.suse.com/1180816">SUSE bug 1180816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186493">SUSE bug 1186493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20180</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20180" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20180" ref_url="https://www.suse.com/security/cve/CVE-2021-20180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D7KK2SNPNAB353QA6BU4SNJDQ3FXZOY5/" source="SUSE-SU"/>
    <description>
    A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20180/">CVE-2021-20180</cve>
	<bugzilla href="https://bugzilla.suse.com/1180942">SUSE bug 1180942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20181" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181</cve>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20194</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20194" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20194" ref_url="https://www.suse.com/security/cve/CVE-2021-20194" source="SUSE CVE"/>
    <description>
    There is a vulnerability in the linux kernel versions higher than 5.2 (if kernel compiled with config params CONFIG_BPF_SYSCALL=y , CONFIG_BPF=y , CONFIG_CGROUPS=y , CONFIG_CGROUP_BPF=y , CONFIG_HARDENED_USERCOPY not set, and BPF hook to getsockopt is registered). As result of BPF execution, the local user can trigger bug in __cgroup_bpf_run_filter_getsockopt() function that can lead to heap overflow (because of non-hardened usercopy). The impact of attack could be deny of service or possibly privileges escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20194/">CVE-2021-20194</cve>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182010">SUSE bug 1182010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182330">SUSE bug 1182330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20196</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20196" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20196" ref_url="https://www.suse.com/security/cve/CVE-2021-20196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0177-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XYIZAS6LJG7AX5XUIXPP347424BX5VK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORE7QLMZXD7OV3HIKQUG3SXU2RG6ONFC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0210-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUV2UU2CMT6KXSJ7THBLFDIVHI27MZFH/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20196/">CVE-2021-20196</cve>
	<bugzilla href="https://bugzilla.suse.com/1181361">SUSE bug 1181361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197</cve>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20201" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008998.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AINSWYQLD5FH4GUOEP5FWWA5CMFHTUDX/" source="SUSE-SU"/>
    <description>
    A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201</cve>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552355" comment="libspice-server1-0.12.7-10.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203</cve>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20205</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20205" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20205" ref_url="https://www.suse.com/security/cve/CVE-2021-20205" source="SUSE CVE"/>
    <description>
    Libjpeg-turbo versions 2.0.91 and 2.0.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted GIF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-20205/">CVE-2021-20205</cve>
	<bugzilla href="https://bugzilla.suse.com/1183362">SUSE bug 1183362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334089" comment="libjpeg-turbo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20208</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20208" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20208" ref_url="https://www.suse.com/security/cve/CVE-2021-20208" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0639-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/65NUX6IGI72XJIWLCF5QOKIKAWWJUMEY/" source="SUSE-SU"/>
    <description>
    A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20208/">CVE-2021-20208</cve>
	<bugzilla href="https://bugzilla.suse.com/1183239">SUSE bug 1183239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334603" comment="cifs-utils is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20219" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20219" ref_url="https://www.suse.com/security/cve/CVE-2021-20219" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in n_tty_receive_char_special in drivers/tty/n_tty.c of the Linux kernel. In this flaw a local attacker with a normal user privilege could delay the loop (due to a changing ldata-&gt;read_head, and a missing sanity check) and cause a threat to the system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20219/">CVE-2021-20219</cve>
	<bugzilla href="https://bugzilla.suse.com/1184397">SUSE bug 1184397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20221" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221</cve>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334015" comment="qemu is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531930" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552128" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538177" comment="grub2-powerpc-ieee1275-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596396" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20226</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20226" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20226" ref_url="https://www.suse.com/security/cve/CVE-2021-20226" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the io_uring in Linux kernel, where a local attacker with a user privilege could cause a denial of service problem on the system The issue results from the lack of validating the existence of an object prior to performing operations on the object by not incrementing the file reference counter while in use. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20226/">CVE-2021-20226</cve>
	<bugzilla href="https://bugzilla.suse.com/1180564">SUSE bug 1180564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181846">SUSE bug 1181846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20227</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20227" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20227" ref_url="https://www.suse.com/security/cve/CVE-2021-20227" source="SUSE CVE"/>
    <description>
    A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-20227/">CVE-2021-20227</cve>
	<bugzilla href="https://bugzilla.suse.com/1181261">SUSE bug 1181261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333983" comment="sqlite3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20229</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20229" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008358.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL in versions before 13.2. This flaw allows a user with SELECT privilege on one column to craft a special query that returns all columns of the table. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229</cve>
	<bugzilla href="https://bugzilla.suse.com/1182039">SUSE bug 1182039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009339049" comment="postgresql10 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334198" comment="postgresql96 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20230</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20230" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20230" ref_url="https://www.suse.com/security/cve/CVE-2021-20230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008719.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVLGFTQ3NKK4IRG4YXB6DPOVNR7D5IAU/" source="SUSE-SU"/>
    <description>
    A flaw was found in stunnel before 5.57, where it improperly validates client certificates when it is configured to use both redirect and verifyChain options. This flaw allows an attacker with a certificate signed by a Certificate Authority, which is not the one accepted by the stunnel server, to access the tunneled service instead of being redirected to the address specified in the redirect option. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20230/">CVE-2021-20230</cve>
	<bugzilla href="https://bugzilla.suse.com/1177580">SUSE bug 1177580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334615" comment="stunnel is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20231</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20231" ref_url="https://www.suse.com/security/cve/CVE-2021-20231" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0470-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LUDG7BXPVVVALM2YUCJ2EKIRBHFXMY75/" source="SUSE-SU"/>
    <description>
    A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20231/">CVE-2021-20231</cve>
	<bugzilla href="https://bugzilla.suse.com/1183457">SUSE bug 1183457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20232</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20232" ref_url="https://www.suse.com/security/cve/CVE-2021-20232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0470-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LUDG7BXPVVVALM2YUCJ2EKIRBHFXMY75/" source="SUSE-SU"/>
    <description>
    A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20232/">CVE-2021-20232</cve>
	<bugzilla href="https://bugzilla.suse.com/1183456">SUSE bug 1183456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333974" comment="gnutls is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018162.html" source="SUSE-SU"/>
		<reference ref_id="TID000019892" ref_url="https://www.suse.com/support/kb/doc/?id=000019892" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0462-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXPYL42MSKRB4D7LRFMW7PBGGLKSJKPS/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183135">SUSE bug 1183135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192833">SUSE bug 1192833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531930" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552128" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538177" comment="grub2-powerpc-ieee1275-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596396" comment="grub2-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531931" comment="grub2-i386-pc-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552129" comment="grub2-s390x-emu-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531932" comment="grub2-snapper-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531933" comment="grub2-systemd-sleep-plugin-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531934" comment="grub2-x86_64-efi-2.02-115.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531935" comment="grub2-x86_64-xen-2.02-115.59.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20239</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20239" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20239" ref_url="https://www.suse.com/security/cve/CVE-2021-20239" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20239/">CVE-2021-20239</cve>
	<bugzilla href="https://bugzilla.suse.com/1182010">SUSE bug 1182010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182330">SUSE bug 1182330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20240</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20240" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20240" ref_url="https://www.suse.com/security/cve/CVE-2021-20240" source="SUSE CVE"/>
    <description>
    A flaw was found in gdk-pixbuf in versions before 2.42.0. An integer wraparound leading to an out of bounds write can occur when a crafted GIF image is loaded. An attacker may cause applications to crash or could potentially execute code on the victim system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20240/">CVE-2021-20240</cve>
	<bugzilla href="https://bugzilla.suse.com/1182410">SUSE bug 1182410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333994" comment="gdk-pixbuf is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20241</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20241" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20241" ref_url="https://www.suse.com/security/cve/CVE-2021-20241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008374.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SG6MVYKVW7O5POXSG4CGOWDIOAZCWWT/" source="SUSE-SU"/>
    <description>
    A flaw was found in ImageMagick in coders/jp2.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20241/">CVE-2021-20241</cve>
	<bugzilla href="https://bugzilla.suse.com/1182335">SUSE bug 1182335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334086" comment="ImageMagick is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20248</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20248" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20248" ref_url="https://www.suse.com/security/cve/CVE-2021-20248" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20248/">CVE-2021-20248</cve>
	<bugzilla href="https://bugzilla.suse.com/1183547">SUSE bug 1183547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009347616" comment="rpm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJGQFNCBDL3CAZODHIFOKKWU3XGKLEKA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANLZ3MSWRYNRTSO7FPC7CORZ4WAS3YKE/" source="SUSE-SU"/>
    <description>
    A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185886">SUSE bug 1185886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189860">SUSE bug 1189860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552281" comment="libdcerpc-atsvc0-4.2.4-28.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552237" comment="libdcerpc-binding0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552238" comment="libdcerpc-binding0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552239" comment="libdcerpc0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552240" comment="libdcerpc0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552241" comment="libndr-krb5pac0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552242" comment="libndr-krb5pac0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552243" comment="libndr-nbt0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552244" comment="libndr-nbt0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552245" comment="libndr-standard0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552246" comment="libndr-standard0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552247" comment="libndr0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552248" comment="libndr0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552249" comment="libnetapi0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552250" comment="libnetapi0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552251" comment="libsamba-credentials0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552252" comment="libsamba-credentials0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552253" comment="libsamba-errors0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552254" comment="libsamba-errors0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552255" comment="libsamba-hostconfig0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552256" comment="libsamba-hostconfig0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552257" comment="libsamba-passdb0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552258" comment="libsamba-passdb0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552259" comment="libsamba-util0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552260" comment="libsamba-util0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552261" comment="libsamdb0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552262" comment="libsamdb0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552263" comment="libsmbclient0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552264" comment="libsmbclient0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552265" comment="libsmbconf0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552266" comment="libsmbconf0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552267" comment="libsmbldap0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552268" comment="libsmbldap0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552269" comment="libtevent-util0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552270" comment="libtevent-util0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552271" comment="libwbclient0-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552272" comment="libwbclient0-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552273" comment="samba-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552274" comment="samba-client-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552275" comment="samba-client-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552276" comment="samba-doc-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552277" comment="samba-libs-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552278" comment="samba-libs-32bit-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552279" comment="samba-winbind-4.4.2-38.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552280" comment="samba-winbind-32bit-4.4.2-38.42.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20255" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653168" comment="qemu-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653169" comment="qemu-block-curl-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653170" comment="qemu-block-rbd-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653171" comment="qemu-block-ssh-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653172" comment="qemu-guest-agent-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653173" comment="qemu-ipxe-1.0.0-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653174" comment="qemu-kvm-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653175" comment="qemu-lang-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653176" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653177" comment="qemu-sgabios-8-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653178" comment="qemu-tools-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653179" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653180" comment="qemu-x86-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20257" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
    <description>
    An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20265" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265</cve>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20268</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20268" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20268" ref_url="https://www.suse.com/security/cve/CVE-2021-20268" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An out-of-bounds access flaw was found in the Linux kernel's implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20268/">CVE-2021-20268</cve>
	<bugzilla href="https://bugzilla.suse.com/1183077">SUSE bug 1183077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183095">SUSE bug 1183095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20277</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0469-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLNA72I7E6KKMIQOHXHYRPDYGMW5KH4K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJGQFNCBDL3CAZODHIFOKKWU3XGKLEKA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANLZ3MSWRYNRTSO7FPC7CORZ4WAS3YKE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333940" comment="samba is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20284" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284</cve>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334150" comment="binutils is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20294" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3643-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6GNK27D6NPRSWPQWFJADKDTOHPOGY6C/" source="SUSE-SU"/>
    <description>
    A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294</cve>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196680">SUSE bug 1196680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334069" comment="binutils is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009654414" comment="binutils-2.37-9.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654415" comment="binutils-devel-2.37-9.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654416" comment="libctf-nobfd0-2.37-9.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654417" comment="libctf0-2.37-9.44.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20296</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20296" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20296" ref_url="https://www.suse.com/security/cve/CVE-2021-20296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008732.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0670-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRXYHURHLDTSCIDOVAICJNNLPZTJP6NQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR in versions before 3.0.0-beta. A crafted input file supplied by an attacker, that is processed by the Dwa decompression functionality of OpenEXR's IlmImf library, could cause a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20296/">CVE-2021-20296</cve>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184355">SUSE bug 1184355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334075" comment="openexr is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20297</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20297" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20297" ref_url="https://www.suse.com/security/cve/CVE-2021-20297" source="SUSE CVE"/>
    <description>
    A flaw was found in NetworkManager in versions before 1.30.0. Setting match.path and activating a profile crashes NetworkManager. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20297/">CVE-2021-20297</cve>
	<bugzilla href="https://bugzilla.suse.com/1184433">SUSE bug 1184433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333999" comment="NetworkManager is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20298" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298</cve>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20299" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299</cve>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20300" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR's hufUncompress functionality in OpenEXR/IlmImf/ImfHuf.cpp. This flaw allows an attacker who can submit a crafted file that is processed by OpenEXR, to trigger an integer overflow. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300</cve>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20302" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302</cve>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20303" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw found in function dataWindowForTile() of IlmImf/ImfTiledMisc.cpp. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger an integer overflow, leading to an out-of-bounds write on the heap. The greatest impact of this flaw is to application availability, with some potential impact to data integrity as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303</cve>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20304" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304</cve>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEQQBLTWQPDTYRTWQZSXENUU6TSCBJ5R/" source="SUSE-SU"/>
    <description>
    A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA &amp; ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305</cve>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552228" comment="libhogweed2-2.7.1-13.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538876" comment="libhogweed2-32bit-2.7.1-13.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552229" comment="libnettle4-2.7.1-13.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538878" comment="libnettle4-32bit-2.7.1-13.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009913.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193290">SUSE bug 1193290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21240</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21240" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019148.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0772-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANZIEBB4AJVGYC2KYDE7RDSTFBBTL5ID/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BX6XMG6VSE6RQ4LZXDDXUYZZZ2FYOQM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DTGWJY2VML3YAAFAOOYJAQP5SZ4X6XWG/" source="SUSE-SU"/>
    <description>
    httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.19.0, a malicious server which responds with long series of "\xa0" characters in the "www-authenticate" header may cause Denial of Service (CPU burn while parsing header) of the httplib2 client accessing said server. This is fixed in version 0.19.0 which contains a new implementation of auth headers parsing using the pyparsing library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240</cve>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009525303" comment="python-httplib2-0.19.0-7.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33ZBSRS6RUAL5LAGWR6DDONQJXFU6FIT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2555-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LNQQ262LF4R2GIO7S7J6NRAUDKV7VGPB/" source="SUSE-SU"/>
    <description>
    Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300</cve>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531952" comment="git-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531953" comment="git-core-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531954" comment="git-cvs-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531955" comment="git-daemon-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531956" comment="git-doc-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531957" comment="git-email-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531958" comment="git-gui-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531959" comment="git-svn-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531960" comment="git-web-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531961" comment="gitk-2.26.2-27.43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552142" comment="git-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552143" comment="git-core-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552144" comment="git-cvs-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552145" comment="git-daemon-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531956" comment="git-doc-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552146" comment="git-email-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552147" comment="git-gui-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552148" comment="git-svn-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552149" comment="git-web-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552150" comment="gitk-2.26.2-27.43.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596407" comment="git-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596408" comment="git-core-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596409" comment="git-cvs-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596410" comment="git-daemon-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531956" comment="git-doc-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596411" comment="git-email-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596412" comment="git-gui-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596413" comment="git-svn-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596414" comment="git-web-2.26.2-27.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596415" comment="gitk-2.26.2-27.43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21419</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21419" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21419" ref_url="https://www.suse.com/security/cve/CVE-2021-21419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009745.html" source="SUSE-SU"/>
    <description>
    Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reasonable limits. As a workaround, restricting memory usage via OS limits would help against overall machine exhaustion, but there is no workaround to protect Eventlet process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21419/">CVE-2021-21419</cve>
	<bugzilla href="https://bugzilla.suse.com/1185836">SUSE bug 1185836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009474466" comment="python-aioeventlet is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2161" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGMX3TVL2LOHFGYNJZIU2YSG4IKEZZAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161</cve>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627215" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627216" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627217" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627218" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGMX3TVL2LOHFGYNJZIU2YSG4IKEZZAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0776-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NU2NP3UWZ4SXHVJIVENLSU4X5TAKTHL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UP4BA2GSD3EW2BMQV2VFVG2F3GMETZ5M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1666-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMIXIE2QCSQNEBZOFYWWIWYINHYQA6A5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNSY4TLUBETGRMX7GD6NXLOWEVJP6B4Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552366" comment="java-1_8_0-openjdk-1.8.0.292-27.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552367" comment="java-1_8_0-openjdk-demo-1.8.0.292-27.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552368" comment="java-1_8_0-openjdk-devel-1.8.0.292-27.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552369" comment="java-1_8_0-openjdk-headless-1.8.0.292-27.60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779</cve>
	<bugzilla href="https://bugzilla.suse.com/1188293">SUSE bug 1188293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KJIY3NX4MIKAMIQIFUSKB4JVJBMJUFI/" source="SUSE-SU"/>
    <description>
    An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806</cve>
	<bugzilla href="https://bugzilla.suse.com/1188294">SUSE bug 1188294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634387" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634388" comment="libwebkit2gtk-4_0-37-2.32.4-2.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634365" comment="libwebkit2gtk3-lang-2.32.4-2.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634389" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634390" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634391" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634392" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.71.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634393" comment="webkit2gtk3-devel-2.32.4-2.71.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22132</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22132" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22132" ref_url="https://www.suse.com/security/cve/CVE-2021-22132" source="SUSE CVE"/>
    <description>
    Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22132/">CVE-2021-22132</cve>
	<bugzilla href="https://bugzilla.suse.com/1182183">SUSE bug 1182183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22134</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22134" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22134" ref_url="https://www.suse.com/security/cve/CVE-2021-22134" source="SUSE CVE"/>
    <description>
    A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22134/">CVE-2021-22134</cve>
	<bugzilla href="https://bugzilla.suse.com/1183068">SUSE bug 1183068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22135</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22135" ref_url="https://www.suse.com/security/cve/CVE-2021-22135" source="SUSE CVE"/>
    <description>
    Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22135/">CVE-2021-22135</cve>
	<bugzilla href="https://bugzilla.suse.com/1184886">SUSE bug 1184886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22136</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22136" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22136" ref_url="https://www.suse.com/security/cve/CVE-2021-22136" source="SUSE CVE"/>
    <description>
    In Kibana versions before 7.12.0 and 6.8.15 a flaw in the session timeout was discovered where the xpack.security.session.idleTimeout setting is not being respected. This was caused by background polling activities unintentionally extending authenticated users sessions, preventing a user session from timing out.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22136/">CVE-2021-22136</cve>
	<bugzilla href="https://bugzilla.suse.com/1184860">SUSE bug 1184860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22137</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22137" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22137" ref_url="https://www.suse.com/security/cve/CVE-2021-22137" source="SUSE CVE"/>
    <description>
    In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22137/">CVE-2021-22137</cve>
	<bugzilla href="https://bugzilla.suse.com/1184885">SUSE bug 1184885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22138</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22138" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22138" ref_url="https://www.suse.com/security/cve/CVE-2021-22138" source="SUSE CVE"/>
    <description>
    In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitoring server. This could result in a man in the middle style attack against the Logstash monitoring data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22138/">CVE-2021-22138</cve>
	<bugzilla href="https://bugzilla.suse.com/1186055">SUSE bug 1186055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339424" comment="logstash is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22139</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22139" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22139" ref_url="https://www.suse.com/security/cve/CVE-2021-22139" source="SUSE CVE"/>
    <description>
    Kibana versions before 7.12.1 contain a denial of service vulnerability was found in the webhook actions due to a lack of timeout or a limit on the request size. An attacker with permissions to create webhook actions could drain the Kibana host connection pool, making Kibana unavailable for all other users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22139/">CVE-2021-22139</cve>
	<bugzilla href="https://bugzilla.suse.com/1185776">SUSE bug 1185776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22142</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22142" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22142" ref_url="https://www.suse.com/security/cve/CVE-2021-22142" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22142/">CVE-2021-22142</cve>
	<bugzilla href="https://bugzilla.suse.com/1186867">SUSE bug 1186867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339373" comment="kibana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22144</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22144" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22144" ref_url="https://www.suse.com/security/cve/CVE-2021-22144" source="SUSE CVE"/>
    <description>
    In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticsearch could create a malicious Grok query that will crash the Elasticsearch node.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22144/">CVE-2021-22144</cve>
	<bugzilla href="https://bugzilla.suse.com/1188880">SUSE bug 1188880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22145</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22145" ref_url="https://www.suse.com/security/cve/CVE-2021-22145" source="SUSE CVE"/>
    <description>
    A memory disclosure vulnerability was identified in Elasticsearch 7.10.0 to 7.13.3 error reporting. A user with the ability to submit arbitrary queries to Elasticsearch could submit a malformed query that would result in an error message returned containing previously used portions of a data buffer. This buffer could contain sensitive information such as Elasticsearch documents or authentication details.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22145/">CVE-2021-22145</cve>
	<bugzilla href="https://bugzilla.suse.com/1188596">SUSE bug 1188596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22147</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22147" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22147" ref_url="https://www.suse.com/security/cve/CVE-2021-22147" source="SUSE CVE"/>
    <description>
    Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22147/">CVE-2021-22147</cve>
	<bugzilla href="https://bugzilla.suse.com/1189168">SUSE bug 1189168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339407" comment="elasticsearch is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22173</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22173" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22173" ref_url="https://www.suse.com/security/cve/CVE-2021-22173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Memory leak in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22173/">CVE-2021-22173</cve>
	<bugzilla href="https://bugzilla.suse.com/1181598">SUSE bug 1181598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22174</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22174" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22174" ref_url="https://www.suse.com/security/cve/CVE-2021-22174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Crash in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22174/">CVE-2021-22174</cve>
	<bugzilla href="https://bugzilla.suse.com/1181599">SUSE bug 1181599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22191</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22191" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22191" ref_url="https://www.suse.com/security/cve/CVE-2021-22191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QDSEUP77D5HE3ISH2VMQR2GIAFH6DLQK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZGXWOFRVD3EFRZ6YDAJZEVPBP7IUHFI/" source="SUSE-SU"/>
    <description>
    Improper URL handling in Wireshark 3.4.0 to 3.4.3 and 3.2.0 to 3.2.11 could allow remote code execution via via packet injection or crafted capture file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22191/">CVE-2021-22191</cve>
	<bugzilla href="https://bugzilla.suse.com/1183353">SUSE bug 1183353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333947" comment="wireshark is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188411">SUSE bug 1188411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22881</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22881" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22881" ref_url="https://www.suse.com/security/cve/CVE-2021-22881" source="SUSE CVE"/>
    <description>
    The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22881/">CVE-2021-22881</cve>
	<bugzilla href="https://bugzilla.suse.com/1182160">SUSE bug 1182160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185772">SUSE bug 1185772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189627">SUSE bug 1189627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193764">SUSE bug 1193764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334393" comment="rubygem-actionpack-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22883</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22883" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22883" ref_url="https://www.suse.com/security/cve/CVE-2021-22883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IFAU2LY7VNOWXLRDXRBCJBCP2EQTMRFN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVDCMNKQUTQBM7Z7BU2BQ23WG4Y66BOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKKO266WHY2YSFJAVHWNM4DQSX4W7YZG/" source="SUSE-SU"/>
    <description>
    Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22883/">CVE-2021-22883</cve>
	<bugzilla href="https://bugzilla.suse.com/1182619">SUSE bug 1182619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22884</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22884" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IFAU2LY7VNOWXLRDXRBCJBCP2EQTMRFN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVDCMNKQUTQBM7Z7BU2BQ23WG4Y66BOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKKO266WHY2YSFJAVHWNM4DQSX4W7YZG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIHWFR7WY377VQGZYACB2WYPTO2EOYVQ/" source="SUSE-SU"/>
    <description>
    Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884</cve>
	<bugzilla href="https://bugzilla.suse.com/1182620">SUSE bug 1182620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188549">SUSE bug 1188549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22885</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22885" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22885" ref_url="https://www.suse.com/security/cve/CVE-2021-22885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008839.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHCB7JMW3HFGNRHZXPJUK7TS6FSJM2AA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XD33DNJH2JNZCIIOPYYFAACZRFEZSRKI/" source="SUSE-SU"/>
    <description>
    A possible information disclosure / unintended method execution vulnerability in Action Pack &gt;= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22885/">CVE-2021-22885</cve>
	<bugzilla href="https://bugzilla.suse.com/1185715">SUSE bug 1185715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596311" comment="ruby2.1-rubygem-actionpack-4_2-4.2.9-7.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22890</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22890" ref_url="https://www.suse.com/security/cve/CVE-2021-22890" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HDAO4Q3JZASM6AK274RF74JN2GJOK5UE/" source="SUSE-SU"/>
    <description>
    curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22890/">CVE-2021-22890</cve>
	<bugzilla href="https://bugzilla.suse.com/1183934">SUSE bug 1183934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22902</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22902" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22902" ref_url="https://www.suse.com/security/cve/CVE-2021-22902" source="SUSE CVE"/>
    <description>
    The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22902/">CVE-2021-22902</cve>
	<bugzilla href="https://bugzilla.suse.com/1185771">SUSE bug 1185771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334393" comment="rubygem-actionpack-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22903</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22903" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22903" ref_url="https://www.suse.com/security/cve/CVE-2021-22903" source="SUSE CVE"/>
    <description>
    The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts &lt;&lt; "sub.example.com"` to permit a request with a Host header value of `sub-example.com`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22903/">CVE-2021-22903</cve>
	<bugzilla href="https://bugzilla.suse.com/1185772">SUSE bug 1185772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334393" comment="rubygem-actionpack-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22918</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF3JILGLPQ2UFZS55L7Z33X7S4K562O7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYHLAI3M6J7NTEFF5DUEXHFHPTDMGRCD/" source="SUSE-SU"/>
    <description>
    Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointer to the end of the buffer. This can lead to information disclosures or crashes. This function can be triggered via uv_getaddrinfo().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918</cve>
	<bugzilla href="https://bugzilla.suse.com/1187973">SUSE bug 1187973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22921</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22921" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22921" ref_url="https://www.suse.com/security/cve/CVE-2021-22921" source="SUSE CVE"/>
    <description>
    Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22921/">CVE-2021-22921</cve>
	<bugzilla href="https://bugzilla.suse.com/1187975">SUSE bug 1187975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334390" comment="nodejs6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22930</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVSODU3IBFQTSXJDK3YGWSPCAZNRBOB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1343-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HTH54PEZGDIX6ARBBWVMMOYRGAQTP7DV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DA3KJWR2C3T5FTDAXOSTUOQOJZTKFSKF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4WV4L3BNHGJFK3NT7YVDUR6UNHPAFSZC/" source="SUSE-SU"/>
    <description>
    Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189368">SUSE bug 1189368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22931</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22931" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVSODU3IBFQTSXJDK3YGWSPCAZNRBOB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DA3KJWR2C3T5FTDAXOSTUOQOJZTKFSKF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
    <description>
    Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to Remote Code Execution, XSS, Application crashes due to missing input validation of host names returned by Domain Name Servers in Node.js dns library which can lead to output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931</cve>
	<bugzilla href="https://bugzilla.suse.com/1189370">SUSE bug 1189370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22939</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVSODU3IBFQTSXJDK3YGWSPCAZNRBOB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DA3KJWR2C3T5FTDAXOSTUOQOJZTKFSKF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
    <description>
    If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939</cve>
	<bugzilla href="https://bugzilla.suse.com/1189369">SUSE bug 1189369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22940</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22940" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
    <description>
    Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940</cve>
	<bugzilla href="https://bugzilla.suse.com/1189368">SUSE bug 1189368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22942</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22942" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22942" ref_url="https://www.suse.com/security/cve/CVE-2021-22942" source="SUSE CVE"/>
    <description>
    A possible open redirect vulnerability in the Host Authorization middleware in Action Pack &gt;= 6.0.0 that could allow attackers to redirect users to a malicious website.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22942/">CVE-2021-22942</cve>
	<bugzilla href="https://bugzilla.suse.com/1189627">SUSE bug 1189627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193764">SUSE bug 1193764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334393" comment="rubygem-actionpack-4_2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23214" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2FHULRUWHTA6S76CNBRNC5YGPUFBTRVW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY3TDIO4JWN2U76KHSAM3F7JGOFA3VEQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NNALH7TSYYNMSZ7EMUEZ2S7IBYAU75OE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKUQ4NBJFXX6V3DRII3AKLC2VO5WMZJB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUBO5HPHOHRDPB6KNAQYGJRQBBZVFI6Z/" source="SUSE-SU"/>
    <description>
    When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656243" comment="libecpg6-14.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656244" comment="libpq5-14.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656229" comment="libpq5-32bit-14.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656230" comment="postgresql-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656231" comment="postgresql-contrib-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656232" comment="postgresql-docs-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656233" comment="postgresql-plperl-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656234" comment="postgresql-plpython-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656235" comment="postgresql-pltcl-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656236" comment="postgresql-server-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656548" comment="postgresql10-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656549" comment="postgresql10-contrib-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656534" comment="postgresql10-docs-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656550" comment="postgresql10-plperl-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656551" comment="postgresql10-plpython-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656552" comment="postgresql10-pltcl-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656553" comment="postgresql10-server-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656863" comment="postgresql96-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656864" comment="postgresql96-contrib-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656857" comment="postgresql96-docs-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656865" comment="postgresql96-plperl-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656866" comment="postgresql96-plpython-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656867" comment="postgresql96-pltcl-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656868" comment="postgresql96-server-9.6.24-6.18.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23222" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2FHULRUWHTA6S76CNBRNC5YGPUFBTRVW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EY3TDIO4JWN2U76KHSAM3F7JGOFA3VEQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NNALH7TSYYNMSZ7EMUEZ2S7IBYAU75OE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKUQ4NBJFXX6V3DRII3AKLC2VO5WMZJB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUBO5HPHOHRDPB6KNAQYGJRQBBZVFI6Z/" source="SUSE-SU"/>
    <description>
    A man-in-the-middle attacker can inject false responses to the client's first few queries, despite the use of SSL certificate verification and encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656243" comment="libecpg6-14.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656244" comment="libpq5-14.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656229" comment="libpq5-32bit-14.1-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656230" comment="postgresql-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656231" comment="postgresql-contrib-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656232" comment="postgresql-docs-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656233" comment="postgresql-plperl-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656234" comment="postgresql-plpython-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656235" comment="postgresql-pltcl-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656236" comment="postgresql-server-14-4.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656548" comment="postgresql10-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656549" comment="postgresql10-contrib-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656534" comment="postgresql10-docs-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656550" comment="postgresql10-plperl-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656551" comment="postgresql10-plpython-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656552" comment="postgresql10-pltcl-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656553" comment="postgresql10-server-10.19-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656863" comment="postgresql96-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656864" comment="postgresql96-contrib-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656857" comment="postgresql96-docs-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656865" comment="postgresql96-plperl-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656866" comment="postgresql96-plpython-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656867" comment="postgresql96-pltcl-9.6.24-6.18.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656868" comment="postgresql96-server-9.6.24-6.18.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23239" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
    <description>
    The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239</cve>
	<bugzilla href="https://bugzilla.suse.com/1171722">SUSE bug 1171722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531855" comment="sudo-1.8.10p3-10.29.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552073" comment="sudo-1.8.10p3-10.29.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596343" comment="sudo-1.8.10p3-10.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23240</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23240" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
    <description>
    selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240</cve>
	<bugzilla href="https://bugzilla.suse.com/1171722">SUSE bug 1171722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LBJTTJNYOY4PWTVR3WGVSEX33BCEYHGD/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<bugzilla href="https://bugzilla.suse.com/1182179">SUSE bug 1182179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182433">SUSE bug 1182433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531970" comment="python-devel-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531962" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531963" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531964" comment="python-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531965" comment="python-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531966" comment="python-base-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531967" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531968" comment="python-curses-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531969" comment="python-demo-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531973" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531974" comment="python-idle-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531975" comment="python-tk-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531976" comment="python-xml-2.7.18-28.67.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552151" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552152" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552153" comment="python-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552154" comment="python-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552155" comment="python-base-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552156" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552157" comment="python-curses-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552158" comment="python-demo-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552159" comment="python-devel-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552160" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552161" comment="python-idle-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552162" comment="python-tk-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552163" comment="python-xml-2.7.18-28.67.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596416" comment="libpython2_7-1_0-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552152" comment="libpython2_7-1_0-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596417" comment="python-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552154" comment="python-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596418" comment="python-base-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552156" comment="python-base-32bit-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596419" comment="python-curses-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596420" comment="python-demo-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596421" comment="python-devel-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531971" comment="python-doc-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531972" comment="python-doc-pdf-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596422" comment="python-gdbm-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596423" comment="python-idle-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596424" comment="python-tk-2.7.18-28.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596425" comment="python-xml-2.7.18-28.67.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23362</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23362" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF3JILGLPQ2UFZS55L7Z33X7S4K562O7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQFKBXOTTNWYS2GOQXWGPFT7H3TPVQVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYHLAI3M6J7NTEFF5DUEXHFHPTDMGRCD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZHYVND24KFSRRA7YPSSI2T72HICGJ3Z/" source="SUSE-SU"/>
    <description>
    The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QRLIMZTBL2C75CNGC2PCETJT2CPLMGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627215" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627216" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627217" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627218" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QRLIMZTBL2C75CNGC2PCETJT2CPLMGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627215" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627216" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627217" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627218" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23839</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23839" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23839" ref_url="https://www.suse.com/security/cve/CVE-2021-23839" source="SUSE CVE"/>
    <description>
    OpenSSL 1.0.2 supports SSLv2. If a client attempts to negotiate SSLv2 with a server that is configured to support both SSLv2 and more recent SSL and TLS versions then a check is made for a version rollback attack when unpadding an RSA signature. Clients that support SSL or TLS versions greater than SSLv2 are supposed to use a special form of padding. A server that supports greater than SSLv2 is supposed to reject connection attempts from a client where this special form of padding is present, because this indicates that a version rollback has occurred (i.e. both client and server support greater than SSLv2, and yet this is the version that is being requested). The implementation of this padding check inverted the logic so that the connection attempt is accepted if the padding is present, and rejected if it is absent. This means that such as server will accept a connection if a version rollback attack has occurred. Further the server will erroneously reject a connection if a normal SSLv2 connection attempt is made. Only OpenSSL 1.0.2 servers from version 1.0.2s to 1.0.2x are affected by this issue. In order to be vulnerable a 1.0.2 server must: 1) have configured SSLv2 support at compile time (this is off by default), 2) have configured SSLv2 support at runtime (this is off by default), 3) have configured SSLv2 ciphersuites (these are not in the default ciphersuite list) OpenSSL 1.1.1 does not have SSLv2 support and therefore is not vulnerable to this issue. The underlying error is in the implementation of the RSA_padding_check_SSLv23() function. This also affects the RSA_SSLV23_PADDING padding mode used by various other functions. Although 1.1.1 does not support SSLv2 the RSA_padding_check_SSLv23() function still exists, as does the RSA_SSLV23_PADDING padding mode. Applications that directly call that function or use that padding mode will encounter this issue. However since there is no support for the SSLv2 protocol in 1.1.1 this is considered a bug and not a security issue in that version. OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.0.2y (Affected 1.0.2s-1.0.2x).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-23839/">CVE-2021-23839</cve>
	<bugzilla href="https://bugzilla.suse.com/1182332">SUSE bug 1182332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVDCMNKQUTQBM7Z7BU2BQ23WG4Y66BOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKKO266WHY2YSFJAVHWNM4DQSX4W7YZG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XENZGXQLBAUUDBFPY2BZB3VBUOBHXA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKXW7QBBUUWYW6GTJATRSAAWOQW7PBVU/" source="SUSE-SU"/>
    <description>
    Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531996" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531997" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531998" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531999" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532000" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532001" comment="openssl-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552181" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552182" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552183" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552184" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552185" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552186" comment="openssl-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596438" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596439" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552183" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596440" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552185" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596441" comment="openssl-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XENZGXQLBAUUDBFPY2BZB3VBUOBHXA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKXW7QBBUUWYW6GTJATRSAAWOQW7PBVU/" source="SUSE-SU"/>
    <description>
    The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531996" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531997" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531998" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531999" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532000" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532001" comment="openssl-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552181" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552182" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552183" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552184" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552185" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552186" comment="openssl-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596438" comment="libopenssl-devel-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596439" comment="libopenssl1_0_0-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552183" comment="libopenssl1_0_0-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596440" comment="libopenssl1_0_0-hmac-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552185" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596441" comment="openssl-1.0.2j-60.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532002" comment="openssl-doc-1.0.2j-60.66.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CHP6PJ4RPID7WVQKA2X34TN5RNEXQW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3QRLIMZTBL2C75CNGC2PCETJT2CPLMGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMTWQGCU5SAOKIQIUH6IN4LEQOIC2PS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MYQ74LF5AF2OGVK4O6UUAC44CWPGQGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627215" comment="java-1_8_0-openjdk-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627216" comment="java-1_8_0-openjdk-demo-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627217" comment="java-1_8_0-openjdk-devel-1.8.0.302-27.63.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627218" comment="java-1_8_0-openjdk-headless-1.8.0.302-27.63.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    If a user clicked into a specifically crafted PDF, the PDF reader could be confused into leaking cross-origin information, when said information is served as chunked data. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552074" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552075" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552076" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596344" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596345" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596346" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552074" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552075" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552076" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596344" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596345" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596346" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552074" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552075" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552076" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596344" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596345" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596346" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    Further techniques that built on the slipstream research combined with a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox &lt; 85.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ6EGWAN3STX7MVPJ6SXVNB6AQBHBJEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV6TQVT6324Y5SWHTL34EKZT7PFDOYE4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PYQVYICIBRGAYRG5HERVZ2YG2FAQSVAR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CRMXRMPMDDBTKZVMDMEO76I3JZEYGF/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 85, Thunderbird &lt; 78.7, and Firefox ESR &lt; 78.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531856" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531857" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531858" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552074" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552075" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552076" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596344" comment="MozillaFirefox-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596345" comment="MozillaFirefox-devel-78.7.0-112.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596346" comment="MozillaFirefox-translations-common-78.7.0-112.45.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23968" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
    <description>
    If Content Security Policy blocked frame navigation, the full destination of a redirect served in the frame was reported in the violation report; as opposed to the original frame URI. This could be used to leak sensitive information contained in such URIs. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552123" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552124" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552125" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596391" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596392" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596393" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23969" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
    <description>
    As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If that’s not possible, user agents need to strip the URL down to an origin to avoid unintentional leakage." Under certain types of redirects, Firefox incorrectly set the source file to be the destination of the redirects. This was fixed to be the redirect destination's origin. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552123" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552124" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552125" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596391" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596392" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596393" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23973" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
    <description>
    When trying to load a cross-origin resource in an audio/video context a decoding error may have resulted, and the content of that error may have revealed information about the resource. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552123" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552124" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552125" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596391" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596392" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596393" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23978" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008409.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JU7JWCNX3KH2TP7LILEHP3VXYK7BTLC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2REQ3DSH3BKY3CWSHN3VOQE3JTXUFINV/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 86, Thunderbird &lt; 78.8, and Firefox ESR &lt; 78.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531925" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531926" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531927" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552123" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552124" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552125" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596391" comment="MozillaFirefox-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596392" comment="MozillaFirefox-devel-78.8.0-112.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596393" comment="MozillaFirefox-translations-common-78.8.0-112.51.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552187" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552188" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552189" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596442" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596443" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596444" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552187" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552188" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552189" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596442" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596443" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596444" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552187" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552188" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552189" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596442" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596443" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596444" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009532003" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532004" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009532005" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552187" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552188" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552189" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596442" comment="MozillaFirefox-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596443" comment="MozillaFirefox-devel-78.9.0-112.54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596444" comment="MozillaFirefox-translations-common-78.9.0-112.54.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20212432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-2432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-2432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2432" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-2432" ref_url="https://www.suse.com/security/cve/CVE-2021-2432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: JNDI). The supported version that is affected is Java SE: 7u301. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-2432/">CVE-2021-2432</cve>
	<bugzilla href="https://bugzilla.suse.com/1188568">SUSE bug 1188568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25122</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25122" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25122" ref_url="https://www.suse.com/security/cve/CVE-2021-25122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008578.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YM4ON24PW3U3JLLUNZBOOTDHDHK3EYVO/" source="SUSE-SU"/>
    <description>
    When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25122/">CVE-2021-25122</cve>
	<bugzilla href="https://bugzilla.suse.com/1182912">SUSE bug 1182912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188549">SUSE bug 1188549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334134" comment="tomcat is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0668-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UD5BSX5LOILOZXTGH6JJ7MLM4XBTKK6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSDG2HIUJDFCATG54EOVCAT5D4AVXXKE/" source="SUSE-SU"/>
    <description>
    In BIND 9.8.5 -&gt; 9.8.8, 9.9.3 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552285" comment="bind-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552286" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552287" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538905" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552288" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0668-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UD5BSX5LOILOZXTGH6JJ7MLM4XBTKK6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSDG2HIUJDFCATG54EOVCAT5D4AVXXKE/" source="SUSE-SU"/>
    <description>
    In BIND 9.0.0 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.9.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189848">SUSE bug 1189848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196172">SUSE bug 1196172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199298">SUSE bug 1199298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552285" comment="bind-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552286" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552287" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538905" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552288" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25216" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25216" ref_url="https://www.suse.com/security/cve/CVE-2021-25216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008726.html" source="SUSE-SU"/>
    <description>
    In BIND 9.5.0 -&gt; 9.11.29, 9.12.0 -&gt; 9.16.13, and versions BIND 9.11.3-S1 -&gt; 9.11.29-S1 and 9.16.8-S1 -&gt; 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -&gt; 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25216/">CVE-2021-25216</cve>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189848">SUSE bug 1189848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552285" comment="bind-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552286" comment="bind-chrootenv-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538903" comment="bind-doc-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552287" comment="bind-libs-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538905" comment="bind-libs-32bit-9.9.9P1-63.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552288" comment="bind-utils-9.9.9P1-63.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5DK63QGFHTXASYR656326B4ARJWN2LQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THX5XKYZAL23HUQMVLFS3L572S4DHQUX/" source="SUSE-SU"/>
    <description>
    In ISC DHCP 4.1-ESV-R1 -&gt; 4.1-ESV-R16, ISC DHCP 4.4.0 -&gt; 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189843">SUSE bug 1189843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189858">SUSE bug 1189858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199299">SUSE bug 1199299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552316" comment="dhcp-4.3.3-10.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552317" comment="dhcp-client-4.3.3-10.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552318" comment="dhcp-relay-4.3.3-10.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552319" comment="dhcp-server-4.3.3-10.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25287</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25287" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25287" ref_url="https://www.suse.com/security/cve/CVE-2021-25287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2021-25287/">CVE-2021-25287</cve>
	<bugzilla href="https://bugzilla.suse.com/1185805">SUSE bug 1185805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25288</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25288" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25288" ref_url="https://www.suse.com/security/cve/CVE-2021-25288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25288/">CVE-2021-25288</cve>
	<bugzilla href="https://bugzilla.suse.com/1185803">SUSE bug 1185803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25289</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25289" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25289" ref_url="https://www.suse.com/security/cve/CVE-2021-25289" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25289/">CVE-2021-25289</cve>
	<bugzilla href="https://bugzilla.suse.com/1183103">SUSE bug 1183103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334396" comment="python-Pillow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25290</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25290" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290</cve>
	<bugzilla href="https://bugzilla.suse.com/1183105">SUSE bug 1183105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25291</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25291" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25291" ref_url="https://www.suse.com/security/cve/CVE-2021-25291" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25291/">CVE-2021-25291</cve>
	<bugzilla href="https://bugzilla.suse.com/1183106">SUSE bug 1183106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334396" comment="python-Pillow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25293</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25293" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25293" ref_url="https://www.suse.com/security/cve/CVE-2021-25293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25293/">CVE-2021-25293</cve>
	<bugzilla href="https://bugzilla.suse.com/1183102">SUSE bug 1183102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334396" comment="python-Pillow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25317" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0638-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GKB5OH3W4MLNXHW3ZQK7GEVLAEMXZ7C/" source="SUSE-SU"/>
    <description>
    A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192358">SUSE bug 1192358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552282" comment="cups-1.7.5-20.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552283" comment="cups-client-1.7.5-20.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552284" comment="cups-libs-1.7.5-20.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538900" comment="cups-libs-32bit-1.7.5-20.36.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25321" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0945-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7SKTH3533HITV3EN436RULMJP2HHQND/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DE7IGDIJ6QCS3LA5C7SC67VRDUWKSAEV/" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321</cve>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009615943" comment="arpwatch-2.1a15-159.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YM4ON24PW3U3JLLUNZBOOTDHDHK3EYVO/" source="SUSE-SU"/>
    <description>
    The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329</cve>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333989" comment="tomcat is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009538884" comment="tomcat-8.0.53-29.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538885" comment="tomcat-admin-webapps-8.0.53-29.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538886" comment="tomcat-docs-webapp-8.0.53-29.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538887" comment="tomcat-el-3_0-api-8.0.53-29.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538888" comment="tomcat-javadoc-8.0.53-29.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538889" comment="tomcat-jsp-2_3-api-8.0.53-29.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538890" comment="tomcat-lib-8.0.53-29.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538891" comment="tomcat-servlet-3_1-api-8.0.53-29.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538892" comment="tomcat-webapps-8.0.53-29.46.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26401" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="TID000020607" ref_url="https://www.suse.com/support/kb/doc/?id=000020607" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXODJTCX5G5LLTBOEFVBOCIWYKEGYAMP/" source="SUSE-SU"/>
    <description>
    LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401</cve>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690</cve>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691</cve>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26708</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26708" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26708" ref_url="https://www.suse.com/security/cve/CVE-2021-26708" source="SUSE CVE"/>
    <description>
    A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26708/">CVE-2021-26708</cve>
	<bugzilla href="https://bugzilla.suse.com/1181806">SUSE bug 1181806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183298">SUSE bug 1183298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552136" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552137" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552138" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552140" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538188" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596402" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596403" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596404" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596405" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26931" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552136" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552137" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552138" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552140" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538188" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596402" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596403" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596404" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596405" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531943" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531944" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531945" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531949" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552136" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552137" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552138" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552140" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538188" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596402" comment="kernel-default-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596403" comment="kernel-default-base-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596404" comment="kernel-default-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552139" comment="kernel-default-man-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531946" comment="kernel-devel-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531947" comment="kernel-macros-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531948" comment="kernel-source-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596405" comment="kernel-syms-4.4.121-92.152.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531950" comment="kgraft-patch-4_4_121-92_152-default-1-3.3.2 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26933</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26933" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26933" ref_url="https://www.suse.com/security/cve/CVE-2021-26933" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen 4.9 through 4.14.x. On Arm, a guest is allowed to control whether memory accesses are bypassing the cache. This means that Xen needs to ensure that all writes (such as the ones during scrubbing) have reached the memory before handing over the page to a guest. Unfortunately, the operation to clean the cache is happening before checking if the page was scrubbed. Therefore there is no guarantee when all the writes will reach the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-26933/">CVE-2021-26933</cve>
	<bugzilla href="https://bugzilla.suse.com/1181756">SUSE bug 1181756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26934</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26934" ref_url="https://www.suse.com/security/cve/CVE-2021-26934" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 4.18 through 5.10.16, as used by Xen. The backend allocation (aka be-alloc) mode of the drm_xen_front drivers was not meant to be a supported configuration, but this wasn't stated accordingly in its support status entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26934/">CVE-2021-26934</cve>
	<bugzilla href="https://bugzilla.suse.com/1181755">SUSE bug 1181755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185892">SUSE bug 1185892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008337.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AYNLKAL7KI2RT6BUJQ25AIHB4Q2CRI2D/" source="SUSE-SU"/>
    <description>
    encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937</cve>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531902" comment="screen-4.0.4-23.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552108" comment="screen-4.0.4-23.6.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596375" comment="screen-4.0.4-23.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0900-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA47BC6O5V73WVZQL44IERDWF2OCBQYV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSHLMCUKP3HZEQVMO6GPO4MIFBHEZ53K/" source="SUSE-SU"/>
    <description>
    xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135</cve>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189857">SUSE bug 1189857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190262">SUSE bug 1190262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343418" comment="xterm is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552382" comment="xterm-308-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:61-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34RGWB6WTBL4BEDA4UXHB5TDLT47DCUY/" source="SUSE-SU"/>
    <description>
    In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531942" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531936" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531937" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531938" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531939" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531940" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552130" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552132" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552133" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552134" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552135" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596397" comment="libldap-2_4-2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552131" comment="libldap-2_4-2-32bit-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596398" comment="openldap2-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596399" comment="openldap2-back-meta-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596400" comment="openldap2-client-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531941" comment="openldap2-doc-2.4.41-18.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596401" comment="openldap2-ppolicy-check-password-1.2-18.83.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEADQWIHFVNLBWNNAJUQIPQTZZU5U5A4/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218</cve>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531981" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531982" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531983" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531984" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531985" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531986" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531987" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531988" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531989" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531990" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531991" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552167" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552168" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552169" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552170" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552171" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552172" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552173" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552174" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552175" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552176" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552177" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596429" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596430" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552169" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596431" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552171" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596432" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552173" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596433" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552175" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596434" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552177" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEADQWIHFVNLBWNNAJUQIPQTZZU5U5A4/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219</cve>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194015">SUSE bug 1194015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531981" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531982" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531983" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531984" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531985" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531986" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531987" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531988" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531989" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531990" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531991" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552167" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552168" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552169" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552170" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552171" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552172" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552173" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552174" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552175" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552176" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552177" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531980" comment="glib2-lang-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596429" comment="glib2-tools-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596430" comment="libgio-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552169" comment="libgio-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596431" comment="libglib-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552171" comment="libglib-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596432" comment="libgmodule-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552173" comment="libgmodule-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596433" comment="libgobject-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552175" comment="libgobject-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596434" comment="libgthread-2_0-0-2.48.2-12.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552177" comment="libgthread-2_0-0-32bit-2.48.2-12.22.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27290</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OF3JILGLPQ2UFZS55L7Z33X7S4K562O7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQFKBXOTTNWYS2GOQXWGPFT7H3TPVQVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYHLAI3M6J7NTEFF5DUEXHFHPTDMGRCD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZHYVND24KFSRRA7YPSSI2T72HICGJ3Z/" source="SUSE-SU"/>
    <description>
    ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27358</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27358" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27358" ref_url="https://www.suse.com/security/cve/CVE-2021-27358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
    <description>
    The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27358/">CVE-2021-27358</cve>
	<bugzilla href="https://bugzilla.suse.com/1183803">SUSE bug 1183803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<bugzilla href="https://bugzilla.suse.com/1182712">SUSE bug 1182712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27379" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27379" ref_url="https://www.suse.com/security/cve/CVE-2021-27379" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008658.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x, allowing x86 Intel HVM guest OS users to achieve unintended read/write DMA access, and possibly cause a denial of service (host OS crash) or gain privileges. This occurs because a backport missed a flush, and thus IOMMU updates were not always correct. NOTE: this issue exists because of an incomplete fix for CVE-2020-15565.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27379/">CVE-2021-27379</cve>
	<bugzilla href="https://bugzilla.suse.com/1182431">SUSE bug 1182431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531818" comment="xen-4.7.6_14-43.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531819" comment="xen-doc-html-4.7.6_14-43.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531820" comment="xen-libs-4.7.6_14-43.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531821" comment="xen-libs-32bit-4.7.6_14-43.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531822" comment="xen-tools-4.7.6_14-43.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531823" comment="xen-tools-domU-4.7.6_14-43.76.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27645</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27645" ref_url="https://www.suse.com/security/cve/CVE-2021-27645" source="SUSE CVE"/>
    <description>
    The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27645/">CVE-2021-27645</cve>
	<bugzilla href="https://bugzilla.suse.com/1182733">SUSE bug 1182733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27803" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EN5W6CW6RWRS7CCRSXMP44CTJQY53RIS/" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803</cve>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531951" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552141" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596406" comment="wpa_supplicant-2.6-15.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27919</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27919" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27919" ref_url="https://www.suse.com/security/cve/CVE-2021-27919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008547.html" source="SUSE-SU"/>
    <description>
    archive/zip in Go 1.16.x before 1.16.1 allows attackers to cause a denial of service (panic) upon attempted use of the Reader.Open API for a ZIP archive in which ../ occurs at the beginning of any filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27919/">CVE-2021-27919</cve>
	<bugzilla href="https://bugzilla.suse.com/1183334">SUSE bug 1183334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009351411" comment="zip is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27922</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27922" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27922" ref_url="https://www.suse.com/security/cve/CVE-2021-27922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-27922/">CVE-2021-27922</cve>
	<bugzilla href="https://bugzilla.suse.com/1183108">SUSE bug 1183108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27923</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27923" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27923" ref_url="https://www.suse.com/security/cve/CVE-2021-27923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-27923/">CVE-2021-27923</cve>
	<bugzilla href="https://bugzilla.suse.com/1183107">SUSE bug 1183107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27962</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27962" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27962" ref_url="https://www.suse.com/security/cve/CVE-2021-27962" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SW3762PL7VO3NVHZJOSVYMKION77NYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
    <description>
    Grafana Enterprise 7.2.x and 7.3.x before 7.3.10 and 7.4.x before 7.4.5 allows a dashboard editor to bypass a permission check concerning a data source they should not be able to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-27962/">CVE-2021-27962</cve>
	<bugzilla href="https://bugzilla.suse.com/1184371">SUSE bug 1184371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334411" comment="grafana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28038" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28039</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28039" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28039" ref_url="https://www.suse.com/security/cve/CVE-2021-28039" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 5.9.x through 5.11.3, as used with Xen. In some less-common configurations, an x86 PV guest OS user can crash a Dom0 or driver domain via a large amount of I/O activity. The issue relates to misuse of guest physical addresses when a configuration has CONFIG_XEN_UNPOPULATED_ALLOC but not CONFIG_XEN_BALLOON_MEMORY_HOTPLUG.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28039/">CVE-2021-28039</cve>
	<bugzilla href="https://bugzilla.suse.com/1183035">SUSE bug 1183035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183071">SUSE bug 1183071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28041</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28041" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28041" ref_url="https://www.suse.com/security/cve/CVE-2021-28041" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YUBQLVRKYJRPQIBMWLSE4P7CEU335GGW/" source="SUSE-SU"/>
    <description>
    ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28041/">CVE-2021-28041</cve>
	<bugzilla href="https://bugzilla.suse.com/1183137">SUSE bug 1183137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28146</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28146" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28146" ref_url="https://www.suse.com/security/cve/CVE-2021-28146" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SW3762PL7VO3NVHZJOSVYMKION77NYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
    <description>
    The team sync HTTP API in Grafana Enterprise 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service, this vulnerability allows any authenticated user to add external groups to existing teams. This can be used to grant a user team permissions that the user isn't supposed to have.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-28146/">CVE-2021-28146</cve>
	<bugzilla href="https://bugzilla.suse.com/1183811">SUSE bug 1183811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334411" comment="grafana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28147</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28147" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28147" ref_url="https://www.suse.com/security/cve/CVE-2021-28147" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SW3762PL7VO3NVHZJOSVYMKION77NYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
    <description>
    The team sync HTTP API in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service and having the EditorsCanAdmin feature enabled, this vulnerability allows any authenticated user to add external groups to any existing team. This can be used to grant a user team permissions that the user isn't supposed to have.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28147/">CVE-2021-28147</cve>
	<bugzilla href="https://bugzilla.suse.com/1183809">SUSE bug 1183809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334411" comment="grafana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28148</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28148" ref_url="https://www.suse.com/security/cve/CVE-2021-28148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1148-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FZP3KR7QVZ36DM2NRRT76CHYDLB44JX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2SW3762PL7VO3NVHZJOSVYMKION77NYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2662-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQXNKFCX2C74T7LPZZCRD6GK2WWJTT4B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X43KWNU2XMSBJQO437DI7TR5WXTEXGK5/" source="SUSE-SU"/>
    <description>
    One of the usage insights HTTP API endpoints in Grafana Enterprise 6.x before 6.7.6, 7.x before 7.3.10, and 7.4.x before 7.4.5 is accessible without any authentication. This allows any unauthenticated user to send an unlimited number of requests to the endpoint, leading to a denial of service (DoS) attack against a Grafana Enterprise instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28148/">CVE-2021-28148</cve>
	<bugzilla href="https://bugzilla.suse.com/1183813">SUSE bug 1183813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334411" comment="grafana is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28210" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O64FXHJK5XXCJEHCRQJDNI2X2UVMP6BS/" source="SUSE-SU"/>
    <description>
    An unlimited recursion in DxeCore in EDK II.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210</cve>
	<bugzilla href="https://bugzilla.suse.com/1183579">SUSE bug 1183579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334152" comment="ovmf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552383" comment="ovmf-2015+git1462940744.321151f-19.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552384" comment="ovmf-tools-2015+git1462940744.321151f-19.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552385" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28211" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O64FXHJK5XXCJEHCRQJDNI2X2UVMP6BS/" source="SUSE-SU"/>
    <description>
    A heap overflow in LzmaUefiDecompressGetInfo function in EDK II.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211</cve>
	<bugzilla href="https://bugzilla.suse.com/1183578">SUSE bug 1183578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334152" comment="ovmf is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552383" comment="ovmf-2015+git1462940744.321151f-19.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552384" comment="ovmf-tools-2015+git1462940744.321151f-19.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552385" comment="qemu-ovmf-x86_64-2015+git1462940744.321151f-19.23.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28363</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28363" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28363" ref_url="https://www.suse.com/security/cve/CVE-2021-28363" source="SUSE CVE"/>
    <description>
    The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn't given via proxy_config) doesn't verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28363/">CVE-2021-28363</cve>
	<bugzilla href="https://bugzilla.suse.com/1183630">SUSE bug 1183630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334022" comment="python-urllib3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28375</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28375" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184955">SUSE bug 1184955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28658</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28658" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28658" ref_url="https://www.suse.com/security/cve/CVE-2021-28658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
    <description>
    In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28658/">CVE-2021-28658</cve>
	<bugzilla href="https://bugzilla.suse.com/1184148">SUSE bug 1184148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28660" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -&gt;ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28675</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28675" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28675" ref_url="https://www.suse.com/security/cve/CVE-2021-28675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28675/">CVE-2021-28675</cve>
	<bugzilla href="https://bugzilla.suse.com/1185804">SUSE bug 1185804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28676</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28676" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28676" ref_url="https://www.suse.com/security/cve/CVE-2021-28676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-28676/">CVE-2021-28676</cve>
	<bugzilla href="https://bugzilla.suse.com/1185786">SUSE bug 1185786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28677</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28677" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28677" ref_url="https://www.suse.com/security/cve/CVE-2021-28677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008989.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28677/">CVE-2021-28677</cve>
	<bugzilla href="https://bugzilla.suse.com/1185785">SUSE bug 1185785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596324" comment="python-Pillow-2.8.1-4.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28678</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28678" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28678" ref_url="https://www.suse.com/security/cve/CVE-2021-28678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008981.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28678/">CVE-2021-28678</cve>
	<bugzilla href="https://bugzilla.suse.com/1185784">SUSE bug 1185784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334396" comment="python-Pillow is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires selecting a non-default setting in MSR_TSX_CTRL. This setting isn't restored after S3 suspend.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690</cve>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such commands is not used. Instead, the issuing CPU spin-waits for the completion of the most recently issued command(s). Some of these waiting loops try to apply a timeout to fail overly-slow commands. The course of action upon a perceived timeout actually being detected is inappropriate: - on Intel hardware guests which did not originally cause the timeout may be marked as crashed, - on AMD hardware higher layer callers would not be notified of the issue, making them continue as if the IOMMU operation succeeded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692</cve>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694</cve>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189980">SUSE bug 1189980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695</cve>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189980">SUSE bug 1189980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696</cve>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189980">SUSE bug 1189980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697</cve>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen would iterate over all such entries, including ones which aren't in use anymore and some which may have been created but never used. If the number of entries for a given domain is large enough, this iterating of the entire table may tie up a CPU for too long, starving other domains or causing issues in the hypervisor itself. Note that a domain may map its own grants, i.e. there is no need for multiple domains to be involved here. A pair of "cooperating" guests may, however, cause the effects to be more severe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698</cve>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3140-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOWOZIQD7FWDNFL7CQF3WO5KZFKYYTDP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W4HJ2XF2SFYPRBAICENTSEBE5KO7OY2G/" source="SUSE-SU"/>
    <description>
    Another race in XENMAPSPACE_grant_table handling Guests are permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, are de-allocated when a guest switches (back) from v2 to v1. Freeing such pages requires that the hypervisor enforce that no parallel request can result in the addition of a mapping of such a page to a guest. That enforcement was missing, allowing guests to retain access to pages that were freed and perhaps re-used for other purposes. Unfortunately, when XSA-379 was being prepared, this similar issue was not noticed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701</cve>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704</cve>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009658680" comment="xen-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658681" comment="xen-doc-html-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658682" comment="xen-libs-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658683" comment="xen-libs-32bit-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658684" comment="xen-tools-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658685" comment="xen-tools-domU-4.7.6_18-43.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). In some cases the hypervisor carries out the requests by splitting them into smaller chunks. Error handling in certain PoD cases has been insufficient in that in particular partial success of some operations was not properly accounted for. There are two code paths affected - page removal (CVE-2021-28705) and insertion of new pages (CVE-2021-28709). (We provide one patch which combines the fix to both issues.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705</cve>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009658680" comment="xen-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658681" comment="xen-doc-html-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658682" comment="xen-libs-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658683" comment="xen-libs-32bit-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658684" comment="xen-tools-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658685" comment="xen-tools-domU-4.7.6_18-43.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to increase its memory allocation beyond the administrator established limit. This is a result of a calculation done with 32-bit precision, which may overflow. It would then only be the overflowed (and hence small) number which gets compared against the established upper bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706</cve>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009658680" comment="xen-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658681" comment="xen-doc-html-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658682" comment="xen-libs-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658683" comment="xen-libs-32bit-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658684" comment="xen-tools-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658685" comment="xen-tools-domU-4.7.6_18-43.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009658680" comment="xen-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658681" comment="xen-doc-html-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658682" comment="xen-libs-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658683" comment="xen-libs-32bit-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658684" comment="xen-tools-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658685" comment="xen-tools-domU-4.7.6_18-43.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009658680" comment="xen-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658681" comment="xen-doc-html-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658682" comment="xen-libs-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658683" comment="xen-libs-32bit-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658684" comment="xen-tools-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658685" comment="xen-tools-domU-4.7.6_18-43.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). In some cases the hypervisor carries out the requests by splitting them into smaller chunks. Error handling in certain PoD cases has been insufficient in that in particular partial success of some operations was not properly accounted for. There are two code paths affected - page removal (CVE-2021-28705) and insertion of new pages (CVE-2021-28709). (We provide one patch which combines the fix to both issues.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009658680" comment="xen-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658681" comment="xen-doc-html-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658682" comment="xen-libs-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658683" comment="xen-libs-32bit-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658684" comment="xen-tools-4.7.6_18-43.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658685" comment="xen-tools-domU-4.7.6_18-43.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A "stall on CPU" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28951</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28951" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28951" ref_url="https://www.suse.com/security/cve/CVE-2021-28951" source="SUSE CVE"/>
    <description>
    An issue was discovered in fs/io_uring.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (deadlock) because exit may be waiting to park a SQPOLL thread, but concurrently that SQPOLL thread is waiting for a signal to start, aka CID-3ebba796fa25.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28951/">CVE-2021-28951</cve>
	<bugzilla href="https://bugzilla.suse.com/1184195">SUSE bug 1184195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28952</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28952" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28952" ref_url="https://www.suse.com/security/cve/CVE-2021-28952" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28952/">CVE-2021-28952</cve>
	<bugzilla href="https://bugzilla.suse.com/1184197">SUSE bug 1184197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184199">SUSE bug 1184199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination, aka CID-cc7a0bb058b8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186408">SUSE bug 1186408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29265" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29338" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
    <description>
    Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option "-ImgDir" on a directory that contains 1048576 files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29646</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29646" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29646" ref_url="https://www.suse.com/security/cve/CVE-2021-29646" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. tipc_nl_retrieve_key in net/tipc/node.c does not properly validate certain data sizes, aka CID-0217ed2848e8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29646/">CVE-2021-29646</cve>
	<bugzilla href="https://bugzilla.suse.com/1184191">SUSE bug 1184191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29647</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29648</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29648" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29648" ref_url="https://www.suse.com/security/cve/CVE-2021-29648" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or check_btf_info in kernel/bpf/verifier.c), aka CID-350a5c4dd245.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29648/">CVE-2021-29648</cve>
	<bugzilla href="https://bugzilla.suse.com/1184200">SUSE bug 1184200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29649</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29649" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29649" ref_url="https://www.suse.com/security/cve/CVE-2021-29649" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. The user mode driver (UMD) has a copy_process() memory leak, related to a lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c, aka CID-f60a85cad677.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29649/">CVE-2021-29649</cve>
	<bugzilla href="https://bugzilla.suse.com/1184205">SUSE bug 1184205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDF7UBOVWJVCBDNJIGAY445AXZJU4OOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THW3Z3CCX5HRFD2KJ3A4TDO27FGBEKNN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EAMQGZ2XSFHUQG4YR5BGYZEI5C3IGY4P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0644-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZF7QZJOUTVUSU5SPVGG757XUPT3OVD3/" source="SUSE-SU"/>
    <description>
    Ports that were written as an integer overflow above the bounds of a 16-bit integer could have bypassed port blocking restrictions when used in the Alt-Svc header. This vulnerability affects Firefox ESR &lt; 78.10, Thunderbird &lt; 78.10, and Firefox &lt; 88.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552225" comment="MozillaFirefox-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552226" comment="MozillaFirefox-devel-78.10.0-112.57.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552227" comment="MozillaFirefox-translations-common-78.10.0-112.57.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29951" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008975.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2JRSLMFXKIDH3M3V6MCQ6BEUR3XMG5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7FGBREHMZI3UK2I6TGJZ75S4VSJHXVNF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W363JYZFBDQRHIEBGR6T7LS65BG62JG/" source="SUSE-SU"/>
    <description>
    The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service. *Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 78.10.1, Firefox &lt; 87, and Firefox ESR &lt; 78.10.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552350" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552351" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552352" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2JRSLMFXKIDH3M3V6MCQ6BEUR3XMG5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0910-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EMW3JK45XDOBEXEJG4EVDNIANAAYG46O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W363JYZFBDQRHIEBGR6T7LS65BG62JG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ICXVMKW77QQMPCB3IHIGROEJNPYKPRO/" source="SUSE-SU"/>
    <description>
    A locally-installed hostile program could send `WM_COPYDATA` messages that Firefox would process incorrectly, leading to an out-of-bounds read. *This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 78.11, Firefox &lt; 89, and Firefox ESR &lt; 78.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552350" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552351" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552352" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2JRSLMFXKIDH3M3V6MCQ6BEUR3XMG5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0910-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EMW3JK45XDOBEXEJG4EVDNIANAAYG46O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1884-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3W363JYZFBDQRHIEBGR6T7LS65BG62JG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ICXVMKW77QQMPCB3IHIGROEJNPYKPRO/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.11, Firefox &lt; 89, and Firefox ESR &lt; 78.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552350" comment="MozillaFirefox-78.11.0-112.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552351" comment="MozillaFirefox-devel-78.11.0-112.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552352" comment="MozillaFirefox-translations-common-78.11.0-112.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P253WUL63Q3NMRE2SIMFESB3E4L3KLVY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
    <description>
    A malicious webpage could have triggered a use-after-free, memory corruption, and a potentially exploitable crash. *This bug could only be triggered when accessibility was enabled.*. This vulnerability affects Thunderbird &lt; 78.12, Firefox ESR &lt; 78.12, and Firefox &lt; 90.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625232" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625233" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625234" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P253WUL63Q3NMRE2SIMFESB3E4L3KLVY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in code shared between Firefox and Thunderbird. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.12, Firefox ESR &lt; 78.12, and Firefox &lt; 90.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625232" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625233" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625234" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Uninitialized memory in a canvas object could have caused an incorrect free() leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    An issue present in lowering/register allocation could have led to obscure but deterministic register confusion failures in JITted code that would lead to a potentially exploitable crash. This vulnerability affects Firefox &lt; 91 and Thunderbird &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<bugzilla href="https://bugzilla.suse.com/1189631">SUSE bug 1189631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29982" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Due to incorrect JIT optimization, we incorrectly interpreted data from the wrong type of object, resulting in the potential leak of a single bit of memory. This vulnerability affects Firefox &lt; 91 and Thunderbird &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<bugzilla href="https://bugzilla.suse.com/1189630">SUSE bug 1189630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29983" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Firefox for Android could get stuck in fullscreen mode and not exit it even after normal interactions that should cause it to exit. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Instruction reordering resulted in a sequence of instructions that would cause an object to be incorrectly considered during garbage collection. This led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    A suspected race condition when calling getaddrinfo led to memory corruption and a potentially exploitable crash. *Note: This issue only affected Linux operating systems. Other operating systems are unaffected.* This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29987" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    After requesting multiple permissions, and closing the first permission panel, subsequent permission panels will be displayed in a different position but still record a click in the default location, making it possible to trick a user into accepting a permission they did not want to. *This bug only affects Firefox on Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 91 and Thunderbird &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<bugzilla href="https://bugzilla.suse.com/1189629">SUSE bug 1189629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Firefox incorrectly treated an inline list-item element as a block element, resulting in an out of bounds read or memory corruption, and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG54RUGZYJQ2XDXZONDTLDFAZPF46KDK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2774-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XN72DL5K3ATW4V4J2NSOUICFIBM7P6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVP63YNT47WLZX6UE7WUKUN3AIGLJGWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 90 and Firefox ESR 78.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.13, Firefox ESR &lt; 78.13, and Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29990" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 90. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 91.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<bugzilla href="https://bugzilla.suse.com/1189628">SUSE bug 1189628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29991" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox &lt; 91.0.1 and Thunderbird &lt; 91.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30004</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30004" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008618.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0545-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GHTARPJSUMITH7M3ESWRIZUIYW5UAM6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0563-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4XPNZHCXJ32COQGQ62HNGD6DHPO5E552/" source="SUSE-SU"/>
    <description>
    In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004</cve>
	<bugzilla href="https://bugzilla.suse.com/1184348">SUSE bug 1184348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334489" comment="wpa_supplicant is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30178</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30178" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30178" ref_url="https://www.suse.com/security/cve/CVE-2021-30178" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-30178/">CVE-2021-30178</cve>
	<bugzilla href="https://bugzilla.suse.com/1184499">SUSE bug 1184499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30498" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRWTKUG6M4N5W7U2DBAJ4MTXKVSEHRXW/" source="SUSE-SU"/>
    <description>
    A flaw was found in libcaca. A heap buffer overflow in export.c in function export_tga might lead to memory corruption and other potential consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670823" comment="libcaca0-0.99.beta18-14.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30499" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRWTKUG6M4N5W7U2DBAJ4MTXKVSEHRXW/" source="SUSE-SU"/>
    <description>
    A flaw was found in libcaca. A buffer overflow of export.c in function export_troff might lead to memory corruption and other potential consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670823" comment="libcaca0-0.99.beta18-14.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKDHVVJH6V5YXSGWD7GDW62DQXQ22Y5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XFR7LUM6J45XO73B4GQD65J3TG3IDVJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KHAD4TPDMOCFFISFXM3O4TD6SK6KWAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0949-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5YMAC6DXOAQQEUSMY36JS76YC35PAXY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P253WUL63Q3NMRE2SIMFESB3E4L3KLVY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABQT6TDIB2IQ4ZZNUZXMHLE7ZDVD4YBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZB4J5MBNEXABZ45GDK2VINW2XRUSLGX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQOPHIOAWOQQLB7SCESJM5UI67QUVORM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/" source="SUSE-SU"/>
    <description>
    Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<bugzilla href="https://bugzilla.suse.com/1187141">SUSE bug 1187141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625232" comment="MozillaFirefox-78.12.0-112.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625233" comment="MozillaFirefox-devel-78.12.0-112.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625234" comment="MozillaFirefox-translations-common-78.12.0-112.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    An integer overflow was addressed with improved input validation. This issue is fixed in iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, Safari 14.1.1, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/554N5QKF5U43OFZQKL2FBBMYD5YD3BX7/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799</cve>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627312" comment="libjavascriptcoregtk-4_0-18-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627313" comment="libwebkit2gtk-4_0-37-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627305" comment="libwebkit2gtk3-lang-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627314" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627315" comment="typelib-1_0-WebKit2-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627316" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627317" comment="webkit2gtk-4_0-injected-bundles-2.32.3-2.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627318" comment="webkit2gtk3-devel-2.32.3-2.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, iOS 15 and iPadOS 15, Safari 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 14.8 and iPadOS 14.8, tvOS 15, Safari 15, watchOS 8. An attacker in a privileged network position may be able to bypass HSTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted audio file may disclose restricted memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPGRR75P2BX5LLODQ77IAFNLCV2CKB4S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNTYOXRXVCTEGNIBJB3F6WZPD4CNOQI7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848</cve>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849</cve>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPGRR75P2BX5LLODQ77IAFNLCV2CKB4S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNTYOXRXVCTEGNIBJB3F6WZPD4CNOQI7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KJIY3NX4MIKAMIQIFUSKB4JVJBMJUFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191298">SUSE bug 1191298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191301">SUSE bug 1191301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    The issue was resolved with additional restrictions on CSS compositing. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Visiting a maliciously crafted website may reveal a user's browsing history.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to unexpectedly unenforced Content Security Policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    An information leakage issue was addressed. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1. A malicious website using Content Security Policy reports may be able to leak information via redirect behavior .
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194135">SUSE bug 1194135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194138">SUSE bug 1194138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to universal cross site scripting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30897" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FK6EK2KGH7KDPXCBN2Q3SSAVOCIXNCFX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0182-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILRBHE4XKYN4SZKE6UX55V3HK54NAIK/" source="SUSE-SU"/>
    <description>
    An issue existed in the specification for the resource timing API. The specification was updated and the updated specification was implemented. This issue is fixed in macOS Monterey 12.0.1. A malicious website may exfiltrate data cross-origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897</cve>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663980" comment="libjavascriptcoregtk-4_0-18-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663981" comment="libwebkit2gtk-4_0-37-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663972" comment="libwebkit2gtk3-lang-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663982" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663983" comment="typelib-1_0-WebKit2-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663984" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663985" comment="webkit2gtk-4_0-injected-bundles-2.34.3-2.82.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663986" comment="webkit2gtk3-devel-2.34.3-2.82.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934</cve>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196393">SUSE bug 1196393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936</cve>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951</cve>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952</cve>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953</cve>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954</cve>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984</cve>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IHKZVFIFHF623NYTHXHM7GHY5WE7LCHT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0857-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6WUBWGS6GPACWAIGOVLE7UDHZ4HSXZVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1897-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TE4MZKP3FOYVRFOKL6QQUC77PHP2K76/" source="SUSE-SU"/>
    <description>
    LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191879">SUSE bug 1191879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334201" comment="libX11 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552353" comment="libX11-6-1.6.2-12.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539021" comment="libX11-6-32bit-1.6.2-12.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539022" comment="libX11-data-1.6.2-12.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552354" comment="libX11-xcb1-1.6.2-12.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539024" comment="libX11-xcb1-32bit-1.6.2-12.21.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31542</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31542" ref_url="https://www.suse.com/security/cve/CVE-2021-31542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
    <description>
    In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31542/">CVE-2021-31542</cve>
	<bugzilla href="https://bugzilla.suse.com/1185623">SUSE bug 1185623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008661.html" source="SUSE-SU"/>
		<reference ref_id="TID000019841" ref_url="https://www.suse.com/support/kb/doc/?id=000019841" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTRDPRKO2NDRVSH5UJJKLBDYJXGUBK6P/" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181506">SUSE bug 1181506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181657">SUSE bug 1181657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531993" comment="sudo-1.8.10p3-10.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552178" comment="sudo-1.8.10p3-10.32.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552211" comment="sudo-1.8.10p3-10.35.1 is installed"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596435" comment="sudo-1.8.10p3-10.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F32WQ7K6A45WOBEDFMGMRXDC2F2SL3IF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KAQGPGA6ZQQT3VO5WOYFSSTZFH57MPWK/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected. This rejection response was not fully initialised in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a a footer. This led to a NULL pointer dereference on initialised memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server. This issue affected mod_http2 1.15.17 and Apache HTTP Server version 2.4.47 only. Apache HTTP Server 2.4.47 was never released.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618</cve>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552377" comment="apache2-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539074" comment="apache2-doc-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552378" comment="apache2-example-pages-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552379" comment="apache2-prefork-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552380" comment="apache2-utils-2.4.23-29.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552381" comment="apache2-worker-2.4.23-29.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT6BSX5663NCXU3Y4KR3RA3RQHJMCFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AKEBUCTPHZWXJGF6EWK7HBTO726SP2Y/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531880" comment="python-devel-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531872" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531873" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531874" comment="python-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531875" comment="python-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531876" comment="python-base-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531877" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531878" comment="python-curses-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531879" comment="python-demo-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531883" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531884" comment="python-idle-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531885" comment="python-tk-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531886" comment="python-xml-2.7.17-28.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552085" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552086" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552087" comment="python-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552088" comment="python-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552089" comment="python-base-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552090" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552091" comment="python-curses-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552092" comment="python-demo-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552093" comment="python-devel-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552094" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552095" comment="python-idle-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552096" comment="python-tk-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552097" comment="python-xml-2.7.17-28.64.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596356" comment="libpython2_7-1_0-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552086" comment="libpython2_7-1_0-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596357" comment="python-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552088" comment="python-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596358" comment="python-base-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552090" comment="python-base-32bit-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596359" comment="python-curses-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596360" comment="python-demo-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596361" comment="python-devel-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531881" comment="python-doc-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531882" comment="python-doc-pdf-2.7.17-28.64.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596362" comment="python-gdbm-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596363" comment="python-idle-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596364" comment="python-tk-2.7.17-28.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596365" comment="python-xml-2.7.17-28.64.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFO6LZPCK3BJ6OA3FTD3UWQI47BKDQBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
    <description>
    In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196771">SUSE bug 1196771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657553" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657554" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657555" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFO6LZPCK3BJ6OA3FTD3UWQI47BKDQBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193383">SUSE bug 1193383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657553" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657554" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657555" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008991.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTUD7F7CVHXB4OCLI7OT4AVJTO6T64TM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2B2UD46YGBOYO64SOPMOM6DQAL6FGCHZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1819-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4DDS7NLC6D7UVP25OVRWIRK6Y44WZKCU/" source="SUSE-SU"/>
    <description>
    A flaw was found in the gstreamer h264 component of gst-plugins-bad before v1.18.1 where when parsing a h264 header, an attacker could cause the stack to be smashed, memory corruption and possibly code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334065" comment="gstreamer-plugins-bad is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552339" comment="gstreamer-plugins-bad-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539006" comment="gstreamer-plugins-bad-lang-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552340" comment="libgstadaptivedemux-1_0-0-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552341" comment="libgstbadaudio-1_0-0-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552342" comment="libgstbadbase-1_0-0-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552343" comment="libgstbadvideo-1_0-0-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552344" comment="libgstbasecamerabinsrc-1_0-0-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552345" comment="libgstcodecparsers-1_0-0-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552338" comment="libgstegl-1_0-0-1.2.4-3.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552346" comment="libgstgl-1_0-0-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552347" comment="libgstmpegts-1_0-0-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552348" comment="libgstphotography-1_0-0-1.8.3-18.3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552349" comment="libgsturidownloader-1_0-0-1.8.3-18.3.5 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3200" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3200" ref_url="https://www.suse.com/security/cve/CVE-2021-3200" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009094.html" source="SUSE-SU"/>
    <description>
    Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3200/">CVE-2021-3200</cve>
	<bugzilla href="https://bugzilla.suse.com/1186229">SUSE bug 1186229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552388" comment="libsolv-devel-0.6.37-2.27.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552389" comment="libsolv-tools-0.6.37-2.27.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552390" comment="libzypp-16.21.4-27.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552391" comment="libzypp-devel-16.21.4-27.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552392" comment="perl-solv-0.6.37-2.27.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552393" comment="python-solv-0.6.37-2.27.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIV3KJYAQTSSLGKE535SO3C2IEXHDPCN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKAEBUWSUHMGHAQQGZGGJL4XNRQXGZEZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVY7TKRUVVD5PT3ITLWLB2FFEX6JT7UW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6AKC5KVKWVYW4R23NQPYSXI57JD6CIYN/" source="SUSE-SU"/>
    <description>
    A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009652164" comment="postgresql10-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652165" comment="postgresql10-contrib-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652158" comment="postgresql10-docs-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652166" comment="postgresql10-plperl-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652167" comment="postgresql10-plpython-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652168" comment="postgresql10-pltcl-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652169" comment="postgresql10-server-10.18-4.19.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32028" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1785-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIV3KJYAQTSSLGKE535SO3C2IEXHDPCN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1785-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKAEBUWSUHMGHAQQGZGGJL4XNRQXGZEZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1970-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVY7TKRUVVD5PT3ITLWLB2FFEX6JT7UW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6AKC5KVKWVYW4R23NQPYSXI57JD6CIYN/" source="SUSE-SU"/>
    <description>
    A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009652164" comment="postgresql10-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652165" comment="postgresql10-contrib-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652158" comment="postgresql10-docs-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652166" comment="postgresql10-plperl-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652167" comment="postgresql10-plpython-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652168" comment="postgresql10-pltcl-10.18-4.19.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652169" comment="postgresql10-server-10.18-4.19.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFO6LZPCK3BJ6OA3FTD3UWQI47BKDQBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196771">SUSE bug 1196771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657553" comment="libruby2_1-2_1-2.1.9-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657554" comment="ruby2.1-2.1.9-19.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657555" comment="ruby2.1-stdlib-2.1.9-19.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32280" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009685.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JLSTM3B2XXVZAOO3A7DAIVZCM7BWWB5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G42543RXBU4MHD2R5PW7KL3I42JAB5VA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LJVPVAWYSJP4T7SCIWWVBLSRWKCK2EH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3584-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EBZZA2GBLUHRWOSJZPQSU2KHSYN4PFJK/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fig2dev before 3.2.8.. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause Denial of Service. The fixed version of fig2dev is 3.2.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653544" comment="transfig-3.2.8b-2.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196174">SUSE bug 1196174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VGFWRIIXBFCLA7GINXJUPUD7YVYB5UKO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y7PPP2MGW6YG46U25HVAXKQBMB2PV4XV/" source="SUSE-SU"/>
    <description>
    A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009626903" comment="libsndfile1-1.0.25-36.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626901" comment="libsndfile1-32bit-1.0.25-36.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32491" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWUVFLJ5WIUYL2E7ZRZKXICPKCTWQHHD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR6UIBZP5PP63ZY663PXBSRRCYNCGVJV/" source="SUSE-SU"/>
    <description>
    A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow in function render() in tools/ddjvu via crafted djvu file may lead to application crash and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552307" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32492" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWUVFLJ5WIUYL2E7ZRZKXICPKCTWQHHD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR6UIBZP5PP63ZY663PXBSRRCYNCGVJV/" source="SUSE-SU"/>
    <description>
    A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552307" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32493" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008784.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWUVFLJ5WIUYL2E7ZRZKXICPKCTWQHHD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JR6UIBZP5PP63ZY663PXBSRRCYNCGVJV/" source="SUSE-SU"/>
    <description>
    A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file may lead to application crash and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552307" comment="libdjvulibre21-3.5.25.3-5.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3272" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008332.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6ZF7VRY24X2GVC7MCP6MQKQBRKCSJ2A/" source="SUSE-SU"/>
    <description>
    jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			</criteria>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531900" comment="libjasper1-1.900.14-195.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531901" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552106" comment="libjasper1-1.900.14-195.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552107" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596374" comment="libjasper1-1.900.14-195.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552107" comment="libjasper1-32bit-1.900.14-195.25.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3281</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3281" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3281" ref_url="https://www.suse.com/security/cve/CVE-2021-3281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3281/">CVE-2021-3281</cve>
	<bugzilla href="https://bugzilla.suse.com/1181379">SUSE bug 1181379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    crossbeam-deque is a package of work-stealing deques for building task schedulers when programming in Rust. In versions prior to 0.7.4 and 0.8.0, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33033" ref_url="https://www.suse.com/security/cve/CVE-2021-33033" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33033/">CVE-2021-33033</cve>
	<bugzilla href="https://bugzilla.suse.com/1186109">SUSE bug 1186109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186283">SUSE bug 1186283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3308</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3308" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3308" ref_url="https://www.suse.com/security/cve/CVE-2021-3308" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.12.3 through 4.12.4 and 4.13.1 through 4.14.x. An x86 HVM guest with PCI pass through devices can force the allocation of all IDT vectors on the system by rebooting itself with MSI or MSI-X capabilities enabled and entries setup. Such reboots will leak any vectors used by the MSI(-X) entries that the guest might had enabled, and hence will lead to vector exhaustion on the system, not allowing further PCI pass through devices to work properly. HVM guests with PCI pass through devices can mount a Denial of Service (DoS) attack affecting the pass through of PCI devices to other guests or the hardware domain. In the latter case, this would affect the entire host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3308/">CVE-2021-3308</cve>
	<bugzilla href="https://bugzilla.suse.com/1181254">SUSE bug 1181254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33120" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/" source="SUSE-SU"/>
    <description>
    Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667937" comment="ucode-intel-20220207-13.93.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33203</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33203" ref_url="https://www.suse.com/security/cve/CVE-2021-33203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
    <description>
    Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-33203/">CVE-2021-33203</cve>
	<bugzilla href="https://bugzilla.suse.com/1186608">SUSE bug 1186608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3345</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3345" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3345" ref_url="https://www.suse.com/security/cve/CVE-2021-3345" source="SUSE CVE"/>
    <description>
    _gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-3345/">CVE-2021-3345</cve>
	<bugzilla href="https://bugzilla.suse.com/1181632">SUSE bug 1181632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334024" comment="libgcrypt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-ESPOS</platform>
            <platform>SUSE Linux Enterprise Server 12 SP2-LTSS</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-espos:12:sp2</cpe>
		<cpe>cpe:/o:suse:sles-ltss:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009132242" comment="SUSE Linux Enterprise Server 12 SP2-ESPOS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552494" comment="kgraft-patch-4_4_121-92_129-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552493" comment="kgraft-patch-4_4_121-92_135-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531992" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552492" comment="kgraft-patch-4_4_121-92_141-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552491" comment="kgraft-patch-4_4_121-92_146-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009531887" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531888" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531889" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531893" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-LTSS is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552098" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552099" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552100" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552102" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538223" comment="kgraft-patch-4_4_121-92_129-default-9-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538222" comment="kgraft-patch-4_4_121-92_135-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538224" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538221" comment="kgraft-patch-4_4_121-92_141-default-6-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538220" comment="kgraft-patch-4_4_121-92_146-default-4-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538150" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596366" comment="kernel-default-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596367" comment="kernel-default-base-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596368" comment="kernel-default-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552101" comment="kernel-default-man-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531890" comment="kernel-devel-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531891" comment="kernel-macros-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531892" comment="kernel-source-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596369" comment="kernel-syms-4.4.121-92.149.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531992" comment="kgraft-patch-4_4_121-92_138-default-7-2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009531894" comment="kgraft-patch-4_4_121-92_149-default-1-3.3.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3348</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3348" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33503" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33503" ref_url="https://www.suse.com/security/cve/CVE-2021-33503" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYARUF6IH56FOIKBV7PTO7AXODL5GKNT/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33503/">CVE-2021-33503</cve>
	<bugzilla href="https://bugzilla.suse.com/1187045">SUSE bug 1187045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009616441" comment="python3-urllib3-1.25.10-3.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPALT4SBPXXPFJVTZN5FQCXMNVH4GXCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOWBBOB3KB4MSVNKBUGK3UIYPYWCHNLS/" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560</cve>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189854">SUSE bug 1189854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199664">SUSE bug 1199664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552394" comment="libgcrypt20-1.6.1-16.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539096" comment="libgcrypt20-32bit-1.6.1-16.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552395" comment="libgcrypt20-hmac-1.6.1-16.77.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539098" comment="libgcrypt20-hmac-32bit-1.6.1-16.77.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33571</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33571" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33571" ref_url="https://www.suse.com/security/cve/CVE-2021-33571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
    <description>
    In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33571/">CVE-2021-33571</cve>
	<bugzilla href="https://bugzilla.suse.com/1186611">SUSE bug 1186611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009596325" comment="crowbar-openstack-4.0+git.1616146720.44daffca0-9.81.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596326" comment="grafana-6.7.4-1.24.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596327" comment="kibana-4.6.6-9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596328" comment="monasca-installer-20180608_12.47-16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596329" comment="python-Django-1.8.19-3.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596330" comment="python-py-1.8.1-11.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009596331" comment="ruby2.1-rubygem-activerecord-session_store-0.1.2-3.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009579.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZGEXWUJCYCGR3DHTHHZAJYSGQP2SHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYMYANBGPUFKQ7SIIB3PZLAAR35QYXOR/" source="SUSE-SU"/>
    <description>
    The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189426">SUSE bug 1189426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192788">SUSE bug 1192788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196766">SUSE bug 1196766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651126" comment="glibc-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651115" comment="glibc-32bit-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651127" comment="glibc-devel-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651117" comment="glibc-devel-32bit-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651118" comment="glibc-html-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651119" comment="glibc-i18ndata-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651120" comment="glibc-info-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651128" comment="glibc-locale-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651122" comment="glibc-locale-32bit-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651129" comment="glibc-profile-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651124" comment="glibc-profile-32bit-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651130" comment="nscd-2.22-116.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33657" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010802.html" source="SUSE-SU"/>
    <description>
    There is a heap overflow problem in video/SDL_pixels.c in SDL (Simple DirectMedia Layer) 2.x to 2.0.18 versions. By crafting a malicious .BMP file, an attacker can cause the application using this library to crash, denial of service or Code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199105">SUSE bug 1199105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679549" comment="libSDL-1_2-0-1.2.15-15.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679539" comment="libSDL-1_2-0-32bit-1.2.15-15.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="TID000020341" ref_url="https://www.suse.com/support/kb/doc/?id=000020341" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33910" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009695.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAGPKC3S3ZQN25VD5T76IP4JJFCIWE4R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZAKU2IKORZZMOBGJJJTJIICBEZDWUNU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QZX3NUVJOV7AC5ZERG2JQFSEIIX6QJXR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2410-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPIXUFHECPYFYLXDFG3MHBODZD7H7P2I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2809-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PFXYBJHAFZNV57EZ4VL2LC446RMO7HVT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCSKB4ZMNVGFIMLLPPNFDQMFKY7DLL4L/" source="SUSE-SU"/>
    <description>
    basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910</cve>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625777" comment="libsystemd0-228-150.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625743" comment="libsystemd0-32bit-228-150.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625778" comment="libudev1-228-150.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625746" comment="libudev1-32bit-228-150.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625779" comment="systemd-228-150.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625748" comment="systemd-32bit-228-150.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625749" comment="systemd-bash-completion-228-150.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625780" comment="systemd-devel-228-150.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625781" comment="systemd-sysvinit-228-150.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625782" comment="udev-228-150.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3392</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3392" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3392" ref_url="https://www.suse.com/security/cve/CVE-2021-3392" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3392/">CVE-2021-3392</cve>
	<bugzilla href="https://bugzilla.suse.com/1189236">SUSE bug 1189236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3393</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3393" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0423-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IILVBEHTY5E5NJCJLBHIW7MZUDL25BDR/" source="SUSE-SU"/>
    <description>
    An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393</cve>
	<bugzilla href="https://bugzilla.suse.com/1182040">SUSE bug 1182040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009339049" comment="postgresql10 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334044" comment="postgresql94 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334198" comment="postgresql96 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3408</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3408" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3408" ref_url="https://www.suse.com/security/cve/CVE-2021-3408" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3408/">CVE-2021-3408</cve>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183135">SUSE bug 1183135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338902" comment="grub2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3409</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3409" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3409" ref_url="https://www.suse.com/security/cve/CVE-2021-3409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3409/">CVE-2021-3409</cve>
	<bugzilla href="https://bugzilla.suse.com/1182282">SUSE bug 1182282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333937" comment="xen is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3411</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3411" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3411" ref_url="https://www.suse.com/security/cve/CVE-2021-3411" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3411/">CVE-2021-3411</cve>
	<bugzilla href="https://bugzilla.suse.com/1182498">SUSE bug 1182498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3416" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416</cve>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186473">SUSE bug 1186473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552212" comment="qemu-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552213" comment="qemu-block-curl-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552214" comment="qemu-block-rbd-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552215" comment="qemu-block-ssh-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552216" comment="qemu-guest-agent-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552217" comment="qemu-ipxe-1.0.0-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552218" comment="qemu-kvm-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552219" comment="qemu-lang-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552220" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552221" comment="qemu-sgabios-8-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552222" comment="qemu-tools-2.6.2-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552223" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552224" comment="qemu-x86-2.6.2-41.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3418</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3418" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3418" ref_url="https://www.suse.com/security/cve/CVE-2021-3418" source="SUSE CVE"/>
    <description>
    If certificates that signed grub are installed into db, grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown, yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grub2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3418/">CVE-2021-3418</cve>
	<bugzilla href="https://bugzilla.suse.com/1182890">SUSE bug 1182890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338902" comment="grub2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3419" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419</cve>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552320" comment="qemu-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552321" comment="qemu-block-curl-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552322" comment="qemu-block-rbd-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552323" comment="qemu-block-ssh-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552324" comment="qemu-guest-agent-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552325" comment="qemu-ipxe-1.0.0-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552326" comment="qemu-kvm-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552327" comment="qemu-lang-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552328" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552329" comment="qemu-sgabios-8-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552330" comment="qemu-tools-2.6.2-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552331" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552332" comment="qemu-x86-2.6.2-41.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3426</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KYXM7YGLJSNOU4FYI3M2QXACCQ4SO3AE/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426</cve>
	<bugzilla href="https://bugzilla.suse.com/1183374">SUSE bug 1183374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334122" comment="python is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3444</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3444" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333928" comment="kernel-source is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3448" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1426-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q5SXZU2UVUXVIVOLI6OT32WIQ6OJBE5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DP73HQCB6UNPUB54KPOZEMBUQDVN6M6/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448</cve>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679550" comment="dnsmasq-2.78-18.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3449</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRCNDGXHP3DJBJKDGVACNKEWGRZDKQRJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
    <description>
    An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449</cve>
	<bugzilla href="https://bugzilla.suse.com/1183852">SUSE bug 1183852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3450</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3450" ref_url="https://www.suse.com/security/cve/CVE-2021-3450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
    <description>
    The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3450/">CVE-2021-3450</cve>
	<bugzilla href="https://bugzilla.suse.com/1183851">SUSE bug 1183851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188549">SUSE bug 1188549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34552</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34552" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009267.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
    <description>
    Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552</cve>
	<bugzilla href="https://bugzilla.suse.com/1188574">SUSE bug 1188574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627134" comment="python-Pillow-2.8.1-4.25.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3466</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3466" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3466" ref_url="https://www.suse.com/security/cve/CVE-2021-3466" source="SUSE CVE"/>
    <description>
    A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3466/">CVE-2021-3466</cve>
	<bugzilla href="https://bugzilla.suse.com/1184398">SUSE bug 1184398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009350632" comment="libmicrohttpd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1493-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1494-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0694-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCPLDL2TVAMUG4CYPGSPUHQ3KJXENCPN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAJ7F7M4LLALLHLSQR7PD7HCTVHGAFMX/" source="SUSE-SU"/>
    <description>
    A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338879" comment="avahi is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552289" comment="avahi-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538952" comment="avahi-lang-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552290" comment="avahi-utils-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552291" comment="libavahi-client3-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538955" comment="libavahi-client3-32bit-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552292" comment="libavahi-common3-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538957" comment="libavahi-common3-32bit-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552293" comment="libavahi-core7-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552294" comment="libavahi-glib1-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538960" comment="libavahi-glib1-32bit-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552295" comment="libdns_sd-0.6.32-32.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538962" comment="libdns_sd-32bit-0.6.32-32.15.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008626.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CRPRB7NRFEWN4RTARQEO4ANKTCLF6AS/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334030" comment="xorg-x11-server is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552208" comment="xorg-x11-server-7.6_1.18.3-76.40.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552209" comment="xorg-x11-server-extra-7.6_1.18.3-76.40.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3474</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3474" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3474" ref_url="https://www.suse.com/security/cve/CVE-2021-3474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008595.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0536-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OEPCGI23GJK5SW2WMNMPUTRJTU2STGG/" source="SUSE-SU"/>
    <description>
    There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could cause a shift overflow in the FastHufDecoder, potentially leading to problems with application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3474/">CVE-2021-3474</cve>
	<bugzilla href="https://bugzilla.suse.com/1184174">SUSE bug 1184174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334075" comment="openexr is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3476" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009386.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0536-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OEPCGI23GJK5SW2WMNMPUTRJTU2STGG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UU6C6KHVOWCVMKES2H2PK5BJGOG2DVEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2793-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6OVSOAQ3PQXBTM46SMNT6H3XP45CC7L/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenEXR's B44 uncompression functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to OpenEXR could trigger shift overflows, potentially affecting application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476</cve>
	<bugzilla href="https://bugzilla.suse.com/1184172">SUSE bug 1184172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009627947" comment="libIlmImf-Imf_2_1-21-2.1.0-6.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627948" comment="openexr-2.1.0-6.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3478</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3478" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3478" ref_url="https://www.suse.com/security/cve/CVE-2021-3478" source="SUSE CVE"/>
    <description>
    There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3478/">CVE-2021-3478</cve>
	<bugzilla href="https://bugzilla.suse.com/1184352">SUSE bug 1184352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334075" comment="openexr is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3479" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0670-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRXYHURHLDTSCIDOVAICJNNLPZTJP6NQ/" source="SUSE-SU"/>
    <description>
    There's a flaw in OpenEXR's Scanline API functionality in versions before 3.0.0-beta. An attacker who is able to submit a crafted file to be processed by OpenEXR could trigger excessive consumption of memory, resulting in an impact to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479</cve>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334510" comment="openexr is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552396" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552397" comment="openexr-2.1.0-6.34.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
    <description>
    Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798</cve>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633904" comment="apache2-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633905" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633906" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633907" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633908" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552296" comment="kernel-default-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552297" comment="kernel-default-base-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552298" comment="kernel-default-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552299" comment="kernel-devel-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552300" comment="kernel-macros-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552301" comment="kernel-source-4.4.121-92.155.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552302" comment="kernel-syms-4.4.121-92.155.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1475-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6RYWEZ5BKTK6UEP6HAB7B466BPC3SMJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3616-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4TQ3DLF5YEQDDJUON6WGBX2HVVM7FOLB/" source="SUSE-SU"/>
    <description>
    There's a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487</cve>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653540" comment="binutils-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653541" comment="binutils-devel-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653542" comment="libctf-nobfd0-2.37-9.39.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653543" comment="libctf0-2.37-9.39.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192595">SUSE bug 1192595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3500" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0877-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6A76FJWCYCAB3L3OPKMXF4E37JBFGCKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1948-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4FJJNOEZPW7IPJGLCW6LJNTZX7JZBBT/" source="SUSE-SU"/>
    <description>
    A flaw was found in djvulibre-3.5.28 and earlier. A Stack overflow in function DJVU::DjVuDocument::get_djvu_file() via crafted djvu file may lead to application crash and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552315" comment="libdjvulibre21-3.5.25.3-5.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35042</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35042" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35042" ref_url="https://www.suse.com/security/cve/CVE-2021-35042" source="SUSE CVE"/>
    <description>
    Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2021-35042/">CVE-2021-35042</cve>
	<bugzilla href="https://bugzilla.suse.com/1187785">SUSE bug 1187785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334388" comment="python-Django is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
    <description>
    There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552312" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552313" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552314" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
    <description>
    There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194438">SUSE bug 1194438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196383">SUSE bug 1196383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552312" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552313" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552314" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
    <description>
    There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552312" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552313" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552314" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527</cve>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653168" comment="qemu-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653169" comment="qemu-block-curl-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653170" comment="qemu-block-rbd-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653171" comment="qemu-block-ssh-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653172" comment="qemu-guest-agent-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653173" comment="qemu-ipxe-1.0.0-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653174" comment="qemu-kvm-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653175" comment="qemu-lang-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653176" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653177" comment="qemu-sgabios-8-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653178" comment="qemu-tools-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653179" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653180" comment="qemu-x86-2.6.2-41.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
    <description>
    A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537</cve>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334391" comment="rubygem-nokogiri is not affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552312" comment="libxml2-2-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538983" comment="libxml2-2-32bit-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009538984" comment="libxml2-doc-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552313" comment="libxml2-tools-2.9.4-46.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552314" comment="python-libxml2-2.9.4-46.43.1 is installed"/>
			</criteria>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE product of Oracle Java SE (component: Deployment). The supported version that is affected is Java SE: 8u301. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560</cve>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Utility). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Keytool). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via Kerberos to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567</cve>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u311, 8u301; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008926.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABSE3IWWQYLOHOVCNFCOZVXFZAYMJYN4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NCYKG2YTUVFTW5R7DJWWWJGLDWU7XE5/" source="SUSE-SU"/>
    <description>
    It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560</cve>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552335" comment="libpolkit0-0.113-5.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552336" comment="polkit-0.113-5.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552337" comment="typelib-1_0-Polkit-1_0-0.113-5.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009773.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRBHNCR5KDMAYD3N3CDRPQWW3T6HIBNY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/443XZX47COH5AR2HZJWHHPFLGZ7FL7SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYI4OMK4TI6UOJ2GUZST7WX2T6X7H6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3615-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VOJHYCWQ5VVLZ6J4OKIW2JS6MBT7VLM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CY22JAEBEGW675Z365MZJV47IFLWRYR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBTSKQFBRMEJYNB4FQDRGX4SHHFX2QSS/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u311, 8u301, 11.0.12, 17; Oracle GraalVM Enterprise Edition: 20.3.3 and 21.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009656897" comment="java-1_7_0-openjdk-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656898" comment="java-1_7_0-openjdk-demo-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656899" comment="java-1_7_0-openjdk-devel-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656900" comment="java-1_7_0-openjdk-headless-1.7.0.321-43.53.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657044" comment="java-1_8_0-openjdk-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657045" comment="java-1_8_0-openjdk-demo-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657046" comment="java-1_8_0-openjdk-devel-1.8.0.312-27.66.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657047" comment="java-1_8_0-openjdk-headless-1.8.0.312-27.66.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3561" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009457.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKD7IBCZKGMDHLZ7H4T5P7WTXHNFSOB6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1311-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQ34JCCBYY5MVDLL7VGCWBOZKOQ5EXTK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HYGTSDI2IQ34SYGQZGBYMH3NPMCAL2X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RK4BRVCUPZKN5VS2JGWBPYITONWJCIZJ/" source="SUSE-SU"/>
    <description>
    An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631268" comment="transfig-3.2.8a-2.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3564" ref_url="https://www.suse.com/security/cve/CVE-2021-3564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3564/">CVE-2021-3564</cve>
	<bugzilla href="https://bugzilla.suse.com/1186207">SUSE bug 1186207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1071-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWXNSU7RCV6WGSN2JK7NWBUOQVY6MMXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2414-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHOZ6ZP4DJK5HMVJDBHGX4ILPY5COAZM/" source="SUSE-SU"/>
    <description>
    A flaw was found in Caribou due to a regression of CVE-2020-25712 fix. An attacker could use this flaw to bypass screen-locking applications that leverage Caribou as an input mechanism. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567</cve>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552363" comment="caribou-common-0.4.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552364" comment="libcaribou0-0.4.21-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552365" comment="typelib-1_0-Caribou-1_0-0.4.21-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009496.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SID77H42G7M3XGNJH7J3TZVHCIZENMVJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQJH6H27YAC2H2WM75ZCWCXIEK3AXNV3/" source="SUSE-SU"/>
    <description>
    A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570</cve>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626114" comment="linuxptp-1.4-15.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4XGPKTRWLOEATNJNZGQZCO6BZTKIKJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZAR7UXBYGOSW57CMLBEWIM7KTCVMXFZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580</cve>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187892">SUSE bug 1187892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552386" comment="libhogweed2-2.7.1-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539091" comment="libhogweed2-32bit-2.7.1-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552387" comment="libnettle4-2.7.1-13.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009539093" comment="libnettle4-32bit-2.7.1-13.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3583</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3583" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3583" ref_url="https://www.suse.com/security/cve/CVE-2021-3583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009930.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3583/">CVE-2021-3583</cve>
	<bugzilla href="https://bugzilla.suse.com/1188061">SUSE bug 1188061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3592" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625003" comment="qemu-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625004" comment="qemu-block-curl-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625005" comment="qemu-block-rbd-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625006" comment="qemu-block-ssh-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625007" comment="qemu-guest-agent-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625008" comment="qemu-ipxe-1.0.0-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625009" comment="qemu-kvm-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625010" comment="qemu-lang-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625011" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625012" comment="qemu-sgabios-8-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625013" comment="qemu-tools-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625014" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625015" comment="qemu-x86-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3593" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593</cve>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625003" comment="qemu-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625004" comment="qemu-block-curl-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625005" comment="qemu-block-rbd-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625006" comment="qemu-block-ssh-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625007" comment="qemu-guest-agent-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625008" comment="qemu-ipxe-1.0.0-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625009" comment="qemu-kvm-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625010" comment="qemu-lang-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625011" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625012" comment="qemu-sgabios-8-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625013" comment="qemu-tools-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625014" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625015" comment="qemu-x86-2.6.2-41.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3594" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625003" comment="qemu-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625004" comment="qemu-block-curl-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625005" comment="qemu-block-rbd-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625006" comment="qemu-block-ssh-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625007" comment="qemu-guest-agent-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625008" comment="qemu-ipxe-1.0.0-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625009" comment="qemu-kvm-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625010" comment="qemu-lang-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625011" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625012" comment="qemu-sgabios-8-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625013" comment="qemu-tools-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625014" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625015" comment="qemu-x86-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009579.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZGEXWUJCYCGR3DHTHHZAJYSGQP2SHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYMYANBGPUFKQ7SIIB3PZLAAR35QYXOR/" source="SUSE-SU"/>
    <description>
    The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192788">SUSE bug 1192788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651126" comment="glibc-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651115" comment="glibc-32bit-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651127" comment="glibc-devel-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651117" comment="glibc-devel-32bit-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651118" comment="glibc-html-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651119" comment="glibc-i18ndata-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651120" comment="glibc-info-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651128" comment="glibc-locale-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651122" comment="glibc-locale-32bit-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651129" comment="glibc-profile-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651124" comment="glibc-profile-32bit-2.22-116.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651130" comment="nscd-2.22-116.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3595" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625003" comment="qemu-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625004" comment="qemu-block-curl-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625005" comment="qemu-block-rbd-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625006" comment="qemu-block-ssh-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625007" comment="qemu-guest-agent-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625008" comment="qemu-ipxe-1.0.0-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625009" comment="qemu-kvm-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625010" comment="qemu-lang-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625011" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625012" comment="qemu-sgabios-8-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625013" comment="qemu-tools-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625014" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625015" comment="qemu-x86-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634688" comment="xen-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634689" comment="xen-doc-html-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634690" comment="xen-libs-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634691" comment="xen-libs-32bit-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634692" comment="xen-tools-4.7.6_16-43.79.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634693" comment="xen-tools-domU-4.7.6_16-43.79.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3598" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXJ54NGEKD6JFKYVYG6R2JQZI2N5GDOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NN5N7FWEJ6MCV273IVKMPXUXFO2LDVCF/" source="SUSE-SU"/>
    <description>
    There's a flaw in OpenEXR's ImfDeepScanLineInputFile functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598</cve>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552396" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552397" comment="openexr-2.1.0-6.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3605" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXJ54NGEKD6JFKYVYG6R2JQZI2N5GDOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NN5N7FWEJ6MCV273IVKMPXUXFO2LDVCF/" source="SUSE-SU"/>
    <description>
    There's a flaw in OpenEXR's rleUncompress functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605</cve>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191176">SUSE bug 1191176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009552396" comment="libIlmImf-Imf_2_1-21-2.1.0-6.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009552397" comment="openexr-2.1.0-6.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
    <description>
    .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188720">SUSE bug 1188720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625783" comment="kernel-default-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625784" comment="kernel-default-base-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625785" comment="kernel-default-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625786" comment="kernel-devel-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625787" comment="kernel-macros-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625788" comment="kernel-source-4.4.121-92.158.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625789" comment="kernel-syms-4.4.121-92.158.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611</cve>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193914">SUSE bug 1193914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625003" comment="qemu-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625004" comment="qemu-block-curl-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625005" comment="qemu-block-rbd-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625006" comment="qemu-block-ssh-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625007" comment="qemu-guest-agent-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625008" comment="qemu-ipxe-1.0.0-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625009" comment="qemu-kvm-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625010" comment="qemu-lang-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625011" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625012" comment="qemu-sgabios-8-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625013" comment="qemu-tools-2.6.2-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625014" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625015" comment="qemu-x86-2.6.2-41.68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3620</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3620" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3620" ref_url="https://www.suse.com/security/cve/CVE-2021-3620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009930.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3620/">CVE-2021-3620</cve>
	<bugzilla href="https://bugzilla.suse.com/1187725">SUSE bug 1187725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334387" comment="ansible is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3630" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009319.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NS5SRA6CXGTX6C5SHQQRIPVMUAZ326KY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZTM6WP5W5E6E2WSTHST5KAOESVI2S47B/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault. This flaw affects DjVuLibre versions prior to 3.5.28.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009627946" comment="libdjvulibre21-3.5.25.3-5.19.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202136386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-36386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-36386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36386" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009892.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1183-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/467HBFXGJJT2G2NY45XULNMMNRQKSY46/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MQSBOFKUN3D2SAYKHGH2NQW7UGR6J7P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMV7EBXEZS74TUNOO7AISIYY6S7T7TDO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEYREAP5E4PNL4UXB7R6OYSFSQ5VNFHB/" source="SUSE-SU"/>
    <description>
    report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009630872" comment="fetchmail-6.3.26-13.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630873" comment="fetchmailconf-6.3.26-13.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191530">SUSE bug 1191530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2760-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGOSTA5JEGSS4FAXRRSGJYRZUQK3LXPV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFSPBU6QGGED7SJWK464GN672ZJB6SMI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVSODU3IBFQTSXJDK3YGWSPCAZNRBOB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT3PAHM4M6Q56XJOJVVIZBROY2Y4SUU2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4F2ZKNNMGENSNMAS5CDHA3CDDRAXF3AQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHIBOQVFGTSNZKZ3C7TDCN35RIGH22D4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DA3KJWR2C3T5FTDAXOSTUOQOJZTKFSKF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAT5MK7257FCSK4EI6CRDFI5ZVBUB5VC/" source="SUSE-SU"/>
    <description>
    A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193099">SUSE bug 1193099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
	<criteria operator="OR">
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334694" comment="nodejs6 is affected"/>
		</criteria>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630393" comment="libcares2-1.9.1-9.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3682" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682</cve>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009653168" comment="qemu-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653169" comment="qemu-block-curl-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653170" comment="qemu-block-rbd-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653171" comment="qemu-block-ssh-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653172" comment="qemu-guest-agent-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653173" comment="qemu-ipxe-1.0.0-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653174" comment="qemu-kvm-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653175" comment="qemu-lang-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653176" comment="qemu-seabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653177" comment="qemu-sgabios-8-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653178" comment="qemu-tools-2.6.2-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653179" comment="qemu-vgabios-1.9.1_0_gb3ef39f-41.73.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653180" comment="qemu-x86-2.6.2-41.73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2966-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YXBKWFNVQ5GSDMIZHMMOGHRWWUOWZMJE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJMNXN2ETVF67Q4UKMXBSCF2LIA5HVUH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BTAMI3TGUD3BTSIO4MHIHCP2H4HJWRWI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE6BERTPDDZTU2D7PHOS5VANHEPO7VG4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2827-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXNTTGRCRZBMWGGU4UK4PHVAAZAFABI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOUNRN5SCBRRVEIYDG3G3PFLGVRXKDPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZPO3HVVYNS6WITBZKOQFXIVLJOK24MR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O65IINGUXDYQLSV7GD7SXFUKFY5WYUTA/" source="SUSE-SU"/>
    <description>
    ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190129">SUSE bug 1190129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191640">SUSE bug 1191640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192100">SUSE bug 1192100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192787">SUSE bug 1192787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194948">SUSE bug 1194948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009632419" comment="libopenssl-devel-1.0.2j-60.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632420" comment="libopenssl1_0_0-1.0.2j-60.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632401" comment="libopenssl1_0_0-32bit-1.0.2j-60.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632421" comment="libopenssl1_0_0-hmac-1.0.2j-60.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632403" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632422" comment="openssl-1.0.2j-60.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632405" comment="openssl-doc-1.0.2j-60.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A security issue was found in Linux kernel’s OverlayFS subsystem where a local attacker who has the ability to mount the TmpFS filesystem with OverlayFS can abuse a logic bug in the overlayfs code which can inadvertently reveal files hidden in the original mount.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1440-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O37YZAXFT5P25MP6HADS7PSL7LUNUR45/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLPFQQ775XYJFXYC4GI3EPDN5KR7OLG7/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600</cve>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009677611" comment="libblkid1-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677612" comment="libblkid1-32bit-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677613" comment="libfdisk1-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677614" comment="libmount1-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677615" comment="libmount1-32bit-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677616" comment="libsmartcols1-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677617" comment="libuuid1-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677618" comment="libuuid1-32bit-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677619" comment="python-libmount-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677620" comment="util-linux-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677621" comment="util-linux-lang-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677622" comment="util-linux-systemd-2.28-44.35.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677623" comment="uuidd-2.28-44.35.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3781" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H36LVLBVTFLQTYOKRPFVWGCDCWJQWKLY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64NXCVRRUDYD4U65CYH2ROCOGMSYF3U/" source="SUSE-SU"/>
    <description>
    A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781</cve>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191712">SUSE bug 1191712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009632780" comment="ghostscript-9.52-23.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632781" comment="ghostscript-devel-9.52-23.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632782" comment="ghostscript-x11-9.52-23.42.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632783" comment="libspectre-devel-0.2.7-12.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632784" comment="libspectre1-0.2.7-12.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009333.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2689-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XORUFH2I27QQWZXGSRUKWLXW5NX5KLXA/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/archive/suse-security-announce/2007-Jun/0001.html" source="SUSE-SU"/>
    <description>
    GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189486">SUSE bug 1189486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192364">SUSE bug 1192364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193391">SUSE bug 1193391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009631542" comment="cpio-2.11-36.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631541" comment="cpio-lang-2.11-36.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38492" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 92, Thunderbird &lt; 91.1, Thunderbird &lt; 78.14, Firefox ESR &lt; 78.14, and Firefox ESR &lt; 91.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38495" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 91.1 and Firefox ESR &lt; 91.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682635" comment="MozillaFirefox-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633611" comment="MozillaFirefox-branding-SLE-91-35.6.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682636" comment="MozillaFirefox-devel-91.9.0-112.104.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682637" comment="MozillaFirefox-translations-common-91.9.0-112.104.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.15, Thunderbird &lt; 91.2, Firefox ESR &lt; 91.2, Firefox ESR &lt; 78.15, and Firefox &lt; 93.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38497" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38498" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.15, Thunderbird &lt; 91.2, Firefox ESR &lt; 91.2, Firefox ESR &lt; 78.15, and Firefox &lt; 93.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38501" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1367-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PT6Q6PTCHFH4I5YOWCIRD4QLX24AR73I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INI43FXSUMMTXNS6C5B5BMMQ7XCYCZAV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOOPOXVWYJPXPZIC3SK7MZFMWSQEQNPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651862" comment="MozillaFirefox-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651863" comment="MozillaFirefox-devel-91.2.0-112.74.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651864" comment="MozillaFirefox-translations-common-91.2.0-112.74.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38505" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38510" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HANTLKSTN557DZ2MTOXFS2TQFKRJMZNC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 94, Thunderbird &lt; 91.3, and Firefox ESR &lt; 91.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510</cve>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655637" comment="MozillaFirefox-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655638" comment="MozillaFirefox-devel-91.3.0-112.80.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655639" comment="MozillaFirefox-translations-common-91.3.0-112.80.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38598</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38598" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38598" ref_url="https://www.suse.com/security/cve/CVE-2021-38598" source="SUSE CVE"/>
    <description>
    OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38598/">CVE-2021-38598</cve>
	<bugzilla href="https://bugzilla.suse.com/1189615">SUSE bug 1189615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334446" comment="openstack-neutron is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631842" comment="openstack-neutron-doc is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3896" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39240</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39240" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39240" ref_url="https://www.suse.com/security/cve/CVE-2021-39240" source="SUSE CVE"/>
    <description>
    An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It does not ensure that the scheme and path portions of a URI have the expected characters. For example, the authority field (as observed on a target HTTP/2 server) might differ from what the routing rules were intended to achieve.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39240/">CVE-2021-39240</cve>
	<bugzilla href="https://bugzilla.suse.com/1189549">SUSE bug 1189549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39241</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39241" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39241" ref_url="https://www.suse.com/security/cve/CVE-2021-39241" source="SUSE CVE"/>
    <description>
    An issue was discovered in HAProxy 2.0 before 2.0.24, 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. An HTTP method name may contain a space followed by the name of a protected resource. It is possible that a server would interpret this as a request for that protected resource, such as in the "GET /admin? HTTP/1.1 /static/images HTTP/1.1" example.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39241/">CVE-2021-39241</cve>
	<bugzilla href="https://bugzilla.suse.com/1189366">SUSE bug 1189366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39242</title>
    <affected family="unix">
            <platform>SUSE OpenStack Cloud 7</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39242" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39242" ref_url="https://www.suse.com/security/cve/CVE-2021-39242" source="SUSE CVE"/>
    <description>
    An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead to a situation with an attacker-controlled HTTP Host header, because a mismatch between Host and authority is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-39242/">CVE-2021-39242</cve>
	<bugzilla href="https://bugzilla.suse.com/1189548">SUSE bug 1189548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-openstack-cloud:7</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009154488" comment="SUSE OpenStack Cloud 7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333980" comment="haproxy is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
    <description>
    ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633904" comment="apache2-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633905" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633906" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633907" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633908" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39648" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39657" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUNMTSOEM6LU65NFICFVIHBARFG7LVO7/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196024">SUSE bug 1196024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196389">SUSE bug 1196389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009673031" comment="glibc-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673010" comment="glibc-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673032" comment="glibc-devel-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673012" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673033" comment="glibc-locale-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673017" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673034" comment="glibc-profile-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673019" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673035" comment="nscd-2.22-119.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192973">SUSE bug 1192973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UNP5L7TX3N3YWCIHNMKXPR4ENMV7RHI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4070-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDLLTDD27WXQ6WFOOCQT3PBFXVFGSQA5/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194308">SUSE bug 1194308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196656">SUSE bug 1196656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659889" comment="xorg-x11-server-7.6_1.18.3-76.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659890" comment="xorg-x11-server-extra-7.6_1.18.3-76.43.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010237.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT7VTD4IRUBMN3UEKSRY3O2T37GG2HLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZYVYA6ZP6W2WXZYY7EDCELC7CJ7FSVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3CAZLVDCJF5S7L74XKKD3UFRYGUKDJ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009660798" comment="xorg-x11-server-7.6_1.18.3-76.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009660799" comment="xorg-x11-server-extra-7.6_1.18.3-76.46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4136-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010237.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1606-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT7VTD4IRUBMN3UEKSRY3O2T37GG2HLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UZYVYA6ZP6W2WXZYY7EDCELC7CJ7FSVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4136-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3CAZLVDCJF5S7L74XKKD3UFRYGUKDJ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196656">SUSE bug 1196656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009660798" comment="xorg-x11-server-7.6_1.18.3-76.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009660799" comment="xorg-x11-server-extra-7.6_1.18.3-76.46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010075.html" source="SUSE-SU"/>
		<reference ref_id="TID000020564" ref_url="https://www.suse.com/support/kb/doc/?id=000020564" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGEROI6PUOTOXKFIH2MPKUQ3PI6VWLXQ/" source="SUSE-SU"/>
    <description>
    A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034</cve>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195125">SUSE bug 1195125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195136">SUSE bug 1195136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195246">SUSE bug 1195246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195265">SUSE bug 1195265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195278">SUSE bug 1195278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195528">SUSE bug 1195528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195541">SUSE bug 1195541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196165">SUSE bug 1196165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196388">SUSE bug 1196388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664690" comment="libpolkit0-0.113-5.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664691" comment="polkit-0.113-5.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664692" comment="typelib-1_0-Polkit-1_0-0.113-5.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4TEWXB67RJ5IPKHZI6FBQ67CJEHGI3B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKKOECDBM5767TKS4AX32R26YLJDYTJT/" source="SUSE-SU"/>
    <description>
    A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438</cve>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009633904" comment="apache2-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633898" comment="apache2-doc-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633905" comment="apache2-example-pages-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633906" comment="apache2-prefork-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633907" comment="apache2-utils-2.4.23-29.80.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633908" comment="apache2-worker-2.4.23-29.80.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192775">SUSE bug 1192775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41035" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GEO4VASAXOQQYTQGGNCUBC3ZY3RFQT4/" source="SUSE-SU"/>
    <description>
    In Eclipse Openj9 before version 0.29.0, the JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662499" comment="java-1_7_1-ibm-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662487" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662500" comment="java-1_7_1-ibm-devel-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662501" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662490" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.0-38.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662502" comment="java-1_8_0-ibm-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662492" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662503" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-30.84.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662494" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-30.84.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1612-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHZ7COSTMBF33SO76DMFLY7V62XQUQLS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1631-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BQ3YNECTWF6XMIQDZ7C5QEDQ3QPQT4W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTBP7J2BY2P4Y4VVPTAERSBRBHRHKIDZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U355AEBE4AWYTPUPBMC3XAO6XBTWFRBL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LX6N6XLYOR6GINGSRITWVKJ743FCLHXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PH3Q2TLVW235XFTNU2563GON62BFYPLP/" source="SUSE-SU"/>
    <description>
    JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193978">SUSE bug 1193978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194016">SUSE bug 1194016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009660148" comment="log4j-1.2.15-126.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4155" ref_url="https://www.suse.com/security/cve/CVE-2021-4155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4155/">CVE-2021-4155</cve>
	<bugzilla href="https://bugzilla.suse.com/1194272">SUSE bug 1194272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4156" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0052-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DAZJOOODJLFD53X2AQIEWTT3MS53WDSD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0052-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VSQMEWJEKHHULWEYG5BILMQK5GWMYZOS/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in libsndfile's FLAC codec functionality. An attacker who is able to submit a specially crafted file (via tricking a user to open or otherwise) to an application linked with libsndfile and using the FLAC codec, could trigger an out-of-bounds read that would most likely cause a crash but could potentially leak memory information that could be used in further exploitation of other flaws.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662498" comment="libsndfile1-1.0.25-36.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662485" comment="libsndfile1-32bit-1.0.25-36.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BEK24NI33V77MMNQQN72LO2RGAF23X76/" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193460">SUSE bug 1193460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193497">SUSE bug 1193497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196721">SUSE bug 1196721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009658348" comment="openssh-7.2p2-74.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658349" comment="openssh-askpass-gnome-7.2p2-74.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658350" comment="openssh-fips-7.2p2-74.60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658351" comment="openssh-helpers-7.2p2-74.60.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41991" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EFL7BNFHRF7ZQZFGAWEPQ7ZQHD6T6CNA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3467-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTT66WWQ6OSMGWC35UZKJSSHCUIWURT/" source="SUSE-SU"/>
    <description>
    The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<bugzilla href="https://bugzilla.suse.com/1191367">SUSE bug 1191367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192640">SUSE bug 1192640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009652805" comment="strongswan-5.1.3-26.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652801" comment="strongswan-doc-5.1.3-26.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652806" comment="strongswan-hmac-5.1.3-26.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652807" comment="strongswan-ipsec-5.1.3-26.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652808" comment="strongswan-libs0-5.1.3-26.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191660">SUSE bug 1191660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQY7XF64DFNLXMA2OH345AZSHGVVPWBR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAIZQAAKIJLME5Z3MKND2JGJ5CQPRYZD/" source="SUSE-SU"/>
    <description>
    BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762</cve>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657339" comment="libjavascriptcoregtk-4_0-18-2.32.4-2.74.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657340" comment="libwebkit2gtk-4_0-37-2.32.4-2.74.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657332" comment="libwebkit2gtk3-lang-2.32.4-2.74.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657341" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-2.74.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657342" comment="typelib-1_0-WebKit2-4_0-2.32.4-2.74.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657343" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-2.74.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657344" comment="webkit2gtk-4_0-injected-bundles-2.32.4-2.74.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657345" comment="webkit2gtk3-devel-2.32.4-2.74.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42779" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010682.html" source="SUSE-SU"/>
    <description>
    A heap use after free issue was found in Opensc before version 0.22.0 in sc_file_valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779</cve>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653628" comment="opensc-0.13.0-3.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42780" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010682.html" source="SUSE-SU"/>
    <description>
    A use after return issue was found in Opensc before version 0.22.0 in insert_pin function that could potentially crash programs using the library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780</cve>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196716">SUSE bug 1196716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653628" comment="opensc-0.13.0-3.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42781" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010682.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow issues were found in Opensc before version 0.22.0 in pkcs15-oberthur.c that could potentially crash programs using the library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781</cve>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192635">SUSE bug 1192635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653628" comment="opensc-0.13.0-3.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42782" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010682.html" source="SUSE-SU"/>
    <description>
    Stack buffer overflow issues were found in Opensc before version 0.22.0 in various places that could potentially crash programs using the library.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782</cve>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192635">SUSE bug 1192635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192643">SUSE bug 1192643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192786">SUSE bug 1192786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193388">SUSE bug 1193388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653628" comment="opensc-0.13.0-3.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009657863" comment="kernel-default-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657864" comment="kernel-default-base-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657865" comment="kernel-default-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657866" comment="kernel-devel-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657867" comment="kernel-macros-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657868" comment="kernel-source-4.4.121-92.161.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009657869" comment="kernel-syms-4.4.121-92.161.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZRKUBO5D2JZTQ5VCQBSEGXEMFC4D5FB/" source="SUSE-SU"/>
    <description>
    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS &lt; 3.73 and NSS &lt; 3.68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193331">SUSE bug 1193331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193378">SUSE bug 1193378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199301">SUSE bug 1199301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659103" comment="libfreebl3-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659086" comment="libfreebl3-32bit-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659104" comment="libfreebl3-hmac-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659088" comment="libfreebl3-hmac-32bit-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659105" comment="libsoftokn3-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659090" comment="libsoftokn3-32bit-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659106" comment="libsoftokn3-hmac-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659092" comment="libsoftokn3-hmac-32bit-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659107" comment="mozilla-nss-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659094" comment="mozilla-nss-32bit-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659108" comment="mozilla-nss-certs-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659096" comment="mozilla-nss-certs-32bit-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659109" comment="mozilla-nss-sysinit-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659099" comment="mozilla-nss-sysinit-32bit-3.68.1-58.57.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659110" comment="mozilla-nss-tools-3.68.1-58.57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/021069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLEQM2K3ZCTFEKZJ54PNOJLGV3BVHXBF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVVRA5LXBWWHGQPQLJYZRWPCG4E2L7WQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3993-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3G2TI2MHN6NYMUDWREZ5V2SGZW63DZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQOGFW6JISWI3PQR7AHD3OEX3SPELMFB/" source="SUSE-SU"/>
    <description>
    It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird &lt; 91.4.0, Firefox ESR &lt; 91.4.0, and Firefox &lt; 95.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659444" comment="MozillaFirefox-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659445" comment="MozillaFirefox-devel-91.4.0-112.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659446" comment="MozillaFirefox-translations-common-91.4.0-112.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
		<reference ref_id="TID000020570" ref_url="https://www.suse.com/support/kb/doc/?id=000020570" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0284-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7LELM65YZ36YQVKZDECL77ZYNXAWR6D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0287-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RB554CLNYEUAEMABV3LV3T5P4BYDLS7H/" source="SUSE-SU"/>
    <description>
    The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195611">SUSE bug 1195611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196455">SUSE bug 1196455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666238" comment="libdcerpc-binding0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666239" comment="libdcerpc-binding0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666240" comment="libdcerpc0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666241" comment="libdcerpc0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666242" comment="libndr-krb5pac0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666243" comment="libndr-krb5pac0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666244" comment="libndr-nbt0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666245" comment="libndr-nbt0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666246" comment="libndr-standard0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666247" comment="libndr-standard0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666248" comment="libndr0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666249" comment="libndr0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666250" comment="libnetapi0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666251" comment="libnetapi0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666252" comment="libsamba-credentials0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666253" comment="libsamba-credentials0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666254" comment="libsamba-errors0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666255" comment="libsamba-errors0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666256" comment="libsamba-hostconfig0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666257" comment="libsamba-hostconfig0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666258" comment="libsamba-passdb0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666259" comment="libsamba-passdb0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666260" comment="libsamba-util0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666261" comment="libsamba-util0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666262" comment="libsamdb0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666263" comment="libsamdb0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666264" comment="libsmbclient0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666265" comment="libsmbclient0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666266" comment="libsmbconf0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666267" comment="libsmbconf0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666268" comment="libsmbldap0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666269" comment="libsmbldap0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666270" comment="libtevent-util0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666271" comment="libtevent-util0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666272" comment="libwbclient0-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666273" comment="libwbclient0-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666274" comment="samba-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666275" comment="samba-client-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666276" comment="samba-client-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666277" comment="samba-doc-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666278" comment="samba-libs-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666279" comment="samba-libs-32bit-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666280" comment="samba-winbind-4.4.2-38.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666281" comment="samba-winbind-32bit-4.4.2-38.48.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44224" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0091-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQX4BVMFKUTV6DOPDTL26H5DQJJFUPXZ/" source="SUSE-SU"/>
    <description>
    A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224</cve>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663078" comment="apache2-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663071" comment="apache2-doc-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663079" comment="apache2-example-pages-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663080" comment="apache2-prefork-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663081" comment="apache2-utils-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663082" comment="apache2-worker-2.4.23-29.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0091-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQX4BVMFKUTV6DOPDTL26H5DQJJFUPXZ/" source="SUSE-SU"/>
    <description>
    A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790</cve>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663078" comment="apache2-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663071" comment="apache2-doc-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663079" comment="apache2-example-pages-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663080" comment="apache2-prefork-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663081" comment="apache2-utils-2.4.23-29.83.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663082" comment="apache2-worker-2.4.23-29.83.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45079" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010262.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0492-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDDGV75VWTCAFSBICC2NAFQ3EN5G6NAI/" source="SUSE-SU"/>
    <description>
    In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664933" comment="strongswan-5.1.3-26.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664929" comment="strongswan-doc-5.1.3-26.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664934" comment="strongswan-hmac-5.1.3-26.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664935" comment="strongswan-ipsec-5.1.3-26.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664936" comment="strongswan-libs0-5.1.3-26.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0150-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0150-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEHXIWSI3LT73BE7YAXGYKT4HEXYVR3X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0150-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IYI5YPQZJPKLABADGETPRMD6KTGPUFAZ/" source="SUSE-SU"/>
    <description>
    AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196390">SUSE bug 1196390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664239" comment="aide-0.16-20.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45444" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0735-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYQO6XCA5HFPKOF2ANXLGSZGFT63LHPA/" source="SUSE-SU"/>
    <description>
    In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444</cve>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199097">SUSE bug 1199097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670824" comment="zsh-5.0.5-6.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    In WebKitGTK before 2.32.4, there is incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application crash, a different vulnerability than CVE-2021-30889.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481</cve>
	<bugzilla href="https://bugzilla.suse.com/1194138">SUSE bug 1194138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::ContainerNode::firstChild, a different vulnerability than CVE-2021-30889.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482</cve>
	<bugzilla href="https://bugzilla.suse.com/1194136">SUSE bug 1194136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483</cve>
	<bugzilla href="https://bugzilla.suse.com/1194135">SUSE bug 1194135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
    <description>
    In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45486" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45868" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196387">SUSE bug 1196387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="TID000020607" ref_url="https://www.suse.com/support/kb/doc/?id=000020607" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXODJTCX5G5LLTBOEFVBOCIWYKEGYAMP/" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671786" comment="kernel-default-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671787" comment="kernel-default-base-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671788" comment="kernel-default-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671789" comment="kernel-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671790" comment="kernel-macros-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671791" comment="kernel-source-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671792" comment="kernel-syms-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="TID000020607" ref_url="https://www.suse.com/support/kb/doc/?id=000020607" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXODJTCX5G5LLTBOEFVBOCIWYKEGYAMP/" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671786" comment="kernel-default-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671787" comment="kernel-default-base-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671788" comment="kernel-default-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671789" comment="kernel-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671790" comment="kernel-macros-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671791" comment="kernel-source-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671792" comment="kernel-syms-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0135" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010243.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EQXVEUIFIMFD6G5N2JBQ2A6XUYVZBCSY/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135</cve>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196396">SUSE bug 1196396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667335" comment="libvirglrenderer0-0.5.0-12.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010991.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195950">SUSE bug 1195950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666910" comment="kernel-default-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666911" comment="kernel-default-base-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666912" comment="kernel-default-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666913" comment="kernel-devel-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666914" comment="kernel-macros-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666915" comment="kernel-source-4.4.121-92.164.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666916" comment="kernel-syms-4.4.121-92.164.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198615">SUSE bug 1198615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199615">SUSE bug 1199615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671786" comment="kernel-default-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671787" comment="kernel-default-base-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671788" comment="kernel-default-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671789" comment="kernel-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671790" comment="kernel-macros-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671791" comment="kernel-source-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671792" comment="kernel-syms-4.4.121-92.169.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010663.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2QBY77RLVCXQT27JK26OJ53P6OZQP34S/" source="SUSE-SU"/>
    <description>
    OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199103">SUSE bug 1199103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009676877" comment="openvpn-2.3.8-16.29.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009676878" comment="openvpn-auth-pam-plugin-2.3.8-16.29.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671786" comment="kernel-default-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671787" comment="kernel-default-base-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671788" comment="kernel-default-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671789" comment="kernel-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671790" comment="kernel-macros-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671791" comment="kernel-source-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671792" comment="kernel-syms-4.4.121-92.169.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7FRPEEZ7WUHWJ2PK7C5GZJJTXRGWJB2/" source="SUSE-SU"/>
    <description>
    The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197328">SUSE bug 1197328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197340">SUSE bug 1197340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199100">SUSE bug 1199100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199254">SUSE bug 1199254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199303">SUSE bug 1199303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199339">SUSE bug 1199339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009673055" comment="libopenssl-devel-1.0.2j-60.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673056" comment="libopenssl1_0_0-1.0.2j-60.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673023" comment="libopenssl1_0_0-32bit-1.0.2j-60.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673057" comment="libopenssl1_0_0-hmac-1.0.2j-60.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673025" comment="libopenssl1_0_0-hmac-32bit-1.0.2j-60.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673058" comment="openssl-1.0.2j-60.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673027" comment="openssl-doc-1.0.2j-60.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010787.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679550" comment="dnsmasq-2.78-18.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010913.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel’s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678285" comment="libfreebl3-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678251" comment="libfreebl3-32bit-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678286" comment="libfreebl3-hmac-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678253" comment="libfreebl3-hmac-32bit-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678287" comment="libsoftokn3-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678255" comment="libsoftokn3-32bit-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678288" comment="libsoftokn3-hmac-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678257" comment="libsoftokn3-hmac-32bit-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678289" comment="mozilla-nss-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678259" comment="mozilla-nss-32bit-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678290" comment="mozilla-nss-certs-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678261" comment="mozilla-nss-certs-32bit-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678291" comment="mozilla-nss-sysinit-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678264" comment="mozilla-nss-sysinit-32bit-3.68.3-58.69.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678292" comment="mozilla-nss-tools-3.68.3-58.69.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122</cve>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009677943" comment="libopenjp2-7-2.1.0-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010979.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198812">SUSE bug 1198812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199107">SUSE bug 1199107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199108">SUSE bug 1199108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682638" comment="gzip-1.6-9.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679302" comment="liblzma5-5.0.5-6.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679278" comment="liblzma5-32bit-5.0.5-6.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679303" comment="xz-5.0.5-6.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679280" comment="xz-lang-5.0.5-6.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011061.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304</cve>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682319" comment="e2fsprogs-1.42.11-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682320" comment="libcom_err2-1.42.11-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682310" comment="libcom_err2-32bit-1.42.11-16.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682321" comment="libext2fs2-1.42.11-16.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010086.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0493-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WCT6DXOWMADGOBQLVFVTQMZKCFCV2BAQ/" source="SUSE-SU"/>
    <description>
    A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664693" comment="clamav-0.103.5-33.44.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011092.html" source="SUSE-SU"/>
    <description>
    Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151</cve>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009683677" comment="ucode-intel-20220510-13.97.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21271" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271</cve>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21349" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 7u321, 8u311; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IS5FMKDHHRO4IBOMDW2TOCFQJ7BOXCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321, 8u311, 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672567" comment="java-1_8_0-openjdk-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672568" comment="java-1_8_0-openjdk-demo-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672569" comment="java-1_8_0-openjdk-devel-1.8.0.322-27.72.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672570" comment="java-1_8_0-openjdk-headless-1.8.0.322-27.72.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6OQKLWM3DMDDCKHLY4KFE6NXSK5MSXV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K2HM7MZLDNJ2W6HOMDMSHAZDFGLK43HO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1027-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EH4HQJU5VK7ZC3BHZTQT6QUXNTGNXVQ/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 11.0.13, 17.01; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009674029" comment="java-1_7_1-ibm-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674007" comment="java-1_7_1-ibm-alsa-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674030" comment="java-1_7_1-ibm-devel-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674031" comment="java-1_7_1-ibm-jdbc-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674010" comment="java-1_7_1-ibm-plugin-1.7.1_sr5.5-38.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674027" comment="java-1_8_0-ibm-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674003" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674028" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-30.87.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009674005" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-30.87.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing a maliciously crafted mail message may lead to running arbitrary javascript.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589</cve>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590</cve>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592</cve>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669696" comment="libjavascriptcoregtk-4_0-18-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669697" comment="libwebkit2gtk-4_0-37-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669688" comment="libwebkit2gtk3-lang-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669698" comment="typelib-1_0-JavaScriptCore-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669699" comment="typelib-1_0-WebKit2-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669700" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669701" comment="webkit2gtk-4_0-injected-bundles-2.34.5-2.85.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669702" comment="webkit2gtk3-devel-2.34.5-2.85.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
    <description>
    A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681320" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681322" comment="webkit2gtk3-devel-2.36.0-2.96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620</cve>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009670816" comment="libjavascriptcoregtk-4_0-18-2.34.6-2.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670817" comment="libwebkit2gtk-4_0-37-2.34.6-2.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670802" comment="libwebkit2gtk3-lang-2.34.6-2.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670818" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-2.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670819" comment="typelib-1_0-WebKit2-4_0-2.34.6-2.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670820" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-2.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670821" comment="webkit2gtk-4_0-injected-bundles-2.34.6-2.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009670822" comment="webkit2gtk3-devel-2.34.6-2.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624</cve>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199111">SUSE bug 1199111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681320" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681322" comment="webkit2gtk3-devel-2.36.0-2.96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628</cve>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681320" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681322" comment="webkit2gtk3-devel-2.36.0-2.96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629</cve>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681320" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681322" comment="webkit2gtk3-devel-2.36.0-2.96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637</cve>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009681316" comment="libjavascriptcoregtk-4_0-18-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681317" comment="libwebkit2gtk-4_0-37-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681309" comment="libwebkit2gtk3-lang-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681318" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681319" comment="typelib-1_0-WebKit2-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681320" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681321" comment="webkit2gtk-4_0-injected-bundles-2.36.0-2.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681322" comment="webkit2gtk3-devel-2.36.0-2.96.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/" source="SUSE-SU"/>
    <description>
    A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719</cve>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198430">SUSE bug 1198430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009673758" comment="apache2-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673759" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673760" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673761" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673762" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/" source="SUSE-SU"/>
    <description>
    Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198430">SUSE bug 1198430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198998">SUSE bug 1198998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199102">SUSE bug 1199102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199495">SUSE bug 1199495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009673758" comment="apache2-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673759" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673760" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673761" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673762" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/" source="SUSE-SU"/>
    <description>
    If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198430">SUSE bug 1198430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009673758" comment="apache2-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673759" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673760" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673761" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673762" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22746" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LO2K2OYJXIHKCXT4ZI6S7RGIOS27RIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJHDOBPPHGJWIXDJDMLZUCHBBMTQIEIO/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009663799" comment="MozillaFirefox-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663800" comment="MozillaFirefox-devel-91.5.0-112.86.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663801" comment="MozillaFirefox-translations-common-91.5.0-112.86.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22753" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010301.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GSM3MOVKIHQAE33NLCNX7MUULCOLEADF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:40696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GLKBY66GKNX6KTZGJNPYOI7GCDSXWVYU/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009668887" comment="MozillaFirefox-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668888" comment="MozillaFirefox-devel-91.6.0-112.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668889" comment="MozillaFirefox-translations-common-91.6.0-112.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664107" comment="expat-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664108" comment="libexpat1-2.1.0-21.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664105" comment="libexpat1-32bit-2.1.0-21.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844</cve>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666234" comment="libtiff5-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666205" comment="libtiff5-32bit-4.0.9-44.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666235" comment="tiff-4.0.9-44.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIM2A32O55DKEA5CCA7L5EE2KL4DYQJF/" source="SUSE-SU"/>
    <description>
    A PV guest could DoS Xen while unmapping a grant To address XSA-380, reference counting was introduced for grant mappings for the case where a PV guest would have the IOMMU enabled. PV guests can request two forms of mappings. When both are in use for any individual mapping, unmapping of such a mapping can be requested in two steps. The reference count for such a mapping would then mistakenly be decremented twice. Underflow of the counters gets detected, resulting in the triggering of a hypervisor bug check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666228" comment="xen-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666229" comment="xen-doc-html-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666230" comment="xen-libs-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666231" comment="xen-libs-32bit-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666232" comment="xen-tools-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666233" comment="xen-tools-domU-4.7.6_20-43.85.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIM2A32O55DKEA5CCA7L5EE2KL4DYQJF/" source="SUSE-SU"/>
    <description>
    Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666228" comment="xen-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666229" comment="xen-doc-html-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666230" comment="xen-libs-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666231" comment="xen-libs-32bit-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666232" comment="xen-tools-4.7.6_20-43.85.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666233" comment="xen-tools-domU-4.7.6_20-43.85.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUNMTSOEM6LU65NFICFVIHBARFG7LVO7/" source="SUSE-SU"/>
    <description>
    The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009673031" comment="glibc-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673010" comment="glibc-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673032" comment="glibc-devel-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673012" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673033" comment="glibc-locale-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673017" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673034" comment="glibc-profile-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673019" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673035" comment="nscd-2.22-119.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUNMTSOEM6LU65NFICFVIHBARFG7LVO7/" source="SUSE-SU"/>
    <description>
    The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009673031" comment="glibc-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673010" comment="glibc-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673032" comment="glibc-devel-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673012" comment="glibc-devel-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673013" comment="glibc-html-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673014" comment="glibc-i18ndata-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673015" comment="glibc-info-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673033" comment="glibc-locale-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673017" comment="glibc-locale-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673034" comment="glibc-profile-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673019" comment="glibc-profile-32bit-2.22-119.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673035" comment="nscd-2.22-119.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23302" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LX6N6XLYOR6GINGSRITWVKJ743FCLHXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PH3Q2TLVW235XFTNU2563GON62BFYPLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4IIJDMYKSUHPR6X6ARBPWWQRNNXT4HI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/543MEJC5CUZO2UZUL4R43HGV5KUNNJ4U/" source="SUSE-SU"/>
    <description>
    JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LX6N6XLYOR6GINGSRITWVKJ743FCLHXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PH3Q2TLVW235XFTNU2563GON62BFYPLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4IIJDMYKSUHPR6X6ARBPWWQRNNXT4HI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/543MEJC5CUZO2UZUL4R43HGV5KUNNJ4U/" source="SUSE-SU"/>
    <description>
    By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196392">SUSE bug 1196392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23307" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0038-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LX6N6XLYOR6GINGSRITWVKJ743FCLHXK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PH3Q2TLVW235XFTNU2563GON62BFYPLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4IIJDMYKSUHPR6X6ARBPWWQRNNXT4HI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/543MEJC5CUZO2UZUL4R43HGV5KUNNJ4U/" source="SUSE-SU"/>
    <description>
    CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664687" comment="log4j-1.2.15-126.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0802-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGCK33AJ4DGXLWFFRJOHKOZBZ7OBQCE4/" source="SUSE-SU"/>
    <description>
    valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199098">SUSE bug 1199098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680015" comment="libxml2-2-2.9.4-46.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679983" comment="libxml2-2-32bit-2.9.4-46.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679984" comment="libxml2-doc-2.9.4-46.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680016" comment="libxml2-tools-2.9.4-46.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680017" comment="python-libxml2-2.9.4-46.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23437" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010256.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGEARHFYVIAKL4GTM5XYZEDPPE7QH6IR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U7E32672AADOJILNWAAKOTVLBYTBDBKD/" source="SUSE-SU"/>
    <description>
    There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196394">SUSE bug 1196394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009667934" comment="xerces-j2-2.8.1-268.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667935" comment="xerces-j2-xml-apis-2.8.1-268.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667936" comment="xerces-j2-xml-resolver-2.8.1-268.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010199.html" source="SUSE-SU"/>
		<reference ref_id="TID000020633" ref_url="https://www.suse.com/support/kb/doc/?id=000020633" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0498-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2BCJZG2PLWMYBP7YS7O3T6NSE3AKSEBB/" source="SUSE-SU"/>
    <description>
    Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196480">SUSE bug 1196480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666236" comment="expat-2.1.0-21.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666237" comment="libexpat1-2.1.0-21.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666209" comment="libexpat1-32bit-2.1.0-21.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943</cve>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198430">SUSE bug 1198430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009673758" comment="apache2-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673736" comment="apache2-doc-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673759" comment="apache2-example-pages-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673760" comment="apache2-prefork-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673761" comment="apache2-utils-2.4.23-29.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673762" comment="apache2-worker-2.4.23-29.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010199.html" source="SUSE-SU"/>
		<reference ref_id="TID000020633" ref_url="https://www.suse.com/support/kb/doc/?id=000020633" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0498-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2BCJZG2PLWMYBP7YS7O3T6NSE3AKSEBB/" source="SUSE-SU"/>
    <description>
    Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196480">SUSE bug 1196480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009666236" comment="expat-2.1.0-21.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666237" comment="libexpat1-2.1.0-21.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009666209" comment="libexpat1-32bit-2.1.0-21.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0743-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPABQLPWLWVSDVE54YNNZUHMKWEV6F3X/" source="SUSE-SU"/>
    <description>
    In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198600">SUSE bug 1198600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199112">SUSE bug 1199112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199494">SUSE bug 1199494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669342" comment="cyrus-sasl-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669310" comment="cyrus-sasl-32bit-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669343" comment="cyrus-sasl-crammd5-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669312" comment="cyrus-sasl-crammd5-32bit-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669344" comment="cyrus-sasl-digestmd5-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669345" comment="cyrus-sasl-gssapi-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669315" comment="cyrus-sasl-gssapi-32bit-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669346" comment="cyrus-sasl-otp-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669317" comment="cyrus-sasl-otp-32bit-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669347" comment="cyrus-sasl-plain-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669319" comment="cyrus-sasl-plain-32bit-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669348" comment="libsasl2-3-2.1.26-8.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669321" comment="libsasl2-3-32bit-2.1.26-8.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671786" comment="kernel-default-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671787" comment="kernel-default-base-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671788" comment="kernel-default-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671789" comment="kernel-devel-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671790" comment="kernel-macros-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671791" comment="kernel-source-4.4.121-92.169.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671792" comment="kernel-syms-4.4.121-92.169.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
    <description>
    regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<bugzilla href="https://bugzilla.suse.com/1196972">SUSE bug 1196972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010904.html" source="SUSE-SU"/>
    <description>
    Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\Users` if the user profile is located in `C:\Users\my-user-name`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199109">SUSE bug 1199109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680006" comment="git-2.26.2-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680007" comment="git-core-2.26.2-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680008" comment="git-cvs-2.26.2-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680009" comment="git-daemon-2.26.2-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679999" comment="git-doc-2.26.2-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680010" comment="git-email-2.26.2-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680011" comment="git-gui-2.26.2-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680012" comment="git-svn-2.26.2-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680013" comment="git-web-2.26.2-27.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680014" comment="gitk-2.26.2-27.52.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198587">SUSE bug 1198587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669382" comment="expat-2.1.0-21.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669383" comment="libexpat1-2.1.0-21.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0844-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010614.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WAE6CSZY5X5K62OKNSD5W35BIQQRELP4/" source="SUSE-SU"/>
    <description>
    xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671277" comment="expat-2.1.0-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671278" comment="libexpat1-2.1.0-21.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671275" comment="libexpat1-32bit-2.1.0-21.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669382" comment="expat-2.1.0-21.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669383" comment="libexpat1-2.1.0-21.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198587">SUSE bug 1198587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199096">SUSE bug 1199096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669382" comment="expat-2.1.0-21.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669383" comment="libexpat1-2.1.0-21.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198587">SUSE bug 1198587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669382" comment="expat-2.1.0-21.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669383" comment="libexpat1-2.1.0-21.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669384" comment="libexpat1-32bit-2.1.0-21.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
    <description>
    Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356</cve>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
    <description>
    race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357</cve>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
    <description>
    IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
    <description>
    IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
    <description>
    IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
    <description>
    IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680614" comment="xen-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680615" comment="xen-doc-html-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680616" comment="xen-libs-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680617" comment="xen-libs-32bit-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680618" comment="xen-tools-4.7.6_22-43.88.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680619" comment="xen-tools-domU-4.7.6_22-43.88.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6422VZTPHB75VR6MKMLREZ5FDX6SVNHY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEEZYLQCKGYXDK76SYT5EY7XJEDGTHAW/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009672571" comment="MozillaFirefox-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672572" comment="MozillaFirefox-devel-91.7.0-112.95.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672573" comment="MozillaFirefox-translations-common-91.7.0-112.95.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0783-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZLR36GLK5UWW34Z6YUDXKWIHXMQEYSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2QKMX6IGL25P7OFW2JTNRZ4AD2EN4OAZ/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671783" comment="MozillaFirefox-91.6.1-112.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671784" comment="MozillaFirefox-devel-91.6.1-112.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671785" comment="MozillaFirefox-translations-common-91.6.1-112.92.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0783-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZLR36GLK5UWW34Z6YUDXKWIHXMQEYSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2QKMX6IGL25P7OFW2JTNRZ4AD2EN4OAZ/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671783" comment="MozillaFirefox-91.6.1-112.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671784" comment="MozillaFirefox-devel-91.6.1-112.92.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671785" comment="MozillaFirefox-translations-common-91.6.1-112.92.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679304" comment="kernel-default-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679305" comment="kernel-default-base-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679306" comment="kernel-default-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679307" comment="kernel-devel-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679308" comment="kernel-macros-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679309" comment="kernel-source-4.4.121-92.172.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679310" comment="kernel-syms-4.4.121-92.172.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27239" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010847.html" source="SUSE-SU"/>
    <description>
    In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681235" comment="cifs-utils-6.9-9.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27781" ref_url="https://www.suse.com/security/cve/CVE-2022-27781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011074.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27781/">CVE-2022-27781</cve>
	<bugzilla href="https://bugzilla.suse.com/1199223">SUSE bug 1199223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009684081" comment="curl-7.37.0-37.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684082" comment="libcurl4-7.37.0-37.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684074" comment="libcurl4-32bit-7.37.0-37.76.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011074.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782</cve>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009684081" comment="curl-7.37.0-37.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684082" comment="libcurl4-7.37.0-37.76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684074" comment="libcurl4-32bit-7.37.0-37.76.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009678497" comment="MozillaFirefox-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678498" comment="MozillaFirefox-devel-91.8.0-112.98.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678499" comment="MozillaFirefox-translations-common-91.8.0-112.98.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29155" ref_url="https://www.suse.com/security/cve/CVE-2022-29155" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011032.html" source="SUSE-SU"/>
    <description>
    In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29155/">CVE-2022-29155</cve>
	<bugzilla href="https://bugzilla.suse.com/1199240">SUSE bug 1199240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682642" comment="libldap-2_4-2-2.4.41-18.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682621" comment="libldap-2_4-2-32bit-2.4.41-18.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682643" comment="openldap2-2.4.41-18.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682644" comment="openldap2-back-meta-2.4.41-18.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682645" comment="openldap2-client-2.4.41-18.89.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682625" comment="openldap2-doc-2.4.41-18.89.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Server 12 SP2-BCL</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-05-20"/>
	<updated date="2022-05-20"/>
	<severity>Important</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-bcl:12:sp2</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128018" comment="SUSE Linux Enterprise Server 12 SP2-BCL is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009684083" comment="MozillaFirefox-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684084" comment="MozillaFirefox-devel-91.9.0-112.108.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684085" comment="MozillaFirefox-translations-common-91.9.0-112.108.4 is installed"/>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140703" version="1" comment="krb5 is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140704" version="1" comment="krb5-32bit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140705" version="1" comment="krb5-client is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140706" version="1" comment="krb5-doc is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140707" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140708" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140709" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140710" version="1" comment="krb5-server is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128018" version="1" comment="sles-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140679" version="1" comment="hplip is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140680" version="1" comment="hplip-hpijs is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140681" version="1" comment="hplip-sane is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141041" version="1" comment="mailx is &lt;12.5-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512004" version="1" comment="zoo is &lt;2.10-1020.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140508" version="1" comment="cron is &lt;4.2-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140509" version="1" comment="cronie is &lt;1.4.11-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140886" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141069" version="1" comment="perl-Tk is &lt;804.031-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140890" version="1" comment="libopenssl-devel is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140891" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140892" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140893" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140894" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140895" version="1" comment="openssl is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140896" version="1" comment="openssl-doc is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334003" version="1" comment="ghostscript is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140495" version="1" comment="coolkey is &lt;1.1.0-147.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334017" version="1" comment="kernel-default is ==0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333928" version="1" comment="kernel-source is ==0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131139" version="1" comment="libecpg6 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131140" version="1" comment="libpq5 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131141" version="1" comment="libpq5-32bit is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131142" version="1" comment="postgresql94 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131949" version="1" comment="postgresql94-contrib is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131950" version="1" comment="postgresql94-docs is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131951" version="1" comment="postgresql94-server is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131128" version="1" comment="libmysqlclient18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131129" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131132" version="1" comment="mariadb is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131133" version="1" comment="mariadb-client is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131134" version="1" comment="mariadb-errormessages is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131946" version="1" comment="mariadb-tools is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334331" version="1" comment="clamav is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334215" version="1" comment="openldap2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141087" version="1" comment="qemu is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141088" version="1" comment="qemu-arm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141089" version="1" comment="qemu-block-curl is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141090" version="1" comment="qemu-block-rbd is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141091" version="1" comment="qemu-block-ssh is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141092" version="1" comment="qemu-guest-agent is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141093" version="1" comment="qemu-ipxe is &lt;1.0.0-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141094" version="1" comment="qemu-kvm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141095" version="1" comment="qemu-lang is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141096" version="1" comment="qemu-ppc is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141097" version="1" comment="qemu-s390 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141098" version="1" comment="qemu-seabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141099" version="1" comment="qemu-sgabios is &lt;8-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141100" version="1" comment="qemu-tools is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141101" version="1" comment="qemu-vgabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141102" version="1" comment="qemu-x86 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140997" version="1" comment="libvorbis-doc is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140998" version="1" comment="libvorbis0 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140999" version="1" comment="libvorbis0-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141000" version="1" comment="libvorbisenc2 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141001" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141002" version="1" comment="libvorbisfile3 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141003" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549918" version="1" comment="openssh is &lt;7.2p2-74.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549919" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549920" version="1" comment="openssh-fips is &lt;7.2p2-74.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549921" version="1" comment="openssh-helpers is &lt;7.2p2-74.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115051" version="1" comment="vorbis-tools is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115052" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334134" version="1" comment="tomcat is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549160" version="1" comment="libjasper1 is &lt;1.900.14-181.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547174" version="1" comment="libjasper1-32bit is &lt;1.900.14-181.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141061" version="1" comment="pam_krb5 is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141062" version="1" comment="pam_krb5-32bit is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154488" version="1" comment="suse-openstack-cloud-release is ==7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141032" version="1" comment="libxml2-2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141033" version="1" comment="libxml2-2-32bit is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141034" version="1" comment="libxml2-doc is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141035" version="1" comment="libxml2-tools is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141083" version="1" comment="python-libxml2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140606" version="1" comment="glib2-lang is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140607" version="1" comment="glib2-tools is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140608" version="1" comment="libgio-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140609" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140610" version="1" comment="libglib-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140611" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140612" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140613" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140614" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140615" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140616" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140617" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114253" version="1" comment="gnutls is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114257" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114258" version="1" comment="libgnutls28 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114259" version="1" comment="libgnutls28-32bit is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140459" version="1" comment="apache2-mod_jk is &lt;1.2.40-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131144" version="1" comment="MozillaFirefox is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131145" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140453" version="1" comment="apache2 is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140454" version="1" comment="apache2-doc is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140455" version="1" comment="apache2-example-pages is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140456" version="1" comment="apache2-prefork is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140457" version="1" comment="apache2-utils is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140458" version="1" comment="apache2-worker is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140776" version="1" comment="libapr-util1 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140777" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140443" version="1" comment="alsa is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140444" version="1" comment="alsa-docs is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140445" version="1" comment="libasound2 is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140446" version="1" comment="libasound2-32bit is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333954" version="1" comment="libvirt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131101" version="1" comment="curl is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131102" version="1" comment="libcurl4 is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131103" version="1" comment="libcurl4-32bit is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128799" version="1" comment="ntp is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128800" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140510" version="1" comment="cups is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140511" version="1" comment="cups-client is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140512" version="1" comment="cups-libs is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140513" version="1" comment="cups-libs-32bit is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119271" version="1" comment="libsndfile1 is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119272" version="1" comment="libsndfile1-32bit is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140673" version="1" comment="gvim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140674" version="1" comment="vim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140675" version="1" comment="vim-data is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141044" version="1" comment="opensc is &lt;0.13.0-1.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140518" version="1" comment="cyrus-sasl is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140519" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140520" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140521" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140522" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140523" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140524" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140525" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140526" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140527" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140528" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140529" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140530" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140531" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140532" version="1" comment="libsasl2-3 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140533" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131135" version="1" comment="bind is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131947" version="1" comment="bind-chrootenv is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131948" version="1" comment="bind-doc is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131136" version="1" comment="bind-libs is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131137" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131138" version="1" comment="bind-utils is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140467" version="1" comment="avahi is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140468" version="1" comment="avahi-lang is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140469" version="1" comment="avahi-utils is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140470" version="1" comment="libavahi-client3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140471" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140472" version="1" comment="libavahi-common3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140473" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140474" version="1" comment="libavahi-core7 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140475" version="1" comment="libdns_sd is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140476" version="1" comment="libdns_sd-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119278" version="1" comment="strongswan is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119279" version="1" comment="strongswan-doc is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119300" version="1" comment="strongswan-hmac is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119280" version="1" comment="strongswan-ipsec is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119281" version="1" comment="strongswan-libs0 is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140713" version="1" comment="liblcms1 is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140714" version="1" comment="liblcms1-32bit is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140905" version="1" comment="libpoppler-glib8 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140906" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128640" version="1" comment="libpoppler44 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140907" version="1" comment="libpoppler60 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140908" version="1" comment="poppler-tools is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125268" version="1" comment="libqt4 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125269" version="1" comment="libqt4-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125270" version="1" comment="libqt4-qt3support is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125271" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125272" version="1" comment="libqt4-sql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125273" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125274" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125279" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125283" version="1" comment="libqt4-x11 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125284" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125290" version="1" comment="qt4-x11-tools is &lt;4.8.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140589" version="1" comment="ft2demos is &lt;2.6.3-7.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140587" version="1" comment="libfreetype6 is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140588" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131146" version="1" comment="wireshark is &lt;1.12.13-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141063" version="1" comment="pam_ssh is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141064" version="1" comment="pam_ssh-32bit is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333974" version="1" comment="gnutls is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140719" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140720" version="1" comment="openexr is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131022" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131023" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140488" version="1" comment="cifs-utils is &lt;6.5-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131768" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140794" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140795" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140796" version="1" comment="libdcerpc0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140797" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140798" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140799" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140800" version="1" comment="libndr-nbt0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140801" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140802" version="1" comment="libndr-standard0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140803" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140804" version="1" comment="libndr0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140805" version="1" comment="libndr0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140806" version="1" comment="libnetapi0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140807" version="1" comment="libnetapi0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140808" version="1" comment="libsamba-credentials0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140809" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140810" version="1" comment="libsamba-errors0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140811" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140812" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140813" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140814" version="1" comment="libsamba-passdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140815" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140816" version="1" comment="libsamba-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140817" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140818" version="1" comment="libsamdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140819" version="1" comment="libsamdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140820" version="1" comment="libsmbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140821" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140822" version="1" comment="libsmbconf0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140823" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140824" version="1" comment="libsmbldap0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140825" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140826" version="1" comment="libtevent-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140827" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140828" version="1" comment="libwbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140829" version="1" comment="libwbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140830" version="1" comment="samba is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140831" version="1" comment="samba-client is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140832" version="1" comment="samba-client-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140833" version="1" comment="samba-doc is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140834" version="1" comment="samba-libs is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140835" version="1" comment="samba-libs-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140836" version="1" comment="samba-winbind is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140837" version="1" comment="samba-winbind-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130039" version="1" comment="dhcp is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130040" version="1" comment="dhcp-client is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130042" version="1" comment="dhcp-relay is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130043" version="1" comment="dhcp-server is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131042" version="1" comment="libtiff5 is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131043" version="1" comment="libtiff5-32bit is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131044" version="1" comment="tiff is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140778" version="1" comment="libapr1 is &lt;1.5.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140887" version="1" comment="libneon27 is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140888" version="1" comment="libneon27-32bit is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140677" version="1" comment="gzip is &lt;1.6-7.392" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128464" version="1" comment="expat is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128465" version="1" comment="libexpat1 is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128466" version="1" comment="libexpat1-32bit is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140569" version="1" comment="fetchmail is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140570" version="1" comment="fetchmailconf is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141135" version="1" comment="systemtap is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141136" version="1" comment="systemtap-runtime is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141137" version="1" comment="systemtap-server is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110488" version="1" comment="fuse is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110491" version="1" comment="libfuse2 is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141067" version="1" comment="perl-HTML-Parser is &lt;3.71-1.178" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141128" version="1" comment="squidGuard is &lt;1.4-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141129" version="1" comment="squidGuard-doc is &lt;1.4-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140875" version="1" comment="libltdl7 is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140876" version="1" comment="libltdl7-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140877" version="1" comment="libtool is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140878" version="1" comment="libtool-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140548" version="1" comment="dstat is &lt;0.7.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140696" version="1" comment="kernel-default-base is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140697" version="1" comment="kernel-default-devel is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140698" version="1" comment="kernel-default-man is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140699" version="1" comment="kernel-devel is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140700" version="1" comment="kernel-macros is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140701" version="1" comment="kernel-source is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140702" version="1" comment="kernel-syms is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140966" version="1" comment="libthai-data is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140967" version="1" comment="libthai0 is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140968" version="1" comment="libthai0-32bit is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140465" version="1" comment="automake is &lt;1.13.4-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140466" version="1" comment="m4 is &lt;1.4.16-15.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141123" version="1" comment="ruby is &lt;2.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140618" version="1" comment="glibc is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140619" version="1" comment="glibc-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140620" version="1" comment="glibc-devel is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140621" version="1" comment="glibc-devel-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140622" version="1" comment="glibc-html is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140623" version="1" comment="glibc-i18ndata is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140624" version="1" comment="glibc-info is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140625" version="1" comment="glibc-locale is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140626" version="1" comment="glibc-locale-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140627" version="1" comment="glibc-profile is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140628" version="1" comment="glibc-profile-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140629" version="1" comment="nscd is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140645" version="1" comment="groff is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140646" version="1" comment="groff-full is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140647" version="1" comment="gxditview is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530595" version="1" comment="glibc is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530596" version="1" comment="glibc-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530597" version="1" comment="glibc-devel is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530598" version="1" comment="glibc-devel-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530599" version="1" comment="glibc-html is &lt;2.22-62.22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530600" version="1" comment="glibc-i18ndata is &lt;2.22-62.22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530601" version="1" comment="glibc-info is &lt;2.22-62.22.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530602" version="1" comment="glibc-locale is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530603" version="1" comment="glibc-locale-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530604" version="1" comment="glibc-profile is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530605" version="1" comment="glibc-profile-32bit is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530606" version="1" comment="nscd is &lt;2.22-62.22.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551189" version="1" comment="glibc is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551190" version="1" comment="glibc-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551191" version="1" comment="glibc-devel is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551192" version="1" comment="glibc-devel-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551193" version="1" comment="glibc-locale is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551194" version="1" comment="glibc-locale-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551195" version="1" comment="glibc-profile is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551196" version="1" comment="glibc-profile-32bit is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551197" version="1" comment="nscd is &lt;2.22-62.22.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595033" version="1" comment="glibc is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595034" version="1" comment="glibc-devel is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595035" version="1" comment="glibc-locale is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595036" version="1" comment="glibc-profile is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595037" version="1" comment="nscd is &lt;2.22-62.22.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132242" version="1" comment="sles-release is ==2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140483" version="1" comment="bzip2 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140484" version="1" comment="bzip2-doc is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140489" version="1" comment="clamav is &lt;0.99.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140485" version="1" comment="libbz2-1 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140486" version="1" comment="libbz2-1-32bit is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140900" version="1" comment="libpcsclite1 is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140901" version="1" comment="pcsc-lite is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102938" version="1" comment="cpio is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102939" version="1" comment="cpio-lang is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136443" version="1" comment="tar is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136445" version="1" comment="tar-lang is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140902" version="1" comment="libpolkit0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140903" version="1" comment="polkit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140904" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141130" version="1" comment="sudo is &lt;1.8.10p3-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140539" version="1" comment="dbus-1-glib is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140540" version="1" comment="dbus-1-glib-32bit is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119221" version="1" comment="libpng12-0 is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119222" version="1" comment="libpng12-0-32bit is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119233" version="1" comment="libpng15-15 is &lt;1.5.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119224" version="1" comment="libpng16-16 is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119225" version="1" comment="libpng16-16-32bit is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128392" version="1" comment="quagga is &lt;0.99.22.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141157" version="1" comment="w3m is &lt;0.5.3-157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141173" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141174" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140977" version="1" comment="libvirt is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140978" version="1" comment="libvirt-client is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140979" version="1" comment="libvirt-daemon is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140980" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140981" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140982" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140983" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140984" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140985" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140986" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140987" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140988" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140989" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140990" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140991" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140992" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140993" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140994" version="1" comment="libvirt-doc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140995" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140996" version="1" comment="libvirt-nss is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131037" version="1" comment="wget is &lt;1.14-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141042" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140686" version="1" comment="iputils is &lt;s20121221-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119616" version="1" comment="gpg2 is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119617" version="1" comment="gpg2-lang is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140557" version="1" comment="evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140558" version="1" comment="evince-browser-plugin is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140559" version="1" comment="evince-lang is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140560" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140561" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140562" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140563" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140564" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140565" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140566" version="1" comment="libevdocument3-4 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140567" version="1" comment="libevview3-3 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140568" version="1" comment="nautilus-evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131038" version="1" comment="perl is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131039" version="1" comment="perl-32bit is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131040" version="1" comment="perl-base is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131041" version="1" comment="perl-doc is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118765" version="1" comment="libmspack0 is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140932" version="1" comment="libsmi is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140933" version="1" comment="libsmi2 is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140717" version="1" comment="libHX28 is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140718" version="1" comment="libHX28-32bit is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129282" version="1" comment="libfreebl3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129283" version="1" comment="libfreebl3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129312" version="1" comment="libfreebl3-hmac is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129313" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129284" version="1" comment="libsoftokn3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129285" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129314" version="1" comment="libsoftokn3-hmac is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129315" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129288" version="1" comment="mozilla-nss is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129289" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129290" version="1" comment="mozilla-nss-certs is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129291" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129292" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129293" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129294" version="1" comment="mozilla-nss-tools is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141056" version="1" comment="pam is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141057" version="1" comment="pam-32bit is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141058" version="1" comment="pam-doc is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131123" version="1" comment="openslp is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131124" version="1" comment="openslp-32bit is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131940" version="1" comment="openslp-server is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140640" version="1" comment="gnome-shell is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140641" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140642" version="1" comment="gnome-shell-lang is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338823" version="1" comment="systemtap is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140848" version="1" comment="libipa_hbac0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140849" version="1" comment="libsss_idmap0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140850" version="1" comment="libsss_sudo is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140851" version="1" comment="python-sssd-config is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140852" version="1" comment="sssd is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140853" version="1" comment="sssd-32bit is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140854" version="1" comment="sssd-ad is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140855" version="1" comment="sssd-ipa is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140856" version="1" comment="sssd-krb5 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140857" version="1" comment="sssd-krb5-common is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140858" version="1" comment="sssd-ldap is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140859" version="1" comment="sssd-proxy is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140860" version="1" comment="sssd-tools is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140535" version="1" comment="dbus-1 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140536" version="1" comment="dbus-1-x11 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140537" version="1" comment="libdbus-1-3 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140538" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141065" version="1" comment="pcsc-ccid is &lt;1.4.14-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110205" version="1" comment="patch is &lt;2.7.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140897" version="1" comment="libpango-1_0-0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140898" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140899" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141037" version="1" comment="libzip2 is &lt;0.11.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140693" version="1" comment="kbd is &lt;1.15.5-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140437" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140438" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141169" version="1" comment="xorg-x11 is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141170" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141171" version="1" comment="xrdb is &lt;1.1.0-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140676" version="1" comment="libgypsy0 is &lt;0.9-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141040" version="1" comment="mailman is &lt;2.1.17-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141154" version="1" comment="vino is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141155" version="1" comment="vino-lang is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140792" version="1" comment="libcgroup-tools is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140793" version="1" comment="libcgroup1 is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141039" version="1" comment="logwatch is &lt;7.4.3-15.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141111" version="1" comment="rsync is &lt;3.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141038" version="1" comment="logrotate is &lt;3.8.7-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141151" version="1" comment="unixODBC is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141152" version="1" comment="unixODBC-32bit is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130996" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130997" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130999" version="1" comment="python-base is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131910" version="1" comment="python-base-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131003" version="1" comment="python-xml is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140711" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140712" version="1" comment="krb5-appl-servers is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140601" version="1" comment="gdm is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140602" version="1" comment="gdm-lang is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140603" version="1" comment="gdmflexiserver is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140604" version="1" comment="libgdm1 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140605" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140885" version="1" comment="libmodplug1 is &lt;0.8.8.4-13.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121566" version="1" comment="ecryptfs-utils is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121567" version="1" comment="ecryptfs-utils-32bit is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141159" version="1" comment="xen is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141160" version="1" comment="xen-doc-html is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141161" version="1" comment="xen-libs is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141162" version="1" comment="xen-libs-32bit is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141163" version="1" comment="xen-tools is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141164" version="1" comment="xen-tools-domU is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140842" version="1" comment="libgnomesu is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140843" version="1" comment="libgnomesu-lang is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140844" version="1" comment="libgnomesu0 is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140939" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140940" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140941" version="1" comment="libsoup-lang is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140942" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124820" version="1" comment="git-core is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141141" version="1" comment="tftp is &lt;5.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141138" version="1" comment="sysvinit-tools is &lt;2.88+-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141139" version="1" comment="whois is &lt;5.1.1-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141176" version="1" comment="yast2-core is &lt;3.1.23-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140591" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140592" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140593" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140594" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140595" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140596" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141054" version="1" comment="opie is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141055" version="1" comment="opie-32bit is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140845" version="1" comment="libgssglue1 is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140846" version="1" comment="libgssglue1-32bit is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140450" version="1" comment="apache-commons-daemon is &lt;1.0.15-4.221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140451" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-4.221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140752" version="1" comment="libXfont1 is &lt;1.5.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141172" version="1" comment="xorg-x11-libs is &lt;7.6-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140597" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140598" version="1" comment="librsvg-2-2 is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140599" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140600" version="1" comment="rsvg-view is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141059" version="1" comment="pam-modules is &lt;12.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141060" version="1" comment="pam-modules-32bit is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141175" version="1" comment="yast2 is &lt;3.1.206-37.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141112" version="1" comment="rsyslog is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141113" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141114" version="1" comment="rsyslog-doc is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141115" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141116" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141117" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141118" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141119" version="1" comment="rsyslog-module-relp is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141120" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141121" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140926" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140927" version="1" comment="python3-base is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130960" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131900" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131901" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130961" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141103" version="1" comment="radvd is &lt;1.9.7-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140678" version="1" comment="hardlink is &lt;1.0-6.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141132" version="1" comment="sysconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141133" version="1" comment="sysconfig-netconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140490" version="1" comment="colord-gtk-lang is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140491" version="1" comment="libcolord-gtk1 is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140492" version="1" comment="libcolord2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140493" version="1" comment="libcolord2-32bit is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140494" version="1" comment="libcolorhug2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141076" version="1" comment="python-cupshelpers is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141077" version="1" comment="system-config-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141078" version="1" comment="system-config-printer-common is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141079" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141080" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141081" version="1" comment="udev-configure-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594736" version="1" comment="memcached is &lt;1.4.39-3.3.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140549" version="1" comment="emacs is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140550" version="1" comment="emacs-el is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140551" version="1" comment="emacs-info is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140552" version="1" comment="emacs-nox is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140553" version="1" comment="emacs-x11 is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140554" version="1" comment="etags is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140928" version="1" comment="libraptor2-0 is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130985" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130987" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140461" version="1" comment="augeas is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140462" version="1" comment="augeas-lenses is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140463" version="1" comment="libaugeas0 is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140516" version="1" comment="cvs is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140517" version="1" comment="cvs-doc is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141167" version="1" comment="xinetd is &lt;2.3.15-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522652" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522653" version="1" comment="python3 is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522654" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522655" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531736" version="1" comment="python3-devel is &lt;3.4.10-25.39.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549064" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549065" version="1" comment="python3 is &lt;3.4.10-25.39.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549066" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549067" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549068" version="1" comment="python3-devel is &lt;3.4.10-25.39.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596194" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.39.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596195" version="1" comment="python3 is &lt;3.4.10-25.39.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596196" version="1" comment="python3-base is &lt;3.4.10-25.39.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596197" version="1" comment="python3-curses is &lt;3.4.10-25.39.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596198" version="1" comment="python3-devel is &lt;3.4.10-25.39.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333953" version="1" comment="krb5 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109959" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140954" version="1" comment="libsystemd0 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140955" version="1" comment="libsystemd0-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140956" version="1" comment="libudev1 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140957" version="1" comment="libudev1-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140958" version="1" comment="systemd is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140959" version="1" comment="systemd-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140960" version="1" comment="systemd-bash-completion is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140961" version="1" comment="systemd-sysvinit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140962" version="1" comment="udev is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103557" version="1" comment="file is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103559" version="1" comment="file-magic is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103561" version="1" comment="libmagic1 is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103560" version="1" comment="libmagic1-32bit is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140934" version="1" comment="libsnmp30 is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140935" version="1" comment="libsnmp30-32bit is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140936" version="1" comment="net-snmp is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140937" version="1" comment="perl-SNMP is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140938" version="1" comment="snmp-mibs is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141166" version="1" comment="xfsprogs is &lt;4.3.0-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140963" version="1" comment="libtag1 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140964" version="1" comment="libtag_c0 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140965" version="1" comment="taglib is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141066" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140682" version="1" comment="hyper-v is &lt;7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140590" version="1" comment="libgc1 is &lt;7.2d-3.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140439" version="1" comment="accountsservice is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140440" version="1" comment="accountsservice-lang is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140441" version="1" comment="libaccountsservice0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140442" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141004" version="1" comment="libvte9 is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141005" version="1" comment="python-vte is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141006" version="1" comment="vte2-lang is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140840" version="1" comment="libexif12 is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140841" version="1" comment="libexif12-32bit is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140972" version="1" comment="libupsclient1 is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140973" version="1" comment="nut is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140974" version="1" comment="nut-drivers-net is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140671" version="1" comment="gv is &lt;3.7.4-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140672" version="1" comment="wdiff is &lt;1.2.1-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141050" version="1" comment="openvswitch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141051" version="1" comment="openvswitch-dpdk is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141052" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141053" version="1" comment="openvswitch-switch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140630" version="1" comment="gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140631" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140632" version="1" comment="gnome-keyring-lang is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140633" version="1" comment="gnome-keyring-pam is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140634" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140635" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140576" version="1" comment="freeradius-server is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140577" version="1" comment="freeradius-server-doc is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140578" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140579" version="1" comment="freeradius-server-ldap is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140580" version="1" comment="freeradius-server-libs is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140581" version="1" comment="freeradius-server-mysql is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140582" version="1" comment="freeradius-server-perl is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140583" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140584" version="1" comment="freeradius-server-python is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140585" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140586" version="1" comment="freeradius-server-utils is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141126" version="1" comment="squashfs is &lt;4.3-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140943" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140944" version="1" comment="libspice-client-glib-helper is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140945" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140946" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140947" version="1" comment="libspice-controller0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140948" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140949" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140546" version="1" comment="dracut is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140547" version="1" comment="dracut-fips is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140487" version="1" comment="chrony is &lt;2.3-3.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140909" version="1" comment="libproxy1 is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140910" version="1" comment="libproxy1-32bit is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140911" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140912" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140913" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140914" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140514" version="1" comment="cups-pk-helper is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140515" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140862" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140863" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140864" version="1" comment="libwebkitgtk3-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141127" version="1" comment="squid is &lt;3.5.21-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140452" version="1" comment="apache-commons-httpclient is &lt;3.1-4.498" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549936" version="1" comment="expat is &lt;2.1.0-20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549937" version="1" comment="libexpat1 is &lt;2.1.0-20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547802" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550823" version="1" comment="clamav is &lt;0.99.4-33.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549409" version="1" comment="unrar is &lt;5.0.14-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631579" version="1" comment="unrar is &lt;5.6.1-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140779" version="1" comment="libblkid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140780" version="1" comment="libblkid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140781" version="1" comment="libfdisk1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140782" version="1" comment="libmount1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140783" version="1" comment="libmount1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140784" version="1" comment="libsmartcols1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140785" version="1" comment="libuuid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140786" version="1" comment="libuuid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140787" version="1" comment="python-libmount is &lt;2.28-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140788" version="1" comment="util-linux is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140789" version="1" comment="util-linux-lang is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140790" version="1" comment="util-linux-systemd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140791" version="1" comment="uuidd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130724" version="1" comment="libarchive13 is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140496" version="1" comment="coreutils is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140497" version="1" comment="coreutils-lang is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140636" version="1" comment="libgoa-1_0-0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140637" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334438" version="1" comment="openstack-nova is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551188" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.9.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595016" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140447" version="1" comment="ant is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140460" version="1" comment="apache2-mod_perl is &lt;2.0.8-11.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110494" version="1" comment="stunnel is &lt;5.00-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334050" version="1" comment="ruby is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334192" version="1" comment="ruby2.1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141142" version="1" comment="tomcat is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141143" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141144" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141145" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141146" version="1" comment="tomcat-javadoc is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141147" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141148" version="1" comment="tomcat-lib is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141149" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141150" version="1" comment="tomcat-webapps is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140739" version="1" comment="libX11-6 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140740" version="1" comment="libX11-6-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140741" version="1" comment="libX11-data is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140742" version="1" comment="libX11-xcb1 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140743" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140748" version="1" comment="libXext6 is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140749" version="1" comment="libXext6-32bit is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140750" version="1" comment="libXfixes3 is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140751" version="1" comment="libXfixes3-32bit is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140753" version="1" comment="libXi6 is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140754" version="1" comment="libXi6-32bit is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140755" version="1" comment="libXinerama1 is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140756" version="1" comment="libXinerama1-32bit is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140759" version="1" comment="libXrandr2 is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140760" version="1" comment="libXrandr2-32bit is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140761" version="1" comment="libXrender1 is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140762" version="1" comment="libXrender1-32bit is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140744" version="1" comment="libXRes1 is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140745" version="1" comment="libXRes1-32bit is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140767" version="1" comment="libXv1 is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140768" version="1" comment="libXv1-32bit is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140769" version="1" comment="libXvMC1 is &lt;1.0.8-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140773" version="1" comment="libXxf86dga1 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140838" version="1" comment="libdmx1 is &lt;1.1.3-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140774" version="1" comment="libXxf86vm1 is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140775" version="1" comment="libXxf86vm1-32bit is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140763" version="1" comment="libXt6 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140764" version="1" comment="libXt6-32bit is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140746" version="1" comment="libXcursor1 is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140747" version="1" comment="libXcursor1-32bit is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140757" version="1" comment="libXp6 is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140758" version="1" comment="libXp6-32bit is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140765" version="1" comment="libXtst6 is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140766" version="1" comment="libXtst6-32bit is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141007" version="1" comment="libxcb-dri2-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141008" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141009" version="1" comment="libxcb-dri3-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141010" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141011" version="1" comment="libxcb-glx0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141012" version="1" comment="libxcb-glx0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141013" version="1" comment="libxcb-present0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141014" version="1" comment="libxcb-present0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141015" version="1" comment="libxcb-randr0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141016" version="1" comment="libxcb-render0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141017" version="1" comment="libxcb-render0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141018" version="1" comment="libxcb-shape0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141019" version="1" comment="libxcb-shm0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141020" version="1" comment="libxcb-shm0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141021" version="1" comment="libxcb-sync1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141022" version="1" comment="libxcb-sync1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141023" version="1" comment="libxcb-xf86dri0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141024" version="1" comment="libxcb-xfixes0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141025" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141026" version="1" comment="libxcb-xinerama0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141027" version="1" comment="libxcb-xkb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141028" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141029" version="1" comment="libxcb-xv0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141030" version="1" comment="libxcb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141031" version="1" comment="libxcb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140663" version="1" comment="guestfs-data is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140664" version="1" comment="guestfs-tools is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140665" version="1" comment="guestfsd is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140666" version="1" comment="libguestfs0 is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140667" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140668" version="1" comment="python-libguestfs is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140669" version="1" comment="virt-p2v is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140670" version="1" comment="virt-v2v is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550048" version="1" comment="rrdtool is &lt;1.4.7-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550049" version="1" comment="rrdtool-cached is &lt;1.4.7-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140951" version="1" comment="libsrtp1 is &lt;1.5.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140847" version="1" comment="libimobiledevice6 is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140687" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140688" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122758" version="1" comment="socat is &lt;1.7.2.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141168" version="1" comment="xlockmore is &lt;5.43-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130998" version="1" comment="python is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131909" version="1" comment="python-32bit is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131000" version="1" comment="python-curses is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131911" version="1" comment="python-demo is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131914" version="1" comment="python-gdbm is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131915" version="1" comment="python-idle is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131002" version="1" comment="python-tk is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141074" version="1" comment="python3 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141075" version="1" comment="python3-curses is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131105" version="1" comment="libgcrypt20 is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131106" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131935" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131936" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140950" version="1" comment="libspice-server1 is &lt;0.12.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333998" version="1" comment="spice is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141084" version="1" comment="python-pyOpenSSL is &lt;16.0.0-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141122" version="1" comment="rtkit is &lt;0.11_git201205151338-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338741" version="1" comment="apache-commons-httpclient is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140683" version="1" comment="ibus-chewing is &lt;1.4.14-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140684" version="1" comment="ibus-pinyin is &lt;1.5.0-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131934" version="1" comment="apache2-mod_nss is &lt;1.0.14-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561562" version="1" comment="python-pip is &lt;10.0.1-11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561558" version="1" comment="python-ply is &lt;3.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549161" version="1" comment="ghostscript is &lt;9.15-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549162" version="1" comment="ghostscript-x11 is &lt;9.15-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140689" version="1" comment="libjbig2 is &lt;2.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140690" version="1" comment="libjbig2-32bit is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140691" version="1" comment="libjson-c2 is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140692" version="1" comment="libjson-c2-32bit is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141036" version="1" comment="libyaml-0-2 is &lt;0.1.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140861" version="1" comment="libjansson4 is &lt;2.7-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141085" version="1" comment="python-pywbem is &lt;0.7.0-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141108" version="1" comment="rpm is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141109" version="1" comment="rpm-32bit is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141110" version="1" comment="rpm-build is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119506" version="1" comment="cups-filters is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119507" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119508" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119509" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550335" version="1" comment="libmicrohttpd10 is &lt;0.9.30-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140555" version="1" comment="eog is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140556" version="1" comment="eog-lang is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140657" version="1" comment="gtk2-data is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140658" version="1" comment="gtk2-lang is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140659" version="1" comment="gtk2-tools is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140660" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140661" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140662" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594272" version="1" comment="python-pycrypto is &lt;2.6.1-10.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531376" version="1" comment="perl-DBI is &lt;1.628-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551754" version="1" comment="perl-DBI is &lt;1.628-5.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595831" version="1" comment="perl-DBI is &lt;1.628-5.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140969" version="1" comment="libudisks2-0 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140970" version="1" comment="udisks2 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140971" version="1" comment="udisks2-lang is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140770" version="1" comment="libXvnc1 is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140771" version="1" comment="tigervnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140772" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141158" version="1" comment="xalan-j2 is &lt;2.7.0-264.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106094" version="1" comment="elfutils is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106096" version="1" comment="libasm1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106097" version="1" comment="libasm1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106099" version="1" comment="libdw1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106100" version="1" comment="libdw1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106102" version="1" comment="libebl1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106103" version="1" comment="libebl1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106106" version="1" comment="libelf1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106107" version="1" comment="libelf1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141043" version="1" comment="mutt is &lt;1.6.0-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129286" version="1" comment="mozilla-nspr is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129287" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141086" version="1" comment="python-requests is &lt;2.8.1-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141082" version="1" comment="python-imaging is &lt;1.1.7-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131048" version="1" comment="gd is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140477" version="1" comment="bash is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140478" version="1" comment="bash-doc is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140479" version="1" comment="libreadline6 is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140480" version="1" comment="libreadline6-32bit is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140481" version="1" comment="readline-doc is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141045" version="1" comment="openssh is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141046" version="1" comment="openssh-fips is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141047" version="1" comment="openssh-helpers is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334387" version="1" comment="ansible is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140884" version="1" comment="libmms0 is &lt;0.6.2-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140428" version="1" comment="DirectFB is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140429" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140430" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131658" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131659" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131661" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131662" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128388" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128390" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128391" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141072" version="1" comment="ppp is &lt;2.4.7-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141068" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140542" version="1" comment="dovecot22 is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140543" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140544" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140545" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128901" version="1" comment="libtasn1 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128902" version="1" comment="libtasn1-6 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128903" version="1" comment="libtasn1-6-32bit is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140448" version="1" comment="apache-commons-beanutils is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140449" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140643" version="1" comment="gpgme is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140644" version="1" comment="libgpgme11 is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141104" version="1" comment="res-signingkeys is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141105" version="1" comment="smt is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141106" version="1" comment="smt-support is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531477" version="1" comment="apache-commons-httpclient is &lt;3.1-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141073" version="1" comment="procmail is &lt;3.22-267.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141134" version="1" comment="syslog-service is &lt;2.0-778.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141125" version="1" comment="shim is &lt;0.9-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131098" version="1" comment="wpa_supplicant is &lt;2.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140915" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140916" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140917" version="1" comment="libpulse0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140918" version="1" comment="libpulse0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140919" version="1" comment="pulseaudio is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140920" version="1" comment="pulseaudio-esound-compat is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140921" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140922" version="1" comment="pulseaudio-lang is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140923" version="1" comment="pulseaudio-module-x11 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140924" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140925" version="1" comment="pulseaudio-utils is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141071" version="1" comment="ppc64-diag is &lt;2.7.1-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141070" version="1" comment="powerpc-utils is &lt;1.3.2-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140534" version="1" comment="davfs2 is &lt;1.5.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140882" version="1" comment="liblzo2-2 is &lt;2.08-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140883" version="1" comment="liblzo2-2-32bit is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141165" version="1" comment="xf86-video-intel is &lt;2.99.917.641_ge4ef6e9-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550168" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550169" version="1" comment="ruby2.1 is &lt;2.1.9-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550170" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140498" version="1" comment="cpp48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140499" version="1" comment="gcc48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140500" version="1" comment="gcc48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140501" version="1" comment="gcc48-c++ is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140502" version="1" comment="gcc48-info is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140503" version="1" comment="gcc48-locale is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140504" version="1" comment="libasan0 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140505" version="1" comment="libasan0-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140506" version="1" comment="libstdc++48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140507" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140879" version="1" comment="liblua5_2 is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140880" version="1" comment="liblua5_2-32bit is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140881" version="1" comment="lua is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119309" version="1" comment="libvncclient0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119310" version="1" comment="libvncserver0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140839" version="1" comment="libevent-2_0-5 is &lt;2.0.21-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130995" version="1" comment="ctags is &lt;5.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140638" version="1" comment="gnome-settings-daemon is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140639" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140929" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140930" version="1" comment="ruby2.1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140931" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141048" version="1" comment="openvpn is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141049" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549834" version="1" comment="file is &lt;5.22-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549835" version="1" comment="file-magic is &lt;5.22-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549836" version="1" comment="libmagic1 is &lt;5.22-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549837" version="1" comment="libmagic1-32bit is &lt;5.22-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549334" version="1" comment="libtiff5 is &lt;4.0.7-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547334" version="1" comment="libtiff5-32bit is &lt;4.0.7-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549335" version="1" comment="tiff is &lt;4.0.7-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550933" version="1" comment="libtiff5 is &lt;4.0.9-44.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550934" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550935" version="1" comment="tiff is &lt;4.0.9-44.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106110" version="1" comment="libjasper1 is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106111" version="1" comment="libjasper1-32bit is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106381" version="1" comment="unzip is &lt;6.00-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549588" version="1" comment="libicu-doc is &lt;52.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549589" version="1" comment="libicu52_1 is &lt;52.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549590" version="1" comment="libicu52_1-32bit is &lt;52.1-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549591" version="1" comment="libicu52_1-data is &lt;52.1-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530415" version="1" comment="libicu-doc is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521005" version="1" comment="libicu52_1 is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521006" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521007" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546245" version="1" comment="libicu-doc is &lt;52.1-8.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546246" version="1" comment="libicu52_1 is &lt;52.1-8.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546247" version="1" comment="libicu52_1-32bit is &lt;52.1-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546248" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594765" version="1" comment="libicu-doc is &lt;52.1-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594766" version="1" comment="libicu52_1 is &lt;52.1-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594767" version="1" comment="libicu52_1-data is &lt;52.1-8.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140464" version="1" comment="autofs is &lt;5.0.9-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140482" version="1" comment="binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334086" version="1" comment="ImageMagick is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339347" version="1" comment="python-requests-kerberos is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550175" version="1" comment="libpcap1 is &lt;1.8.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550176" version="1" comment="tcpdump is &lt;4.9.0-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140571" version="1" comment="libFLAC++6 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140572" version="1" comment="libFLAC8 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140573" version="1" comment="libFLAC8-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549262" version="1" comment="libpcre1 is &lt;8.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544450" version="1" comment="libpcre1-32bit is &lt;8.39-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549263" version="1" comment="libpcre16-0 is &lt;8.39-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128468" version="1" comment="libksba8 is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105080" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105088" version="1" comment="libjpeg62 is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105087" version="1" comment="libjpeg62-32bit is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105091" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105082" version="1" comment="libjpeg8 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105081" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105086" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141140" version="1" comment="tcpdump is &lt;4.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106170" version="1" comment="libhivex0 is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106171" version="1" comment="perl-Win-Hivex is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105814" version="1" comment="libmpfr4 is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105815" version="1" comment="libmpfr4-32bit is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106065" version="1" comment="xdg-utils is &lt;20140630-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113975" version="1" comment="busybox is &lt;1.21.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107570" version="1" comment="libicu-doc is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107572" version="1" comment="libicu52_1 is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107571" version="1" comment="libicu52_1-32bit is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107573" version="1" comment="libicu52_1-data is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550189" version="1" comment="squid is &lt;3.5.21-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549273" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549274" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549900" version="1" comment="binutils is &lt;2.29.1-9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520243" version="1" comment="binutils is &lt;2.31-9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545846" version="1" comment="binutils is &lt;2.31-9.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594618" version="1" comment="binutils is &lt;2.31-9.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113256" version="1" comment="e2fsprogs is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113260" version="1" comment="libcom_err2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113261" version="1" comment="libcom_err2-32bit is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113264" version="1" comment="libext2fs2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533005" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-255.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533006" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-255.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140721" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140722" version="1" comment="libQt5Core5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140723" version="1" comment="libQt5DBus5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140724" version="1" comment="libQt5Gui5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140725" version="1" comment="libQt5Network5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140726" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140727" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140728" version="1" comment="libQt5Sql5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140729" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140730" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140731" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140732" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140733" version="1" comment="libQt5Test5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140734" version="1" comment="libQt5Widgets5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140735" version="1" comment="libQt5Xml5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141153" version="1" comment="update-alternatives is &lt;1.18.4-14.216" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128891" version="1" comment="p7zip is &lt;9.20.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519012" version="1" comment="kernel-firmware is &lt;20170530-21.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519013" version="1" comment="ucode-amd is &lt;20170530-21.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108432" version="1" comment="pigz is &lt;2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550296" version="1" comment="kernel-default is &lt;4.4.38-93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550297" version="1" comment="kernel-default-base is &lt;4.4.38-93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550298" version="1" comment="kernel-default-devel is &lt;4.4.38-93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550299" version="1" comment="kernel-default-man is &lt;4.4.38-93.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518686" version="1" comment="kernel-devel is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518687" version="1" comment="kernel-macros is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518688" version="1" comment="kernel-source is &lt;4.4.38-93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550300" version="1" comment="kernel-syms is &lt;4.4.38-93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141156" version="1" comment="vsftpd is &lt;3.0.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140870" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140871" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140872" version="1" comment="openldap2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140873" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140874" version="1" comment="openldap2-client is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140952" version="1" comment="libssh2-1 is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140953" version="1" comment="libssh2-1-32bit is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131905" version="1" comment="libidn-tools is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130989" version="1" comment="libidn11 is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130990" version="1" comment="libidn11-32bit is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525269" version="1" comment="python3-certifi is &lt;2018.4.16-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525270" version="1" comment="python3-chardet is &lt;3.0.4-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531063" version="1" comment="python3-requests is &lt;2.20.1-5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525271" version="1" comment="python3-urllib3 is &lt;1.22-3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549199" version="1" comment="libarchive13 is &lt;3.1.2-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130962" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131902" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131903" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130963" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530378" version="1" comment="mailman is &lt;2.1.17-3.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546036" version="1" comment="mailman is &lt;2.1.17-3.3.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594734" version="1" comment="mailman is &lt;2.1.17-3.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140431" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140432" version="1" comment="libnm-glib4 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140433" version="1" comment="libnm-util2 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140434" version="1" comment="libnm0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140435" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140436" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140715" version="1" comment="libldb1 is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140716" version="1" comment="libldb1-32bit is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125321" version="1" comment="ghostscript is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125322" version="1" comment="ghostscript-x11 is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550291" version="1" comment="pam is &lt;1.1.8-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548138" version="1" comment="pam-32bit is &lt;1.1.8-23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517451" version="1" comment="pam-doc is &lt;1.1.8-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140541" version="1" comment="dnsmasq is &lt;2.71-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549985" version="1" comment="ppp is &lt;2.4.7-3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633614" version="1" comment="libsqlite3-0 is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633604" version="1" comment="libsqlite3-0-32bit is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633615" version="1" comment="sqlite3 is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633616" version="1" comment="sqlite3-devel is &lt;3.36.0-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333983" version="1" comment="sqlite3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596252" version="1" comment="crowbar-core is &lt;4.0+git.1574788924.e4a6aeb0c-9.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596253" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1574788924.e4a6aeb0c-9.60.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596254" version="1" comment="crowbar-openstack is &lt;4.0+git.1574869671.9c7bade2d-9.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596255" version="1" comment="grafana-monasca-ui-drilldown is &lt;1.5.5~dev3-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596256" version="1" comment="openstack-horizon-plugin-monasca-ui is &lt;1.5.5~dev3-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596257" version="1" comment="openstack-monasca-api is &lt;1.7.1~dev18-12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596258" version="1" comment="openstack-monasca-log-api is &lt;1.4.3~dev3-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596259" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596260" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596261" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596262" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596263" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596264" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596265" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596266" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596267" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596268" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596269" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596270" version="1" comment="python-horizon-plugin-monasca-ui is &lt;1.5.5~dev3-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596271" version="1" comment="python-monasca-api is &lt;1.7.1~dev18-12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596272" version="1" comment="python-monasca-log-api is &lt;1.4.3~dev3-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596273" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596274" version="1" comment="ruby2.1-rubygem-puma is &lt;2.16.0-4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113959" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131759" version="1" comment="libtcnative-1-0 is &lt;1.1.32-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140685" version="1" comment="ipsec-tools is &lt;0.8.0-15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550037" version="1" comment="freeradius-server is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550038" version="1" comment="freeradius-server-doc is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550039" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550040" version="1" comment="freeradius-server-ldap is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550041" version="1" comment="freeradius-server-libs is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550042" version="1" comment="freeradius-server-mysql is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550043" version="1" comment="freeradius-server-perl is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550044" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550045" version="1" comment="freeradius-server-python is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550046" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550047" version="1" comment="freeradius-server-utils is &lt;3.0.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141124" version="1" comment="sblim-sfcb is &lt;1.4.8-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518489" version="1" comment="libvmtools0 is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518490" version="1" comment="open-vm-tools is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518491" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140976" version="1" comment="libvdpau1 is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549264" version="1" comment="ntp is &lt;4.2.8p9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549265" version="1" comment="ntp-doc is &lt;4.2.8p9-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125716" version="1" comment="libasan2 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125717" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125723" version="1" comment="libffi4 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125724" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125734" version="1" comment="libmpx0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125735" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125736" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125737" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339348" version="1" comment="openstack-designate is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338885" version="1" comment="libevent is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141107" version="1" comment="rpcbind is &lt;0.2.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126715" version="1" comment="giflib-progs is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126709" version="1" comment="libgif6 is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126710" version="1" comment="libgif6-32bit is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550112" version="1" comment="audiofile is &lt;0.3.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550113" version="1" comment="libaudiofile1 is &lt;0.3.6-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547955" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550224" version="1" comment="libxslt-tools is &lt;1.1.28-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550225" version="1" comment="libxslt1 is &lt;1.1.28-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548046" version="1" comment="libxslt1-32bit is &lt;1.1.28-16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119273" version="1" comment="xscreensaver is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119274" version="1" comment="xscreensaver-data is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140736" version="1" comment="libQt5WebKit5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140737" version="1" comment="libQt5WebKit5-imports is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140738" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140648" version="1" comment="grub2 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140649" version="1" comment="grub2-arm64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140650" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140651" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140652" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140653" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140654" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140655" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140656" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550102" version="1" comment="libpng12-0 is &lt;1.2.50-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547941" version="1" comment="libpng12-0-32bit is &lt;1.2.50-19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550116" version="1" comment="libpng15-15 is &lt;1.5.22-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550008" version="1" comment="kernel-default is &lt;4.4.49-92.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550009" version="1" comment="kernel-default-base is &lt;4.4.49-92.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550010" version="1" comment="kernel-default-devel is &lt;4.4.49-92.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550011" version="1" comment="kernel-default-man is &lt;4.4.49-92.11.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518470" version="1" comment="kernel-devel is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518471" version="1" comment="kernel-macros is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518472" version="1" comment="kernel-source is &lt;4.4.49-92.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550012" version="1" comment="kernel-syms is &lt;4.4.49-92.11.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123011" version="1" comment="libhogweed2 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123012" version="1" comment="libhogweed2-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123014" version="1" comment="libnettle4 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123015" version="1" comment="libnettle4-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549547" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131020" version="1" comment="dosfstools is &lt;3.0.26-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549276" version="1" comment="dnsmasq is &lt;2.71-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550294" version="1" comment="squidGuard is &lt;1.4-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550295" version="1" comment="squidGuard-doc is &lt;1.4-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550588" version="1" comment="ecryptfs-utils is &lt;103-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550589" version="1" comment="ecryptfs-utils-32bit is &lt;103-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531013" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531014" version="1" comment="ruby2.1 is &lt;2.1.9-19.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531015" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531016" version="1" comment="yast2-ruby-bindings is &lt;3.1.53-9.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551469" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551470" version="1" comment="ruby2.1 is &lt;2.1.9-19.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551471" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551472" version="1" comment="yast2-ruby-bindings is &lt;3.1.53-9.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595606" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595607" version="1" comment="ruby2.1 is &lt;2.1.9-19.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595608" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595609" version="1" comment="yast2-ruby-bindings is &lt;3.1.53-9.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333942" version="1" comment="openssl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334001" version="1" comment="systemd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338981" version="1" comment="unrar is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333937" version="1" comment="xen is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530906" version="1" comment="pam_radius is &lt;1.3.16-239.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530907" version="1" comment="pam_radius-32bit is &lt;1.3.16-239.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548962" version="1" comment="pam_radius is &lt;1.3.16-239.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548963" version="1" comment="pam_radius-32bit is &lt;1.3.16-239.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595535" version="1" comment="pam_radius is &lt;1.3.16-239.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520998" version="1" comment="bash is &lt;4.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520999" version="1" comment="bash-doc is &lt;4.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521001" version="1" comment="libreadline6 is &lt;6.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521002" version="1" comment="libreadline6-32bit is &lt;6.3-83.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521003" version="1" comment="readline-doc is &lt;6.3-83.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551004" version="1" comment="bash is &lt;4.3-83.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551005" version="1" comment="libreadline6 is &lt;6.3-83.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551006" version="1" comment="libreadline6-32bit is &lt;6.3-83.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594763" version="1" comment="bash is &lt;4.3-83.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594764" version="1" comment="libreadline6 is &lt;6.3-83.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530259" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530260" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530261" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530262" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.20-30.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548300" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-30.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541626" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.20-30.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594573" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.20-30.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594574" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.20-30.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550050" version="1" comment="apache2 is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532772" version="1" comment="apache2-doc is &lt;2.4.23-21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550051" version="1" comment="apache2-example-pages is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550052" version="1" comment="apache2-prefork is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550053" version="1" comment="apache2-utils is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550054" version="1" comment="apache2-worker is &lt;2.4.23-21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532091" version="1" comment="tomcat is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532092" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532093" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532094" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532095" version="1" comment="tomcat-javadoc is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532096" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532097" version="1" comment="tomcat-lib is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532098" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532099" version="1" comment="tomcat-webapps is &lt;8.0.36-17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549178" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549179" version="1" comment="python3 is &lt;3.4.5-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549180" version="1" comment="python3-base is &lt;3.4.5-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549181" version="1" comment="python3-curses is &lt;3.4.5-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595843" version="1" comment="ansible is &lt;2.2.3.0-17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595844" version="1" comment="crowbar-core is &lt;4.0+git.1600767499.0615a418f-9.69.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595845" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1600767499.0615a418f-9.69.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595846" version="1" comment="crowbar-openstack is &lt;4.0+git.1599037255.25b759234-9.74.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595847" version="1" comment="grafana is &lt;6.7.4-1.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595848" version="1" comment="grafana-natel-discrete-panel is &lt;0.0.9-1.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595849" version="1" comment="openstack-aodh is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595850" version="1" comment="openstack-aodh-api is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595851" version="1" comment="openstack-aodh-doc is &lt;3.0.5~dev2-2.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595852" version="1" comment="openstack-aodh-evaluator is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595853" version="1" comment="openstack-aodh-expirer is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595854" version="1" comment="openstack-aodh-listener is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595855" version="1" comment="openstack-aodh-notifier is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595856" version="1" comment="openstack-barbican is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595857" version="1" comment="openstack-barbican-api is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595858" version="1" comment="openstack-barbican-doc is &lt;3.0.1~dev9-2.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595859" version="1" comment="openstack-barbican-keystone-listener is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595860" version="1" comment="openstack-barbican-retry is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595861" version="1" comment="openstack-barbican-worker is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595862" version="1" comment="openstack-cinder is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595863" version="1" comment="openstack-cinder-api is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595864" version="1" comment="openstack-cinder-backup is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595865" version="1" comment="openstack-cinder-doc is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595866" version="1" comment="openstack-cinder-scheduler is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595867" version="1" comment="openstack-cinder-volume is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595868" version="1" comment="openstack-gnocchi is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595869" version="1" comment="openstack-gnocchi-api is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595870" version="1" comment="openstack-gnocchi-carbonara is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595871" version="1" comment="openstack-gnocchi-indexer-sqlalchemy is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595872" version="1" comment="openstack-gnocchi-metricd is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595873" version="1" comment="openstack-gnocchi-statsd is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595874" version="1" comment="openstack-heat is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595875" version="1" comment="openstack-heat-api is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595876" version="1" comment="openstack-heat-api-cfn is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595877" version="1" comment="openstack-heat-api-cloudwatch is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595878" version="1" comment="openstack-heat-doc is &lt;7.0.7~dev10-5.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595879" version="1" comment="openstack-heat-engine is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595880" version="1" comment="openstack-heat-plugin-heat_docker is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595881" version="1" comment="openstack-heat-test is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595882" version="1" comment="openstack-ironic is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595883" version="1" comment="openstack-ironic-api is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595884" version="1" comment="openstack-ironic-conductor is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595885" version="1" comment="openstack-ironic-doc is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595886" version="1" comment="openstack-magnum is &lt;3.3.2~dev7-14.14.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595887" version="1" comment="openstack-magnum-api is &lt;3.3.2~dev7-14.14.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595888" version="1" comment="openstack-magnum-conductor is &lt;3.3.2~dev7-14.14.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595889" version="1" comment="openstack-magnum-doc is &lt;3.3.2~dev7-14.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595890" version="1" comment="openstack-manila is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595891" version="1" comment="openstack-manila-api is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595892" version="1" comment="openstack-manila-data is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595893" version="1" comment="openstack-manila-doc is &lt;3.0.1~dev30-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595894" version="1" comment="openstack-manila-scheduler is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595895" version="1" comment="openstack-manila-share is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595896" version="1" comment="openstack-monasca-agent is &lt;1.10.1~dev4-13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595897" version="1" comment="openstack-murano is &lt;3.0.1~dev21-7.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595898" version="1" comment="openstack-murano-api is &lt;3.0.1~dev21-7.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595899" version="1" comment="openstack-murano-doc is &lt;3.0.1~dev21-7.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595900" version="1" comment="openstack-murano-engine is &lt;3.0.1~dev21-7.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595901" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595902" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595903" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595904" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595905" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595906" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595907" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595908" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595909" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595910" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595911" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595912" version="1" comment="openstack-neutron-vpn-agent is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595913" version="1" comment="openstack-neutron-vpnaas is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595914" version="1" comment="openstack-neutron-vpnaas-doc is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595915" version="1" comment="openstack-neutron-vyatta-agent is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595916" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595917" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595918" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595919" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595920" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595921" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595922" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595923" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595924" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595925" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595926" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595927" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595928" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595929" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595930" version="1" comment="openstack-sahara is &lt;5.0.2~dev3-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595931" version="1" comment="openstack-sahara-api is &lt;5.0.2~dev3-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595932" version="1" comment="openstack-sahara-doc is &lt;5.0.2~dev3-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595933" version="1" comment="openstack-sahara-engine is &lt;5.0.2~dev3-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595934" version="1" comment="python-Pillow is &lt;2.8.1-4.17.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595935" version="1" comment="python-aodh is &lt;3.0.5~dev2-2.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595936" version="1" comment="python-barbican is &lt;3.0.1~dev9-2.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595937" version="1" comment="python-cinder is &lt;9.1.5~dev6-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595938" version="1" comment="python-gnocchi is &lt;3.0.7~dev1-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595939" version="1" comment="python-heat is &lt;7.0.7~dev10-5.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595940" version="1" comment="python-ironic is &lt;6.2.5~dev3-2.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595941" version="1" comment="python-magnum is &lt;3.3.2~dev7-14.14.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595942" version="1" comment="python-manila is &lt;3.0.1~dev30-4.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595943" version="1" comment="python-monasca-agent is &lt;1.10.1~dev4-13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595944" version="1" comment="python-murano is &lt;3.0.1~dev21-7.5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595945" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595946" version="1" comment="python-neutron-vpnaas is &lt;9.0.1~dev8-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595947" version="1" comment="python-nova is &lt;14.0.11~dev13-4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595948" version="1" comment="python-sahara is &lt;5.0.2~dev3-14.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595949" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.3-7.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530483" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-122.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530484" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-122.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549575" version="1" comment="openssh is &lt;7.2p2-66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549576" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-66.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549577" version="1" comment="openssh-fips is &lt;7.2p2-66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549578" version="1" comment="openssh-helpers is &lt;7.2p2-66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517545" version="1" comment="xen is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549266" version="1" comment="xen-doc-html is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517546" version="1" comment="xen-libs is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517547" version="1" comment="xen-libs-32bit is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549267" version="1" comment="xen-tools is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549268" version="1" comment="xen-tools-domU is &lt;4.7.1_04-28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549417" version="1" comment="qemu is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532230" version="1" comment="qemu-arm is &lt;2.6.2-41.16.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549418" version="1" comment="qemu-block-curl is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549419" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549420" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549421" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517681" version="1" comment="qemu-ipxe is &lt;1.0.0-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549422" version="1" comment="qemu-kvm is &lt;2.6.2-41.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549423" version="1" comment="qemu-lang is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549424" version="1" comment="qemu-ppc is &lt;2.6.2-41.16.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549425" version="1" comment="qemu-s390 is &lt;2.6.2-41.16.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517683" version="1" comment="qemu-seabios is &lt;1.9.1-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517684" version="1" comment="qemu-sgabios is &lt;8-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549426" version="1" comment="qemu-tools is &lt;2.6.2-41.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517686" version="1" comment="qemu-vgabios is &lt;1.9.1-41.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517687" version="1" comment="qemu-x86 is &lt;2.6.2-41.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549991" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549992" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550057" version="1" comment="libpng16-16 is &lt;1.6.8-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547892" version="1" comment="libpng16-16-32bit is &lt;1.6.8-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549628" version="1" comment="libpcsclite1 is &lt;1.8.10-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549629" version="1" comment="pcsc-lite is &lt;1.8.10-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595186" version="1" comment="crowbar-core is &lt;4.0+git.1570463621.40b11cd48-9.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595187" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1570463621.40b11cd48-9.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595188" version="1" comment="crowbar-openstack is &lt;4.0+git.1569429513.e7016b2b6-9.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595189" version="1" comment="grafana is &lt;4.6.5-1.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595190" version="1" comment="novnc is &lt;1.0.0-12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595191" version="1" comment="openstack-keystone is &lt;10.0.3~dev9-7.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595192" version="1" comment="openstack-keystone-doc is &lt;10.0.3~dev9-7.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595193" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595194" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595195" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595196" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595197" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595198" version="1" comment="openstack-neutron-lbaas is &lt;9.2.2~dev11-4.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595199" version="1" comment="openstack-neutron-lbaas-agent is &lt;9.2.2~dev11-4.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595200" version="1" comment="openstack-neutron-lbaas-doc is &lt;9.2.2~dev11-4.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595201" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595202" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595203" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595204" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595205" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595206" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595207" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595208" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595209" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595210" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595211" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595212" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595213" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595214" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595215" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595216" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595217" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595218" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595219" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595220" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595221" version="1" comment="openstack-tempest is &lt;12.2.1~a0~dev177-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595222" version="1" comment="openstack-tempest-test is &lt;12.2.1~a0~dev177-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595223" version="1" comment="python-keystone is &lt;10.0.3~dev9-7.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595224" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595225" version="1" comment="python-neutron-lbaas is &lt;9.2.2~dev11-4.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595226" version="1" comment="python-nova is &lt;14.0.11~dev13-4.34.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595227" version="1" comment="python-pysaml2 is &lt;4.0.2-3.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595228" version="1" comment="python-tempest is &lt;12.2.1~a0~dev177-4.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595229" version="1" comment="python-urllib3 is &lt;1.16-3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595230" version="1" comment="ruby2.1-rubygem-chef is &lt;10.32.2-5.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595231" version="1" comment="ruby2.1-rubygem-easy_diff is &lt;1.0.0-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595232" version="1" comment="rubygem-chef is &lt;10.32.2-5.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595233" version="1" comment="sleshammer-aarch64 is &lt;0.7.0-0.18.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595234" version="1" comment="sleshammer-ppc64le is &lt;0.7.0-0.18.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595235" version="1" comment="sleshammer-s390x is &lt;0.7.0-0.18.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595236" version="1" comment="sleshammer-x86_64 is &lt;0.7.0-0.18.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550021" version="1" comment="qemu is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532745" version="1" comment="qemu-arm is &lt;2.6.2-41.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550022" version="1" comment="qemu-block-curl is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550023" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550024" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550025" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518479" version="1" comment="qemu-ipxe is &lt;1.0.0-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550026" version="1" comment="qemu-kvm is &lt;2.6.2-41.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550027" version="1" comment="qemu-lang is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550028" version="1" comment="qemu-ppc is &lt;2.6.2-41.9.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550029" version="1" comment="qemu-s390 is &lt;2.6.2-41.9.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518481" version="1" comment="qemu-seabios is &lt;1.9.1-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518482" version="1" comment="qemu-sgabios is &lt;8-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550030" version="1" comment="qemu-tools is &lt;2.6.2-41.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518484" version="1" comment="qemu-vgabios is &lt;1.9.1-41.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518485" version="1" comment="qemu-x86 is &lt;2.6.2-41.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549619" version="1" comment="libsystemd0 is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549620" version="1" comment="libsystemd0-32bit is &lt;228-132.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549621" version="1" comment="libudev1 is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549622" version="1" comment="libudev1-32bit is &lt;228-132.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549623" version="1" comment="systemd is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549624" version="1" comment="systemd-32bit is &lt;228-132.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518084" version="1" comment="systemd-bash-completion is &lt;228-132.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549625" version="1" comment="systemd-sysvinit is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549626" version="1" comment="udev is &lt;228-132.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550056" version="1" comment="libvirglrenderer0 is &lt;0.5.0-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549983" version="1" comment="libXpm4 is &lt;3.5.11-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547824" version="1" comment="libXpm4-32bit is &lt;3.5.11-5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550939" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550940" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550941" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550942" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.161-43.7.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545271" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.15-38.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535151" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.15-38.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545272" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.15-38.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535154" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.15-38.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547803" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.5-30.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535147" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.5-30.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535149" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.5-30.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549821" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549822" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549823" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549824" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.151-27.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549984" version="1" comment="gd is &lt;2.1.0-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550754" version="1" comment="libwavpack1 is &lt;4.60.99-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550441" version="1" comment="libevent-2_0-5 is &lt;2.0.21-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549368" version="1" comment="MozillaFirefox is &lt;52.2.0esr-108.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549369" version="1" comment="MozillaFirefox-branding-SLE is &lt;52-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549370" version="1" comment="MozillaFirefox-translations is &lt;52.2.0esr-108.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550143" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-12.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518580" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-12.12 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550200" version="1" comment="kernel-default is &lt;4.4.59-92.17.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550201" version="1" comment="kernel-default-base is &lt;4.4.59-92.17.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550202" version="1" comment="kernel-default-devel is &lt;4.4.59-92.17.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550203" version="1" comment="kernel-default-man is &lt;4.4.59-92.17.3 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518622" version="1" comment="kernel-devel is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518623" version="1" comment="kernel-macros is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518624" version="1" comment="kernel-source is &lt;4.4.59-92.17.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550204" version="1" comment="kernel-syms is &lt;4.4.59-92.17.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550018" version="1" comment="libXvnc1 is &lt;1.6.0-16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550019" version="1" comment="tigervnc is &lt;1.6.0-16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550020" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550661" version="1" comment="ghostscript is &lt;9.15-23.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550662" version="1" comment="ghostscript-x11 is &lt;9.15-23.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550292" version="1" comment="ghostscript is &lt;9.15-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550293" version="1" comment="ghostscript-x11 is &lt;9.15-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550672" version="1" comment="ft2demos is &lt;2.6.3-7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550673" version="1" comment="libfreetype6 is &lt;2.6.3-7.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550674" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550117" version="1" comment="libjasper1 is &lt;1.900.14-194.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547958" version="1" comment="libjasper1-32bit is &lt;1.900.14-194.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550164" version="1" comment="libtiff5 is &lt;4.0.7-43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547997" version="1" comment="libtiff5-32bit is &lt;4.0.7-43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550165" version="1" comment="tiff is &lt;4.0.7-43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549659" version="1" comment="libtiff5 is &lt;4.0.8-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549660" version="1" comment="libtiff5-32bit is &lt;4.0.8-44.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549661" version="1" comment="tiff is &lt;4.0.8-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550675" version="1" comment="ipsec-tools is &lt;0.8.0-19.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334004" version="1" comment="openjpeg2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549670" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530211" version="1" comment="openssh is &lt;7.2p2-74.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530212" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530213" version="1" comment="openssh-fips is &lt;7.2p2-74.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530214" version="1" comment="openssh-helpers is &lt;7.2p2-74.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550507" version="1" comment="openssh is &lt;7.2p2-74.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550508" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550509" version="1" comment="openssh-fips is &lt;7.2p2-74.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550510" version="1" comment="openssh-helpers is &lt;7.2p2-74.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594486" version="1" comment="openssh is &lt;7.2p2-74.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594487" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594488" version="1" comment="openssh-fips is &lt;7.2p2-74.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594489" version="1" comment="openssh-helpers is &lt;7.2p2-74.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530065" version="1" comment="python-Jinja2 is &lt;2.8-22.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671786" version="1" comment="kernel-default is &lt;4.4.121-92.169.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671787" version="1" comment="kernel-default-base is &lt;4.4.121-92.169.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671788" version="1" comment="kernel-default-devel is &lt;4.4.121-92.169.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671789" version="1" comment="kernel-devel is &lt;4.4.121-92.169.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671790" version="1" comment="kernel-macros is &lt;4.4.121-92.169.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671791" version="1" comment="kernel-source is &lt;4.4.121-92.169.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671792" version="1" comment="kernel-syms is &lt;4.4.121-92.169.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530773" version="1" comment="kernel-default is &lt;4.4.121-92.125.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530774" version="1" comment="kernel-default-base is &lt;4.4.121-92.125.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530775" version="1" comment="kernel-default-devel is &lt;4.4.121-92.125.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530776" version="1" comment="kernel-devel is &lt;4.4.121-92.125.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530777" version="1" comment="kernel-macros is &lt;4.4.121-92.125.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530778" version="1" comment="kernel-source is &lt;4.4.121-92.125.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530779" version="1" comment="kernel-syms is &lt;4.4.121-92.125.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530780" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551320" version="1" comment="kernel-default is &lt;4.4.121-92.125.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551321" version="1" comment="kernel-default-base is &lt;4.4.121-92.125.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551322" version="1" comment="kernel-default-devel is &lt;4.4.121-92.125.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551323" version="1" comment="kernel-default-man is &lt;4.4.121-92.125.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551324" version="1" comment="kernel-syms is &lt;4.4.121-92.125.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537227" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;1-3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595277" version="1" comment="kernel-default is &lt;4.4.121-92.125.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595278" version="1" comment="kernel-default-base is &lt;4.4.121-92.125.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595279" version="1" comment="kernel-default-devel is &lt;4.4.121-92.125.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595280" version="1" comment="kernel-syms is &lt;4.4.121-92.125.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549579" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549580" version="1" comment="libospf0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549581" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549582" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549583" version="1" comment="libzebra1 is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549584" version="1" comment="quagga is &lt;1.1.1-17.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550177" version="1" comment="perl-DBD-mysql is &lt;4.021-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549209" version="1" comment="gvim is &lt;7.4.326-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549210" version="1" comment="vim is &lt;7.4.326-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516672" version="1" comment="vim-data is &lt;7.4.326-7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334044" version="1" comment="postgresql94 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550716" version="1" comment="p7zip is &lt;9.20.1-7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124729" version="1" comment="libgraphite2-3 is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124730" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140889" version="1" comment="libnghttp2-14 is &lt;1.7.1-1.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531995" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552180" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596437" version="1" comment="libnghttp2-14 is &lt;1.39.2-3.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519721" version="1" comment="ntp is &lt;4.2.8p11-64.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519722" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548186" version="1" comment="ntp is &lt;4.2.8p11-64.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548187" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594428" version="1" comment="ntp is &lt;4.2.8p11-64.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594429" version="1" comment="ntp-doc is &lt;4.2.8p11-64.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141177" version="1" comment="yast2-users is &lt;3.1.57-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141131" version="1" comment="supportutils is &lt;3.0-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550312" version="1" comment="libxml2-2 is &lt;2.9.4-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550313" version="1" comment="libxml2-2-32bit is &lt;2.9.4-36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532986" version="1" comment="libxml2-doc is &lt;2.9.4-36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550314" version="1" comment="libxml2-tools is &lt;2.9.4-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550315" version="1" comment="python-libxml2 is &lt;2.9.4-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140865" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140866" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140867" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140868" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140869" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677943" version="1" comment="libopenjp2-7 is &lt;2.1.0-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550209" version="1" comment="MozillaFirefox is &lt;45.9.0esr-105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550210" version="1" comment="MozillaFirefox-translations is &lt;45.9.0esr-105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550211" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550212" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550213" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550214" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-23.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550215" version="1" comment="libfreebl3 is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545385" version="1" comment="libfreebl3-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550216" version="1" comment="libfreebl3-hmac is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545387" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550217" version="1" comment="libsoftokn3 is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545389" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550218" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545391" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550219" version="1" comment="mozilla-nspr is &lt;4.13.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545393" version="1" comment="mozilla-nspr-32bit is &lt;4.13.1-18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550220" version="1" comment="mozilla-nss is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545395" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550221" version="1" comment="mozilla-nss-certs is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545397" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550222" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545399" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550223" version="1" comment="mozilla-nss-tools is &lt;3.29.5-57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549825" version="1" comment="cpio is &lt;2.11-32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517073" version="1" comment="cpio-lang is &lt;2.11-32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594289" version="1" comment="ruby2.1-rubygem-actionmailer-4_2 is &lt;4.2.9-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594290" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594291" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594292" version="1" comment="ruby2.1-rubygem-activejob-4_2 is &lt;4.2.9-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594293" version="1" comment="ruby2.1-rubygem-activemodel-4_2 is &lt;4.2.9-6.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594294" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is &lt;4.2.9-6.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594295" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594296" version="1" comment="ruby2.1-rubygem-rails-4_2 is &lt;4.2.9-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594297" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.3-8.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594298" version="1" comment="ruby2.1-rubygem-railties-4_2 is &lt;4.2.9-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549321" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549278" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549279" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549280" version="1" comment="libdcerpc0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549281" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549282" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549283" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549284" version="1" comment="libndr-nbt0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549285" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549286" version="1" comment="libndr-standard0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549287" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549288" version="1" comment="libndr0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549289" version="1" comment="libndr0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549290" version="1" comment="libnetapi0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549291" version="1" comment="libnetapi0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549292" version="1" comment="libsamba-credentials0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549293" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549294" version="1" comment="libsamba-errors0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549295" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549296" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549297" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549298" version="1" comment="libsamba-passdb0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549299" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549300" version="1" comment="libsamba-util0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549301" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549302" version="1" comment="libsamdb0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549303" version="1" comment="libsamdb0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549304" version="1" comment="libsmbclient0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549305" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549306" version="1" comment="libsmbconf0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549307" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549308" version="1" comment="libsmbldap0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549309" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549310" version="1" comment="libtevent-util0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549311" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549312" version="1" comment="libwbclient0 is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549313" version="1" comment="libwbclient0-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549314" version="1" comment="samba is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549315" version="1" comment="samba-client is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549316" version="1" comment="samba-client-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517588" version="1" comment="samba-doc is &lt;4.4.2-31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549317" version="1" comment="samba-libs is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549318" version="1" comment="samba-libs-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549319" version="1" comment="samba-winbind is &lt;4.4.2-31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549320" version="1" comment="samba-winbind-32bit is &lt;4.4.2-31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655206" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655207" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655208" version="1" comment="libdcerpc0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655209" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655210" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655211" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655212" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655213" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655214" version="1" comment="libndr-standard0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655215" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655216" version="1" comment="libndr0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655217" version="1" comment="libndr0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655218" version="1" comment="libnetapi0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655219" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655220" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655221" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655222" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655223" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655224" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655225" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655226" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655227" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655228" version="1" comment="libsamba-util0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655229" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655230" version="1" comment="libsamdb0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655231" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655232" version="1" comment="libsmbclient0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655233" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655234" version="1" comment="libsmbconf0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655235" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655236" version="1" comment="libsmbldap0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655237" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655238" version="1" comment="libtevent-util0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655239" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655240" version="1" comment="libwbclient0 is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655241" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655242" version="1" comment="samba is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655243" version="1" comment="samba-client is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655244" version="1" comment="samba-client-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655245" version="1" comment="samba-doc is &lt;4.4.2-38.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655246" version="1" comment="samba-libs is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655247" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655248" version="1" comment="samba-winbind is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655249" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549986" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.131-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549987" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.131-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549988" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.131-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549989" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.131-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545314" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534345" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545315" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534348" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547888" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.1-26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547889" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547890" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.1-26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549756" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549757" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549758" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549759" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549494" version="1" comment="libquicktime0 is &lt;1.2.4-14.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334388" version="1" comment="python-Django is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595130" version="1" comment="python-Pillow is &lt;2.8.1-4.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550136" version="1" comment="bind is &lt;9.9.9P1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550137" version="1" comment="bind-chrootenv is &lt;9.9.9P1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532836" version="1" comment="bind-doc is &lt;9.9.9P1-59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550138" version="1" comment="bind-libs is &lt;9.9.9P1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547968" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550139" version="1" comment="bind-utils is &lt;9.9.9P1-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522293" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530726" version="1" comment="MozillaFirefox-devel is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522294" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548768" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548769" version="1" comment="MozillaFirefox-devel is &lt;68.2.0-109.95.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548770" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595240" version="1" comment="MozillaFirefox is &lt;68.2.0-109.95.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595241" version="1" comment="MozillaFirefox-devel is &lt;68.2.0-109.95.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595242" version="1" comment="MozillaFirefox-translations-common is &lt;68.2.0-109.95.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124478" version="1" comment="libotr5 is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594745" version="1" comment="python-Pillow is &lt;2.8.1-4.3.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521995" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530594" version="1" comment="bzip2-doc is &lt;1.0.6-30.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521996" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521997" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548654" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548655" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548656" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595031" version="1" comment="bzip2 is &lt;1.0.6-30.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595032" version="1" comment="libbz2-1 is &lt;1.0.6-30.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549204" version="1" comment="libmysqlclient18 is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547200" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549205" version="1" comment="mariadb is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549206" version="1" comment="mariadb-client is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549207" version="1" comment="mariadb-errormessages is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549208" version="1" comment="mariadb-tools is &lt;10.0.28-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549888" version="1" comment="libxml2-2 is &lt;2.9.4-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549889" version="1" comment="libxml2-2-32bit is &lt;2.9.4-33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532625" version="1" comment="libxml2-doc is &lt;2.9.4-33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549890" version="1" comment="libxml2-tools is &lt;2.9.4-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549891" version="1" comment="python-libxml2 is &lt;2.9.4-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550451" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550452" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550453" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550454" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550455" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.5-2.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550962" version="1" comment="openslp is &lt;2.0.0-18.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550963" version="1" comment="openslp-32bit is &lt;2.0.0-18.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550964" version="1" comment="openslp-server is &lt;2.0.0-18.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530249" version="1" comment="apache2 is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530250" version="1" comment="apache2-doc is &lt;2.4.23-29.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530251" version="1" comment="apache2-example-pages is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530252" version="1" comment="apache2-prefork is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530253" version="1" comment="apache2-utils is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530254" version="1" comment="apache2-worker is &lt;2.4.23-29.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550538" version="1" comment="apache2 is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550539" version="1" comment="apache2-example-pages is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550540" version="1" comment="apache2-prefork is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550541" version="1" comment="apache2-utils is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550542" version="1" comment="apache2-worker is &lt;2.4.23-29.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594565" version="1" comment="apache2 is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594566" version="1" comment="apache2-example-pages is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594567" version="1" comment="apache2-prefork is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594568" version="1" comment="apache2-utils is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594569" version="1" comment="apache2-worker is &lt;2.4.23-29.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549200" version="1" comment="dovecot22 is &lt;2.2.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549201" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549202" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549203" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549826" version="1" comment="ceph-common is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549827" version="1" comment="libcephfs1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549828" version="1" comment="librados2 is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549829" version="1" comment="libradosstriper1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549830" version="1" comment="librbd1 is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549831" version="1" comment="python-cephfs is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549832" version="1" comment="python-rados is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549833" version="1" comment="python-rbd is &lt;10.2.4+git.1481215985.12b091b-16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549217" version="1" comment="libblkid1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549218" version="1" comment="libblkid1-32bit is &lt;2.28-42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549219" version="1" comment="libfdisk1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549220" version="1" comment="libmount1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549221" version="1" comment="libmount1-32bit is &lt;2.28-42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549222" version="1" comment="libsmartcols1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549223" version="1" comment="libuuid1 is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549224" version="1" comment="libuuid1-32bit is &lt;2.28-42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549225" version="1" comment="python-libmount is &lt;2.28-42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549226" version="1" comment="util-linux is &lt;2.28-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517525" version="1" comment="util-linux-lang is &lt;2.28-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549227" version="1" comment="util-linux-systemd is &lt;2.28-42.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549228" version="1" comment="uuidd is &lt;2.28-42.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140975" version="1" comment="libusbmuxd4 is &lt;1.0.10-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550651" version="1" comment="libxml2-2 is &lt;2.9.4-46.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550652" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533151" version="1" comment="libxml2-doc is &lt;2.9.4-46.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550653" version="1" comment="libxml2-tools is &lt;2.9.4-46.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550654" version="1" comment="python-libxml2 is &lt;2.9.4-46.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549322" version="1" comment="libcares2 is &lt;1.9.1-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334390" version="1" comment="nodejs6 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549233" version="1" comment="MozillaFirefox is &lt;45.5.0esr-88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549234" version="1" comment="MozillaFirefox-translations is &lt;45.5.0esr-88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549235" version="1" comment="libfreebl3 is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544426" version="1" comment="libfreebl3-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549236" version="1" comment="libfreebl3-hmac is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544428" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549237" version="1" comment="libsoftokn3 is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544430" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549238" version="1" comment="libsoftokn3-hmac is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544432" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549239" version="1" comment="mozilla-nss is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544434" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549240" version="1" comment="mozilla-nss-certs is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544436" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549241" version="1" comment="mozilla-nss-sysinit is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544438" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.3-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549242" version="1" comment="mozilla-nss-tools is &lt;3.21.3-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333936" version="1" comment="MozillaFirefox is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140574" version="1" comment="fontconfig is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140575" version="1" comment="fontconfig-32bit is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549163" version="1" comment="libX11-6 is &lt;1.6.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549164" version="1" comment="libX11-6-32bit is &lt;1.6.2-8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517486" version="1" comment="libX11-data is &lt;1.6.2-8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549165" version="1" comment="libX11-xcb1 is &lt;1.6.2-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549166" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549167" version="1" comment="libXfixes3 is &lt;5.0.1-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549168" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549169" version="1" comment="libXi6 is &lt;1.7.4-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549170" version="1" comment="libXi6-32bit is &lt;1.7.4-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549171" version="1" comment="libXrender1 is &lt;0.9.8-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549172" version="1" comment="libXrender1-32bit is &lt;0.9.8-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549173" version="1" comment="libXtst6 is &lt;1.2.2-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549174" version="1" comment="libXtst6-32bit is &lt;1.2.2-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549175" version="1" comment="libXv1 is &lt;1.0.10-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549176" version="1" comment="libXv1-32bit is &lt;1.0.10-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549177" version="1" comment="libXvMC1 is &lt;1.0.8-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549213" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549214" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.121-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549215" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.121-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549216" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-36.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544440" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-31.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534008" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544441" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-31.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534011" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547248" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.21-20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547249" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.21-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547250" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.21-20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549193" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549194" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.111-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549195" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.111-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549196" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547814" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.0-23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547815" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547816" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.0-23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140694" version="1" comment="kdump is &lt;0.8.15-28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549495" version="1" comment="libical1 is &lt;1.0.1-16.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549496" version="1" comment="libical1-32bit is &lt;1.0.1-16.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130774" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130775" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130776" version="1" comment="sqlite3 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519796" version="1" comment="shadow is &lt;4.2.1-27.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550436" version="1" comment="shadow is &lt;4.2.1-27.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594453" version="1" comment="shadow is &lt;4.2.1-27.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130930" version="1" comment="cracklib is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131013" version="1" comment="libcrack2 is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131014" version="1" comment="libcrack2-32bit is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549198" version="1" comment="tar is &lt;1.27.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516651" version="1" comment="tar-lang is &lt;1.27.1-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550437" version="1" comment="libexif12 is &lt;0.6.21-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550438" version="1" comment="libexif12-32bit is &lt;0.6.21-8.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531005" version="1" comment="libexif12 is &lt;0.6.22-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531006" version="1" comment="libexif12-32bit is &lt;0.6.22-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549007" version="1" comment="libexif12 is &lt;0.6.22-8.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549008" version="1" comment="libexif12-32bit is &lt;0.6.22-8.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595600" version="1" comment="libexif12 is &lt;0.6.22-8.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550378" version="1" comment="openvpn is &lt;2.3.8-16.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550379" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131107" version="1" comment="at is &lt;3.1.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131796" version="1" comment="flex is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131938" version="1" comment="flex-32bit is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131109" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131110" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131111" version="1" comment="libbonobo is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131112" version="1" comment="libbonobo-32bit is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131939" version="1" comment="libbonobo-doc is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131113" version="1" comment="libbonobo-lang is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131114" version="1" comment="libkde4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131115" version="1" comment="libkde4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131116" version="1" comment="libkdecore4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131117" version="1" comment="libkdecore4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131118" version="1" comment="libksuseinstall1 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131119" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131120" version="1" comment="libnetpbm11 is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131121" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550305" version="1" comment="libwireshark8 is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550306" version="1" comment="libwiretap6 is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550307" version="1" comment="libwscodecs1 is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550308" version="1" comment="libwsutil7 is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131122" version="1" comment="netpbm is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550309" version="1" comment="wireshark is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550310" version="1" comment="wireshark-gtk is &lt;2.2.6-44.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550320" version="1" comment="libhogweed2 is &lt;2.7.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550321" version="1" comment="libhogweed2-32bit is &lt;2.7.1-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550322" version="1" comment="libnettle4 is &lt;2.7.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550323" version="1" comment="libnettle4-32bit is &lt;2.7.1-12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549926" version="1" comment="libmysqlclient18 is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547795" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549927" version="1" comment="mariadb is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549928" version="1" comment="mariadb-client is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549929" version="1" comment="mariadb-errormessages is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549930" version="1" comment="mariadb-tools is &lt;10.0.29-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549211" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549212" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333988" version="1" comment="qemu is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549197" version="1" comment="sudo is &lt;1.8.10p3-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541126" version="1" comment="libopenssl-devel is &lt;1.0.2j-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549976" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549977" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549978" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549979" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549980" version="1" comment="openssl is &lt;1.0.2j-59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532709" version="1" comment="openssl-doc is &lt;1.0.2j-59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549275" version="1" comment="wget is &lt;1.14-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594273" version="1" comment="python-XStatic-jquery-ui is &lt;1.11.0.1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549183" version="1" comment="qemu is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532028" version="1" comment="qemu-arm is &lt;2.6.2-31.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549184" version="1" comment="qemu-block-curl is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549185" version="1" comment="qemu-block-rbd is &lt;2.6.2-31.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549186" version="1" comment="qemu-block-ssh is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549187" version="1" comment="qemu-guest-agent is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517506" version="1" comment="qemu-ipxe is &lt;1.0.0-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549188" version="1" comment="qemu-kvm is &lt;2.6.2-31.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549189" version="1" comment="qemu-lang is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549190" version="1" comment="qemu-ppc is &lt;2.6.2-31.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549191" version="1" comment="qemu-s390 is &lt;2.6.2-31.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517508" version="1" comment="qemu-seabios is &lt;1.9.1-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517509" version="1" comment="qemu-sgabios is &lt;8-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549192" version="1" comment="qemu-tools is &lt;2.6.2-31.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517511" version="1" comment="qemu-vgabios is &lt;1.9.1-31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517512" version="1" comment="qemu-x86 is &lt;2.6.2-31.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135211" version="1" comment="curl is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135212" version="1" comment="libcurl4 is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135213" version="1" comment="libcurl4-32bit is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594740" version="1" comment="python-Django is &lt;1.8.19-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594320" version="1" comment="openstack-magnum is &lt;3.1.2~a0~dev20-9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594321" version="1" comment="openstack-magnum-api is &lt;3.1.2~a0~dev20-9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594322" version="1" comment="openstack-magnum-conductor is &lt;3.1.2~a0~dev20-9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594323" version="1" comment="openstack-magnum-doc is &lt;3.1.2~a0~dev20-9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594324" version="1" comment="python-magnum is &lt;3.1.2~a0~dev20-9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549762" version="1" comment="gnutls is &lt;3.2.15-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549763" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549764" version="1" comment="libgnutls28 is &lt;3.2.15-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547668" version="1" comment="libgnutls28-32bit is &lt;3.2.15-16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549277" version="1" comment="libopenjp2-7 is &lt;2.1.0-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549817" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549818" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549751" version="1" comment="policycoreutils is &lt;2.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549752" version="1" comment="policycoreutils-python is &lt;2.5-6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517535" version="1" comment="xen is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549253" version="1" comment="xen-doc-html is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517536" version="1" comment="xen-libs is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517537" version="1" comment="xen-libs-32bit is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549254" version="1" comment="xen-tools is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549255" version="1" comment="xen-tools-domU is &lt;4.7.1_02-25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549231" version="1" comment="libX11-6 is &lt;1.6.2-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547226" version="1" comment="libX11-6-32bit is &lt;1.6.2-11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009516697" version="1" comment="libX11-data is &lt;1.6.2-11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549232" version="1" comment="libX11-xcb1 is &lt;1.6.2-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547228" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549243" version="1" comment="libXi6 is &lt;1.7.4-17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547236" version="1" comment="libXi6-32bit is &lt;1.7.4-17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333947" version="1" comment="wireshark is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549256" version="1" comment="libass5 is &lt;0.10.2-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333992" version="1" comment="mariadb is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549892" version="1" comment="guile is &lt;2.0.9-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549893" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549894" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594527" version="1" comment="crowbar is &lt;4.0+git.1528801103.f5708341-7.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594528" version="1" comment="crowbar-core is &lt;4.0+git.1534246408.3ab19c567-9.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594529" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1534246408.3ab19c567-9.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594530" version="1" comment="crowbar-devel is &lt;4.0+git.1528801103.f5708341-7.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594531" version="1" comment="crowbar-ha is &lt;4.0+git.1533750802.5768e73-4.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596123" version="1" comment="crowbar-openstack is &lt;4.0+git.1604938545.30c10db18-9.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594533" version="1" comment="crowbar-ui is &lt;1.1.0+git.1533844061.4ac8e723-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596124" version="1" comment="grafana is &lt;6.7.4-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596125" version="1" comment="influxdb is &lt;1.2.4-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596126" version="1" comment="python-urllib3 is &lt;1.16-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549246" version="1" comment="kernel-default is &lt;4.4.21-84.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549247" version="1" comment="kernel-default-base is &lt;4.4.21-84.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549248" version="1" comment="kernel-default-devel is &lt;4.4.21-84.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549249" version="1" comment="kernel-default-man is &lt;4.4.21-84.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517531" version="1" comment="kernel-devel is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517532" version="1" comment="kernel-macros is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517533" version="1" comment="kernel-source is &lt;4.4.21-84.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549250" version="1" comment="kernel-syms is &lt;4.4.21-84.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530501" version="1" comment="kernel-default is &lt;4.4.121-92.109.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530502" version="1" comment="kernel-default-base is &lt;4.4.121-92.109.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530503" version="1" comment="kernel-default-devel is &lt;4.4.121-92.109.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530504" version="1" comment="kernel-devel is &lt;4.4.121-92.109.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530505" version="1" comment="kernel-macros is &lt;4.4.121-92.109.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530506" version="1" comment="kernel-source is &lt;4.4.121-92.109.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530507" version="1" comment="kernel-syms is &lt;4.4.121-92.109.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530508" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;1-3.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551089" version="1" comment="kernel-default is &lt;4.4.121-92.109.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551090" version="1" comment="kernel-default-base is &lt;4.4.121-92.109.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551091" version="1" comment="kernel-default-devel is &lt;4.4.121-92.109.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551092" version="1" comment="kernel-default-man is &lt;4.4.121-92.109.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551093" version="1" comment="kernel-syms is &lt;4.4.121-92.109.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536864" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;1-3.5.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594858" version="1" comment="kernel-default is &lt;4.4.121-92.109.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594859" version="1" comment="kernel-default-base is &lt;4.4.121-92.109.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594860" version="1" comment="kernel-default-devel is &lt;4.4.121-92.109.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594861" version="1" comment="kernel-syms is &lt;4.4.121-92.109.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550114" version="1" comment="dracut is &lt;044-108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550115" version="1" comment="dracut-fips is &lt;044-108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549990" version="1" comment="libjasper1 is &lt;1.900.14-184.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547836" version="1" comment="libjasper1-32bit is &lt;1.900.14-184.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334021" version="1" comment="memcached is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550359" version="1" comment="apache2 is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533029" version="1" comment="apache2-doc is &lt;2.4.23-16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550360" version="1" comment="apache2-example-pages is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550361" version="1" comment="apache2-prefork is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550362" version="1" comment="apache2-utils is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550363" version="1" comment="apache2-worker is &lt;2.4.23-16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532890" version="1" comment="tomcat is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532891" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532892" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532893" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532894" version="1" comment="tomcat-javadoc is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532895" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532896" version="1" comment="tomcat-lib is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532897" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532898" version="1" comment="tomcat-webapps is &lt;8.0.43-23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549156" version="1" comment="bind is &lt;9.9.9P1-49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549157" version="1" comment="bind-chrootenv is &lt;9.9.9P1-49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532008" version="1" comment="bind-doc is &lt;9.9.9P1-49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549158" version="1" comment="bind-libs is &lt;9.9.9P1-49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547150" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549159" version="1" comment="bind-utils is &lt;9.9.9P1-49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561943" version="1" comment="python-PyJWT is &lt;1.4.2-3.10.27 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561946" version="1" comment="python-oauthlib is &lt;0.7.2-3.9.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561948" version="1" comment="python-rsa is &lt;3.1.4-12.9.17 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009561941" version="1" comment="python-setuptools is &lt;40.6.2-4.12.23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550166" version="1" comment="ntp is &lt;4.2.8p10-60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550167" version="1" comment="ntp-doc is &lt;4.2.8p10-60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549585" version="1" comment="expat is &lt;2.1.0-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549586" version="1" comment="libexpat1 is &lt;2.1.0-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549587" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549244" version="1" comment="MozillaFirefox is &lt;45.5.1esr-93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549245" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549363" version="1" comment="libcairo-gobject2 is &lt;1.15.2-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549364" version="1" comment="libcairo-gobject2-32bit is &lt;1.15.2-24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549365" version="1" comment="libcairo-script-interpreter2 is &lt;1.15.2-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549366" version="1" comment="libcairo2 is &lt;1.15.2-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549367" version="1" comment="libcairo2-32bit is &lt;1.15.2-24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550190" version="1" comment="qemu is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532879" version="1" comment="qemu-arm is &lt;2.6.2-39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550191" version="1" comment="qemu-block-curl is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550192" version="1" comment="qemu-block-rbd is &lt;2.6.2-39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550193" version="1" comment="qemu-block-ssh is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550194" version="1" comment="qemu-guest-agent is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518612" version="1" comment="qemu-ipxe is &lt;1.0.0-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550195" version="1" comment="qemu-kvm is &lt;2.6.2-39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550196" version="1" comment="qemu-lang is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550197" version="1" comment="qemu-ppc is &lt;2.6.2-39.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550198" version="1" comment="qemu-s390 is &lt;2.6.2-39.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518614" version="1" comment="qemu-seabios is &lt;1.9.1-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518615" version="1" comment="qemu-sgabios is &lt;8-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550199" version="1" comment="qemu-tools is &lt;2.6.2-39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518617" version="1" comment="qemu-vgabios is &lt;1.9.1-39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518618" version="1" comment="qemu-x86 is &lt;2.6.2-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550108" version="1" comment="bind is &lt;9.9.9P1-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550109" version="1" comment="bind-chrootenv is &lt;9.9.9P1-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532810" version="1" comment="bind-doc is &lt;9.9.9P1-53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550110" version="1" comment="bind-libs is &lt;9.9.9P1-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547951" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-53.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550111" version="1" comment="bind-utils is &lt;9.9.9P1-53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531924" version="1" comment="perl-XML-Twig is &lt;3.44-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594997" version="1" comment="python-Pillow is &lt;2.8.1-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549487" version="1" comment="libjasper1 is &lt;1.900.14-195.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549488" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338821" version="1" comment="ntp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334023" version="1" comment="jasper is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550226" version="1" comment="bash is &lt;4.3-82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518627" version="1" comment="bash-doc is &lt;4.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550227" version="1" comment="libreadline6 is &lt;6.3-82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550228" version="1" comment="libreadline6-32bit is &lt;6.3-82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518631" version="1" comment="readline-doc is &lt;6.3-82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549252" version="1" comment="libgc1 is &lt;7.2d-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549251" version="1" comment="w3m is &lt;0.5.3.git20161120-160.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549324" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517595" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549325" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549326" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549327" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549328" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549329" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549330" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549323" version="1" comment="libgstegl-1_0-0 is &lt;1.2.4-3.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549331" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549332" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549333" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009540821" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549257" version="1" comment="kernel-default is &lt;4.4.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549258" version="1" comment="kernel-default-base is &lt;4.4.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549259" version="1" comment="kernel-default-devel is &lt;4.4.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549260" version="1" comment="kernel-default-man is &lt;4.4.21-90.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517541" version="1" comment="kernel-devel is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517542" version="1" comment="kernel-macros is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517543" version="1" comment="kernel-source is &lt;4.4.21-90.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549261" version="1" comment="kernel-syms is &lt;4.4.21-90.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518386" version="1" comment="libspice-server1 is &lt;0.12.7-8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550162" version="1" comment="curl is &lt;7.37.0-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550163" version="1" comment="libcurl4 is &lt;7.37.0-36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547995" version="1" comment="libcurl4-32bit is &lt;7.37.0-36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594299" version="1" comment="ansible is &lt;2.2.3.0-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594300" version="1" comment="monasca-installer is &lt;20170912_10.45-5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333977" version="1" comment="curl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334009" version="1" comment="libxml2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518050" version="1" comment="xen is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549592" version="1" comment="xen-doc-html is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518051" version="1" comment="xen-libs is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518052" version="1" comment="xen-libs-32bit is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549593" version="1" comment="xen-tools is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549594" version="1" comment="xen-tools-domU is &lt;4.7.3_03-43.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549336" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517607" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333958" version="1" comment="bind is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334185" version="1" comment="bluez is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549501" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549340" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517611" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-9.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549341" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549502" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549342" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549343" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549344" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549345" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549346" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549503" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549347" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549348" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549349" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549350" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549351" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549352" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549353" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549354" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549355" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-9.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549356" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-9.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545406" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.5-37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534521" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545407" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.5-37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534524" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.5-37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548074" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.5-29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548075" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.5-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548076" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.5-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549906" version="1" comment="libz1 is &lt;1.2.8-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549907" version="1" comment="libz1-32bit is &lt;1.2.8-11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541078" version="1" comment="zlib-devel is &lt;1.2.8-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530616" version="1" comment="libmysqlclient18 is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530617" version="1" comment="libmysqlclient18-32bit is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530618" version="1" comment="mariadb is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530619" version="1" comment="mariadb-client is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530620" version="1" comment="mariadb-errormessages is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530621" version="1" comment="mariadb-tools is &lt;10.0.38-29.27.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548668" version="1" comment="libmysqlclient18 is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548669" version="1" comment="libmysqlclient18-32bit is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548673" version="1" comment="mariadb is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548674" version="1" comment="mariadb-client is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548675" version="1" comment="mariadb-errormessages is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548676" version="1" comment="mariadb-tools is &lt;10.0.38-29.27.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594920" version="1" comment="libmariadb3 is &lt;3.0.7-1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595049" version="1" comment="libmysqlclient18 is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594921" version="1" comment="mariadb is &lt;10.2.22-10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594922" version="1" comment="mariadb-client is &lt;10.2.22-10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594923" version="1" comment="mariadb-errormessages is &lt;10.2.22-10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594924" version="1" comment="mariadb-galera is &lt;10.2.22-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594925" version="1" comment="mariadb-tools is &lt;10.2.22-10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549270" version="1" comment="MozillaFirefox is &lt;45.6.0esr-96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549271" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518464" version="1" comment="xen is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550005" version="1" comment="xen-doc-html is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518465" version="1" comment="xen-libs is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518466" version="1" comment="xen-libs-32bit is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550006" version="1" comment="xen-tools is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550007" version="1" comment="xen-tools-domU is &lt;4.7.1_06-31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549269" version="1" comment="gd is &lt;2.1.0-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550844" version="1" comment="libvncclient0 is &lt;0.9.9-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550845" version="1" comment="libvncserver0 is &lt;0.9.9-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549272" version="1" comment="libgme0 is &lt;0.6.0-5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338941" version="1" comment="libwebp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549975" version="1" comment="libopus0 is &lt;1.1-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334008" version="1" comment="libvpx is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549371" version="1" comment="libxml2-2 is &lt;2.9.4-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549372" version="1" comment="libxml2-2-32bit is &lt;2.9.4-42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532185" version="1" comment="libxml2-doc is &lt;2.9.4-42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549373" version="1" comment="libxml2-tools is &lt;2.9.4-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549374" version="1" comment="python-libxml2 is &lt;2.9.4-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536761" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536760" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536768" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536769" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536770" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536763" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536762" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536765" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536764" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536759" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536758" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549951" version="1" comment="evince is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549952" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518422" version="1" comment="evince-lang is &lt;3.20.2-6.19.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549953" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549954" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549955" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549956" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549957" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549958" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549959" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549960" version="1" comment="libevview3-3 is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549961" version="1" comment="nautilus-evince is &lt;3.20.2-6.19.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549552" version="1" comment="curl is &lt;7.37.0-37.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549553" version="1" comment="libcurl4 is &lt;7.37.0-37.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549554" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549538" version="1" comment="kernel-default is &lt;4.4.74-92.35.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549539" version="1" comment="kernel-default-base is &lt;4.4.74-92.35.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549540" version="1" comment="kernel-default-devel is &lt;4.4.74-92.35.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549541" version="1" comment="kernel-default-man is &lt;4.4.74-92.35.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518008" version="1" comment="kernel-devel is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518009" version="1" comment="kernel-macros is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518010" version="1" comment="kernel-source is &lt;4.4.74-92.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549542" version="1" comment="kernel-syms is &lt;4.4.74-92.35.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009540949" version="1" comment="git-core is &lt;2.12.3-27.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532374" version="1" comment="git-doc is &lt;2.12.3-27.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334025" version="1" comment="webkitgtk3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333963" version="1" comment="exiv2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549668" version="1" comment="tcmu-runner is &lt;1.0.4-3.3.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338947" version="1" comment="tcmu-runner is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596445" version="1" comment="ansible is &lt;2.2.3.0-12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596446" version="1" comment="crowbar-core is &lt;4.0+git.1580209654.1d112d31f-9.66.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596447" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1580209654.1d112d31f-9.66.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596448" version="1" comment="crowbar-ha is &lt;4.0+git.1585316203.d6ad2c8-4.52.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596449" version="1" comment="crowbar-openstack is &lt;4.0+git.1589804581.9972163f0-9.71.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596450" version="1" comment="grafana is &lt;4.6.5-1.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596451" version="1" comment="keepalived is &lt;2.0.19-1.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596452" version="1" comment="kibana is &lt;4.6.3-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596453" version="1" comment="memcached is &lt;1.5.17-3.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596454" version="1" comment="monasca-installer is &lt;20180608_12.47-12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596455" version="1" comment="openstack-dashboard-theme-SUSE is &lt;2016.2-5.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596456" version="1" comment="openstack-manila is &lt;3.0.1~dev30-4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596457" version="1" comment="openstack-manila-api is &lt;3.0.1~dev30-4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596458" version="1" comment="openstack-manila-data is &lt;3.0.1~dev30-4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596459" version="1" comment="openstack-manila-doc is &lt;3.0.1~dev30-4.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596460" version="1" comment="openstack-manila-scheduler is &lt;3.0.1~dev30-4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596461" version="1" comment="openstack-manila-share is &lt;3.0.1~dev30-4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596462" version="1" comment="openstack-neutron-fwaas is &lt;9.0.2~dev5-4.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596463" version="1" comment="openstack-neutron-fwaas-doc is &lt;9.0.2~dev5-4.9.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596464" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596465" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596466" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596467" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596468" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596469" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596470" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596471" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596472" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596473" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596474" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596475" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596476" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596477" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596478" version="1" comment="openstack-tempest is &lt;12.2.1~a0~dev177-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596479" version="1" comment="openstack-tempest-test is &lt;12.2.1~a0~dev177-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596480" version="1" comment="python-Django is &lt;1.8.19-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596481" version="1" comment="python-Pillow is &lt;2.8.1-4.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596482" version="1" comment="python-manila is &lt;3.0.1~dev30-4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596483" version="1" comment="python-neutron-fwaas is &lt;9.0.2~dev5-4.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596484" version="1" comment="python-nova is &lt;14.0.11~dev13-4.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596485" version="1" comment="python-psql2mysql is &lt;0.5.0+git.1589351878.4ef877c-1.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596486" version="1" comment="python-psutil is &lt;1.2.1-21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596487" version="1" comment="python-py is &lt;1.8.1-11.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596488" version="1" comment="python-pysaml2 is &lt;4.0.2-3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596489" version="1" comment="python-tempest is &lt;12.2.1~a0~dev177-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596490" version="1" comment="python-waitress is &lt;1.4.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596491" version="1" comment="rabbitmq-server is &lt;3.4.4-3.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596492" version="1" comment="rabbitmq-server-plugins is &lt;3.4.4-3.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596493" version="1" comment="release-notes-suse-openstack-cloud is &lt;7.20180803-3.18.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596494" version="1" comment="ruby2.1-rubygem-activeresource is &lt;4.0.0-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596495" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.2-7.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596496" version="1" comment="ruby2.1-rubygem-json-1_7 is &lt;1.7.7-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596497" version="1" comment="ruby2.1-rubygem-puma is &lt;2.16.0-4.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596498" version="1" comment="zookeeper-server is &lt;3.4.10-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334026" version="1" comment="file is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549637" version="1" comment="kernel-default is &lt;4.4.74-92.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549638" version="1" comment="kernel-default-base is &lt;4.4.74-92.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549639" version="1" comment="kernel-default-devel is &lt;4.4.74-92.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549640" version="1" comment="kernel-default-man is &lt;4.4.74-92.38.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518101" version="1" comment="kernel-devel is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518102" version="1" comment="kernel-macros is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518103" version="1" comment="kernel-source is &lt;4.4.74-92.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549641" version="1" comment="kernel-syms is &lt;4.4.74-92.38.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549775" version="1" comment="kernel-default is &lt;4.4.90-92.45.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549776" version="1" comment="kernel-default-base is &lt;4.4.90-92.45.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549777" version="1" comment="kernel-default-devel is &lt;4.4.90-92.45.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549778" version="1" comment="kernel-default-man is &lt;4.4.90-92.45.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518251" version="1" comment="kernel-devel is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518252" version="1" comment="kernel-macros is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518253" version="1" comment="kernel-source is &lt;4.4.90-92.45.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549779" version="1" comment="kernel-syms is &lt;4.4.90-92.45.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549753" version="1" comment="curl is &lt;7.37.0-37.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549754" version="1" comment="libcurl4 is &lt;7.37.0-37.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549755" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549392" version="1" comment="kernel-default is &lt;4.4.59-92.24.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549393" version="1" comment="kernel-default-base is &lt;4.4.59-92.24.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549394" version="1" comment="kernel-default-devel is &lt;4.4.59-92.24.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549395" version="1" comment="kernel-default-man is &lt;4.4.59-92.24.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517660" version="1" comment="kernel-devel is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517661" version="1" comment="kernel-macros is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517662" version="1" comment="kernel-source is &lt;4.4.59-92.24.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549396" version="1" comment="kernel-syms is &lt;4.4.59-92.24.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549457" version="1" comment="kernel-default is &lt;4.4.74-92.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549458" version="1" comment="kernel-default-base is &lt;4.4.74-92.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549459" version="1" comment="kernel-default-devel is &lt;4.4.74-92.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549460" version="1" comment="kernel-default-man is &lt;4.4.74-92.29.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517902" version="1" comment="kernel-devel is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517903" version="1" comment="kernel-macros is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517904" version="1" comment="kernel-source is &lt;4.4.74-92.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549461" version="1" comment="kernel-syms is &lt;4.4.74-92.29.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550364" version="1" comment="glibc is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550365" version="1" comment="glibc-32bit is &lt;2.22-61.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550366" version="1" comment="glibc-devel is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550367" version="1" comment="glibc-devel-32bit is &lt;2.22-61.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533036" version="1" comment="glibc-html is &lt;2.22-61.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518742" version="1" comment="glibc-i18ndata is &lt;2.22-61.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533037" version="1" comment="glibc-info is &lt;2.22-61.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550368" version="1" comment="glibc-locale is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550369" version="1" comment="glibc-locale-32bit is &lt;2.22-61.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550370" version="1" comment="glibc-profile is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550371" version="1" comment="glibc-profile-32bit is &lt;2.22-61.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550372" version="1" comment="nscd is &lt;2.22-61.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550311" version="1" comment="sudo is &lt;1.8.10p3-10.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549435" version="1" comment="sudo is &lt;1.8.10p3-10.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334342" version="1" comment="libffi-gcc5 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549441" version="1" comment="libcares2 is &lt;1.9.1-8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009526518" version="1" comment="nodejs-common is &lt;1.0-2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594271" version="1" comment="nodejs6 is &lt;6.11.1-11.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594738" version="1" comment="erlang is &lt;17.5.6-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594739" version="1" comment="erlang-epmd is &lt;17.5.6-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549913" version="1" comment="kernel-default is &lt;4.4.90-92.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549914" version="1" comment="kernel-default-base is &lt;4.4.90-92.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549915" version="1" comment="kernel-default-devel is &lt;4.4.90-92.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549916" version="1" comment="kernel-default-man is &lt;4.4.90-92.50.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518392" version="1" comment="kernel-devel is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518393" version="1" comment="kernel-macros is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518394" version="1" comment="kernel-source is &lt;4.4.90-92.50.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549917" version="1" comment="kernel-syms is &lt;4.4.90-92.50.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550834" version="1" comment="glibc is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550835" version="1" comment="glibc-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550836" version="1" comment="glibc-devel is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550837" version="1" comment="glibc-devel-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533280" version="1" comment="glibc-html is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519059" version="1" comment="glibc-i18ndata is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533281" version="1" comment="glibc-info is &lt;2.22-62.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550838" version="1" comment="glibc-locale is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550839" version="1" comment="glibc-locale-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550840" version="1" comment="glibc-profile is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550841" version="1" comment="glibc-profile-32bit is &lt;2.22-62.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550842" version="1" comment="nscd is &lt;2.22-62.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549946" version="1" comment="kernel-default is &lt;4.4.103-92.53.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549947" version="1" comment="kernel-default-base is &lt;4.4.103-92.53.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549948" version="1" comment="kernel-default-devel is &lt;4.4.103-92.53.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549949" version="1" comment="kernel-default-man is &lt;4.4.103-92.53.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518416" version="1" comment="kernel-devel is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518417" version="1" comment="kernel-macros is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518418" version="1" comment="kernel-source is &lt;4.4.103-92.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549950" version="1" comment="kernel-syms is &lt;4.4.103-92.53.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594926" version="1" comment="caasp-openstack-heat-templates is &lt;1.0+git.1553079189.3bf8922-1.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594927" version="1" comment="crowbar is &lt;4.0+git.1551088848.823bcaa3-7.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594928" version="1" comment="crowbar-core is &lt;4.0+git.1556285635.ab602dd4d-9.46.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594929" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1556285635.ab602dd4d-9.46.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594930" version="1" comment="crowbar-devel is &lt;4.0+git.1551088848.823bcaa3-7.29.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594931" version="1" comment="crowbar-ha is &lt;4.0+git.1556181005.47c643d-4.46.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594932" version="1" comment="crowbar-openstack is &lt;4.0+git.1554887450.ff7c30c1c-9.51.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594933" version="1" comment="galera-python-clustercheck is &lt;0.0+git.1506329536.8f5878c-1.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594934" version="1" comment="openstack-ceilometer is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594935" version="1" comment="openstack-ceilometer-agent-central is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594936" version="1" comment="openstack-ceilometer-agent-compute is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594937" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594938" version="1" comment="openstack-ceilometer-agent-notification is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594939" version="1" comment="openstack-ceilometer-api is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594940" version="1" comment="openstack-ceilometer-collector is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594941" version="1" comment="openstack-ceilometer-doc is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594942" version="1" comment="openstack-ceilometer-polling is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594943" version="1" comment="openstack-heat-gbp is &lt;5.1.1~dev1-2.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594944" version="1" comment="python-PyKMIP is &lt;0.5.0-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594945" version="1" comment="python-ceilometer is &lt;7.1.1~dev4-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594946" version="1" comment="python-heat-gbp is &lt;5.1.1~dev1-2.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594947" version="1" comment="python-pysaml2 is &lt;4.0.2-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594948" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.0-7.14.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550749" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550750" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595300" version="1" comment="caasp-openstack-heat-templates is &lt;1.0+git.1560518045.ad7dc6d-1.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595301" version="1" comment="crowbar-core is &lt;4.0+git.1573109906.0f62e9503-9.57.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595302" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1573109906.0f62e9503-9.57.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595303" version="1" comment="crowbar-openstack is &lt;4.0+git.1573038068.1e32b3205-9.62.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595304" version="1" comment="crowbar-ui is &lt;1.1.0+git.1547500033.d0fb2bf2-4.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595305" version="1" comment="galera-3-wsrep-provider is &lt;25.3.25-11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595306" version="1" comment="libmariadb3 is &lt;3.1.2-1.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595307" version="1" comment="mariadb is &lt;10.2.25-13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595308" version="1" comment="mariadb-client is &lt;10.2.25-13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595309" version="1" comment="mariadb-errormessages is &lt;10.2.25-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595310" version="1" comment="mariadb-galera is &lt;10.2.25-13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595311" version="1" comment="mariadb-tools is &lt;10.2.25-13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595312" version="1" comment="openstack-dashboard-theme-SUSE is &lt;2016.2-5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595313" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1515995585.81ed236-12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595314" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595315" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595316" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595317" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595318" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595319" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595320" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595321" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595322" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595323" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595324" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595325" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595326" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595327" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595328" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595329" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595330" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595331" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595332" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595333" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.37.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595334" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595335" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595336" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595337" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595338" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595339" version="1" comment="patterns-cloud-admin is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595340" version="1" comment="patterns-cloud-compute is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595341" version="1" comment="patterns-cloud-controller is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595342" version="1" comment="patterns-cloud-network is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595343" version="1" comment="patterns-cloud-user is &lt;20170124-4.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595344" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.35.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595345" version="1" comment="python-nova is &lt;14.0.11~dev13-4.37.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595346" version="1" comment="python-oslo.messaging is &lt;5.10.2-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595347" version="1" comment="python-oslo.utils is &lt;3.16.1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595348" version="1" comment="python-pysaml2 is &lt;4.0.2-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595267" version="1" comment="ruby2.1-rubygem-haml is &lt;4.0.6-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544971" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.10-38.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534249" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.10-38.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544972" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.10-38.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534252" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.10-38.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547589" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.10-30.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534735" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.10-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009534737" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.10-30.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549555" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549556" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549557" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549558" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.144-27.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550627" version="1" comment="libmysqlclient18 is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550628" version="1" comment="libmysqlclient18-32bit is &lt;10.0.33-29.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550629" version="1" comment="mariadb is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550630" version="1" comment="mariadb-client is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550631" version="1" comment="mariadb-errormessages is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550632" version="1" comment="mariadb-tools is &lt;10.0.33-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594437" version="1" comment="galera-3-wsrep-provider is &lt;25.3.23-8.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594438" version="1" comment="libmariadb3 is &lt;3.0.3-1.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594439" version="1" comment="mariadb is &lt;10.2.15-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594440" version="1" comment="mariadb-client is &lt;10.2.15-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594441" version="1" comment="mariadb-errormessages is &lt;10.2.15-7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594442" version="1" comment="mariadb-galera is &lt;10.2.15-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594443" version="1" comment="mariadb-tools is &lt;10.2.15-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594444" version="1" comment="ruby2.1-rubygem-mysql2 is &lt;0.4.10-7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594445" version="1" comment="xtrabackup is &lt;2.4.10-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549786" version="1" comment="qemu is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532541" version="1" comment="qemu-arm is &lt;2.6.2-41.22.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549787" version="1" comment="qemu-block-curl is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549788" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.22.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549789" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549790" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518266" version="1" comment="qemu-ipxe is &lt;1.0.0-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549791" version="1" comment="qemu-kvm is &lt;2.6.2-41.22.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549792" version="1" comment="qemu-lang is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549793" version="1" comment="qemu-ppc is &lt;2.6.2-41.22.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549794" version="1" comment="qemu-s390 is &lt;2.6.2-41.22.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518268" version="1" comment="qemu-seabios is &lt;1.9.1-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518269" version="1" comment="qemu-sgabios is &lt;8-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549795" version="1" comment="qemu-tools is &lt;2.6.2-41.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518271" version="1" comment="qemu-vgabios is &lt;1.9.1-41.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518272" version="1" comment="qemu-x86 is &lt;2.6.2-41.22.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550988" version="1" comment="perl-XML-LibXML is &lt;2.0019-6.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549522" version="1" comment="libncurses5 is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549523" version="1" comment="libncurses5-32bit is &lt;5.9-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549524" version="1" comment="libncurses6 is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549525" version="1" comment="libncurses6-32bit is &lt;5.9-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009540903" version="1" comment="ncurses-devel is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549526" version="1" comment="ncurses-devel-32bit is &lt;5.9-50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549527" version="1" comment="ncurses-utils is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549528" version="1" comment="tack is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549529" version="1" comment="terminfo is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549530" version="1" comment="terminfo-base is &lt;5.9-50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530255" version="1" comment="gnutls is &lt;3.2.15-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530256" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530257" version="1" comment="libgnutls28 is &lt;3.2.15-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530258" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545806" version="1" comment="gnutls is &lt;3.2.15-18.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545807" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545808" version="1" comment="libgnutls28 is &lt;3.2.15-18.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545809" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594570" version="1" comment="gnutls is &lt;3.2.15-18.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594571" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594572" version="1" comment="libgnutls28 is &lt;3.2.15-18.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551002" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551003" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549462" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549463" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-74.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549564" version="1" comment="freeradius-server is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549565" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549566" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549567" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549568" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549569" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549570" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549571" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549572" version="1" comment="freeradius-server-python is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549573" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549574" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550590" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550591" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333940" version="1" comment="samba is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549765" version="1" comment="tcpdump is &lt;4.9.2-14.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550745" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550746" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334354" version="1" comment="gnome-session is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334055" version="1" comment="xorg-x11 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549543" version="1" comment="strongswan is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518013" version="1" comment="strongswan-doc is &lt;5.1.3-26.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549544" version="1" comment="strongswan-hmac is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549545" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549546" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549938" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549939" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338951" version="1" comment="vorbis-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549560" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549561" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549509" version="1" comment="libwireshark8 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549510" version="1" comment="libwiretap6 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549511" version="1" comment="libwscodecs1 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549512" version="1" comment="libwsutil7 is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549513" version="1" comment="wireshark is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549514" version="1" comment="wireshark-gtk is &lt;2.2.8-48.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549714" version="1" comment="krb5 is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549715" version="1" comment="krb5-32bit is &lt;1.12.5-40.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549716" version="1" comment="krb5-client is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549717" version="1" comment="krb5-doc is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549718" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549719" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549720" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549721" version="1" comment="krb5-server is &lt;1.12.5-40.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549531" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.18-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549532" version="1" comment="librsvg-2-2 is &lt;2.40.18-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549533" version="1" comment="librsvg-2-2-32bit is &lt;2.40.18-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549534" version="1" comment="rsvg-view is &lt;2.40.18-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339373" version="1" comment="kibana is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596325" version="1" comment="crowbar-openstack is &lt;4.0+git.1616146720.44daffca0-9.81.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596326" version="1" comment="grafana is &lt;6.7.4-1.24.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596327" version="1" comment="kibana is &lt;4.6.6-9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596328" version="1" comment="monasca-installer is &lt;20180608_12.47-16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596329" version="1" comment="python-Django is &lt;1.8.19-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596330" version="1" comment="python-py is &lt;1.8.1-11.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596331" version="1" comment="ruby2.1-rubygem-activerecord-session_store is &lt;0.1.2-3.4.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550910" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550911" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333975" version="1" comment="tcpdump is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536549" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530286" version="1" comment="cups-filters is &lt;1.0.58-15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530287" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530288" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530289" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-15.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520147" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530290" version="1" comment="qpdf is &lt;7.1.1-3.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545821" version="1" comment="cups-filters is &lt;1.0.58-15.2.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545822" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-15.2.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545823" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-15.2.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545824" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-15.2.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545825" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545826" version="1" comment="qpdf is &lt;7.1.1-3.3.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594603" version="1" comment="cups-filters is &lt;1.0.58-15.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594604" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-15.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594605" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-15.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594606" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-15.2.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594607" version="1" comment="libqpdf18 is &lt;7.1.1-3.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594608" version="1" comment="qpdf is &lt;7.1.1-3.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549642" version="1" comment="cpp48 is &lt;4.8.5-31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545006" version="1" comment="gcc48 is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545007" version="1" comment="gcc48-32bit is &lt;4.8.5-31.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545008" version="1" comment="gcc48-c++ is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518111" version="1" comment="gcc48-info is &lt;4.8.5-31.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545009" version="1" comment="gcc48-locale is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518112" version="1" comment="libasan0 is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518113" version="1" comment="libasan0-32bit is &lt;4.8.5-31.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545010" version="1" comment="libstdc++48-devel is &lt;4.8.5-31.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545011" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-31.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550701" version="1" comment="glibc is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550702" version="1" comment="glibc-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550703" version="1" comment="glibc-devel is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550704" version="1" comment="glibc-devel-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533165" version="1" comment="glibc-html is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518946" version="1" comment="glibc-i18ndata is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533166" version="1" comment="glibc-info is &lt;2.22-62.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550705" version="1" comment="glibc-locale is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550706" version="1" comment="glibc-locale-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550707" version="1" comment="glibc-profile is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550708" version="1" comment="glibc-profile-32bit is &lt;2.22-62.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550709" version="1" comment="nscd is &lt;2.22-62.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550759" version="1" comment="glibc is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550760" version="1" comment="glibc-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550761" version="1" comment="glibc-devel is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550762" version="1" comment="glibc-devel-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533214" version="1" comment="glibc-html is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519002" version="1" comment="glibc-i18ndata is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533215" version="1" comment="glibc-info is &lt;2.22-62.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550763" version="1" comment="glibc-locale is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550764" version="1" comment="glibc-locale-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550765" version="1" comment="glibc-profile is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550766" version="1" comment="glibc-profile-32bit is &lt;2.22-62.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550767" version="1" comment="nscd is &lt;2.22-62.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549820" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549671" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549672" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549673" version="1" comment="libdcerpc0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549674" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549675" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549676" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549677" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549678" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549679" version="1" comment="libndr-standard0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549680" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549681" version="1" comment="libndr0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549682" version="1" comment="libndr0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549683" version="1" comment="libnetapi0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549684" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549685" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549686" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549687" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549688" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549689" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549690" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549691" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549692" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549693" version="1" comment="libsamba-util0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549694" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549695" version="1" comment="libsamdb0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549696" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549697" version="1" comment="libsmbclient0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549698" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549699" version="1" comment="libsmbconf0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549700" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549701" version="1" comment="libsmbldap0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549702" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549703" version="1" comment="libtevent-util0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549704" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549705" version="1" comment="libwbclient0 is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549706" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549707" version="1" comment="samba is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549708" version="1" comment="samba-client is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549709" version="1" comment="samba-client-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518179" version="1" comment="samba-doc is &lt;4.4.2-38.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549710" version="1" comment="samba-libs is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549711" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549712" version="1" comment="samba-winbind is &lt;4.4.2-38.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549713" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334029" version="1" comment="gdm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549760" version="1" comment="openvpn is &lt;2.3.8-16.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549761" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550953" version="1" comment="postgresql94 is &lt;9.4.15-21.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550954" version="1" comment="postgresql94-contrib is &lt;9.4.15-21.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533368" version="1" comment="postgresql94-docs is &lt;9.4.15-21.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550955" version="1" comment="postgresql94-server is &lt;9.4.15-21.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334042" version="1" comment="postgresql-init is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549796" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549797" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549798" version="1" comment="libsss_sudo is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549799" version="1" comment="python-sssd-config is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549800" version="1" comment="sssd is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549801" version="1" comment="sssd-32bit is &lt;1.13.4-34.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549802" version="1" comment="sssd-ad is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549803" version="1" comment="sssd-ipa is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549804" version="1" comment="sssd-krb5 is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549805" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549806" version="1" comment="sssd-ldap is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549807" version="1" comment="sssd-proxy is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549808" version="1" comment="sssd-tools is &lt;1.13.4-34.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549838" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549839" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550506" version="1" comment="clamav is &lt;0.99.3-33.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549819" version="1" comment="shadow is &lt;4.2.1-27.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594281" version="1" comment="openstack-aodh is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594282" version="1" comment="openstack-aodh-api is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594283" version="1" comment="openstack-aodh-doc is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594284" version="1" comment="openstack-aodh-evaluator is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594285" version="1" comment="openstack-aodh-expirer is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594286" version="1" comment="openstack-aodh-listener is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594287" version="1" comment="openstack-aodh-notifier is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594288" version="1" comment="python-aodh is &lt;3.0.4~a0~dev1-2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334031" version="1" comment="libsndfile is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550439" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550440" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333979" version="1" comment="rsyslog is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550747" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550748" version="1" comment="openexr is &lt;2.1.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339374" version="1" comment="kafka is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532585" version="1" comment="tomcat is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532586" version="1" comment="tomcat-admin-webapps is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532587" version="1" comment="tomcat-docs-webapp is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532588" version="1" comment="tomcat-el-3_0-api is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532589" version="1" comment="tomcat-javadoc is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532590" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532591" version="1" comment="tomcat-lib is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532592" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532593" version="1" comment="tomcat-webapps is &lt;8.0.43-29.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541094" version="1" comment="libapr-util1 is &lt;1.5.3-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549925" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531170" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531171" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551593" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.3.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551594" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.3.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595706" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.3.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594494" version="1" comment="couchdb is &lt;1.7.2-2.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522656" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522657" version="1" comment="libpng16-16-32bit is &lt;1.6.8-15.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549087" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549088" version="1" comment="libpng16-16-32bit is &lt;1.6.8-15.5.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596221" version="1" comment="libpng16-16 is &lt;1.6.8-15.5.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334033" version="1" comment="taglib is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334114" version="1" comment="perl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549627" version="1" comment="cvs is &lt;1.12.12-182.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532408" version="1" comment="cvs-doc is &lt;1.12.12-182.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549842" version="1" comment="perl is &lt;5.18.2-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549843" version="1" comment="perl-32bit is &lt;5.18.2-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549844" version="1" comment="perl-base is &lt;5.18.2-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518322" version="1" comment="perl-doc is &lt;5.18.2-12.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334034" version="1" comment="libzip is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525305" version="1" comment="python-PyJWT is &lt;1.5.3-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549750" version="1" comment="wpa_supplicant is &lt;2.2-15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518323" version="1" comment="kernel-firmware is &lt;20170530-21.13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518324" version="1" comment="ucode-amd is &lt;20170530-21.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549780" version="1" comment="wget is &lt;1.14-21.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550818" version="1" comment="kernel-default is &lt;4.4.120-92.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550819" version="1" comment="kernel-default-base is &lt;4.4.120-92.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550820" version="1" comment="kernel-default-devel is &lt;4.4.120-92.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550821" version="1" comment="kernel-default-man is &lt;4.4.120-92.70.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519042" version="1" comment="kernel-devel is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519043" version="1" comment="kernel-macros is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519044" version="1" comment="kernel-source is &lt;4.4.120-92.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550822" version="1" comment="kernel-syms is &lt;4.4.120-92.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536459" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536458" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536465" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536464" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536735" version="1" comment="kgraft-patch-4_4_59-92_17-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536466" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536467" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536461" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536460" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536463" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536462" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536457" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536456" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550423" version="1" comment="libvpx1 is &lt;1.3.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530132" version="1" comment="kernel-default is &lt;4.4.121-92.85.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530133" version="1" comment="kernel-default-base is &lt;4.4.121-92.85.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530134" version="1" comment="kernel-default-devel is &lt;4.4.121-92.85.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530135" version="1" comment="kernel-devel is &lt;4.4.121-92.85.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530136" version="1" comment="kernel-macros is &lt;4.4.121-92.85.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530137" version="1" comment="kernel-source is &lt;4.4.121-92.85.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530138" version="1" comment="kernel-syms is &lt;4.4.121-92.85.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530139" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550418" version="1" comment="kernel-default is &lt;4.4.121-92.85.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550419" version="1" comment="kernel-default-base is &lt;4.4.121-92.85.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550420" version="1" comment="kernel-default-devel is &lt;4.4.121-92.85.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550421" version="1" comment="kernel-default-man is &lt;4.4.121-92.85.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550422" version="1" comment="kernel-syms is &lt;4.4.121-92.85.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594433" version="1" comment="kernel-default is &lt;4.4.121-92.85.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594434" version="1" comment="kernel-default-base is &lt;4.4.121-92.85.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594435" version="1" comment="kernel-default-devel is &lt;4.4.121-92.85.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594436" version="1" comment="kernel-syms is &lt;4.4.121-92.85.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530823" version="1" comment="qemu is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530824" version="1" comment="qemu-block-curl is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530825" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530826" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530827" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530828" version="1" comment="qemu-ipxe is &lt;1.0.0-41.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530829" version="1" comment="qemu-kvm is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530830" version="1" comment="qemu-lang is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530831" version="1" comment="qemu-seabios is &lt;1.9.1-41.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530832" version="1" comment="qemu-sgabios is &lt;8-41.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530833" version="1" comment="qemu-tools is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530834" version="1" comment="qemu-vgabios is &lt;1.9.1-41.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530835" version="1" comment="qemu-x86 is &lt;2.6.2-41.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551351" version="1" comment="qemu is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551352" version="1" comment="qemu-block-curl is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551353" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551354" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551355" version="1" comment="qemu-kvm is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551356" version="1" comment="qemu-lang is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537310" version="1" comment="qemu-ppc is &lt;2.6.2-41.49.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551357" version="1" comment="qemu-s390 is &lt;2.6.2-41.49.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551358" version="1" comment="qemu-tools is &lt;2.6.2-41.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595404" version="1" comment="qemu is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595405" version="1" comment="qemu-block-curl is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595406" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595407" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595408" version="1" comment="qemu-lang is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595409" version="1" comment="qemu-tools is &lt;2.6.2-41.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338972" version="1" comment="dnsmasq is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550587" version="1" comment="libXfont1 is &lt;1.5.1-11.3.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550549" version="1" comment="libncurses5 is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550550" version="1" comment="libncurses5-32bit is &lt;5.9-58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550551" version="1" comment="libncurses6 is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550552" version="1" comment="libncurses6-32bit is &lt;5.9-58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541322" version="1" comment="ncurses-devel is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550553" version="1" comment="ncurses-devel-32bit is &lt;5.9-58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550554" version="1" comment="ncurses-utils is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550555" version="1" comment="tack is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550556" version="1" comment="terminfo is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550557" version="1" comment="terminfo-base is &lt;5.9-58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549662" version="1" comment="liblouis-data is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549663" version="1" comment="liblouis9 is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549664" version="1" comment="python-louis is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549665" version="1" comment="python3-louis is &lt;2.6.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549653" version="1" comment="libwireshark8 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549654" version="1" comment="libwiretap6 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549655" version="1" comment="libwscodecs1 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549656" version="1" comment="libwsutil7 is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549657" version="1" comment="wireshark is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549658" version="1" comment="wireshark-gtk is &lt;2.2.9-48.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338973" version="1" comment="webkit2gtk3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549647" version="1" comment="libzip2 is &lt;0.11.1-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550592" version="1" comment="libsndfile1 is &lt;1.0.25-36.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550593" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.7.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518095" version="1" comment="xen is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549634" version="1" comment="xen-doc-html is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518096" version="1" comment="xen-libs is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518097" version="1" comment="xen-libs-32bit is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549635" version="1" comment="xen-tools is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549636" version="1" comment="xen-tools-domU is &lt;4.7.3_04-43.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549643" version="1" comment="emacs is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532420" version="1" comment="emacs-el is &lt;24.3-25.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518121" version="1" comment="emacs-info is &lt;24.3-25.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549644" version="1" comment="emacs-nox is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549645" version="1" comment="emacs-x11 is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549646" version="1" comment="etags is &lt;24.3-25.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549669" version="1" comment="dnsmasq is &lt;2.78-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594274" version="1" comment="dnsmasq-utils is &lt;2.78-18.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541472" version="1" comment="libpoppler44 is &lt;0.24.4-14.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533069" version="1" comment="libvorbis-doc is &lt;1.3.3-10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550445" version="1" comment="libvorbis0 is &lt;1.3.3-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550446" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550447" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550448" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550449" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550450" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549841" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549845" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549846" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549847" version="1" comment="libdcerpc0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549848" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549849" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549850" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549851" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549852" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549853" version="1" comment="libndr-standard0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549854" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549855" version="1" comment="libndr0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549856" version="1" comment="libndr0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549857" version="1" comment="libnetapi0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549858" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549859" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549860" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549861" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549862" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549863" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549864" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549865" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549866" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549867" version="1" comment="libsamba-util0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549868" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549869" version="1" comment="libsamdb0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549870" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549871" version="1" comment="libsmbclient0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549872" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549873" version="1" comment="libsmbconf0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549874" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549875" version="1" comment="libsmbldap0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549876" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549877" version="1" comment="libtevent-util0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549878" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549879" version="1" comment="libwbclient0 is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549880" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549881" version="1" comment="samba is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549882" version="1" comment="samba-client is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549883" version="1" comment="samba-client-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518364" version="1" comment="samba-doc is &lt;4.4.2-38.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549884" version="1" comment="samba-libs is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549885" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549886" version="1" comment="samba-winbind is &lt;4.4.2-38.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549887" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541021" version="1" comment="git-core is &lt;2.12.3-27.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532508" version="1" comment="git-doc is &lt;2.12.3-27.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594575" version="1" comment="nodejs6 is &lt;6.12.2-11.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334297" version="1" comment="poppler is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550583" version="1" comment="openvswitch is &lt;2.5.1-25.12.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550584" version="1" comment="openvswitch-dpdk is &lt;2.5.1-25.12.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550585" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.1-25.12.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550586" version="1" comment="openvswitch-switch is &lt;2.5.1-25.12.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334069" version="1" comment="binutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549809" version="1" comment="krb5 is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549810" version="1" comment="krb5-32bit is &lt;1.12.5-40.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549811" version="1" comment="krb5-client is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549812" version="1" comment="krb5-doc is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549813" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549814" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549815" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549816" version="1" comment="krb5-server is &lt;1.12.5-40.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549940" version="1" comment="libecpg6 is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549941" version="1" comment="libpq5 is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549942" version="1" comment="libpq5-32bit is &lt;9.6.6-3.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549943" version="1" comment="postgresql96 is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549944" version="1" comment="postgresql96-contrib is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532676" version="1" comment="postgresql96-docs is &lt;9.6.6-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549945" version="1" comment="postgresql96-server is &lt;9.6.6-3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334092" version="1" comment="liblouis is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594990" version="1" comment="dnsmasq-utils is &lt;2.78-18.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550606" version="1" comment="spice-vdagent is &lt;0.16.0-8.5.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550846" version="1" comment="qemu is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533289" version="1" comment="qemu-arm is &lt;2.6.2-41.37.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550847" version="1" comment="qemu-block-curl is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550848" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550849" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550850" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519065" version="1" comment="qemu-ipxe is &lt;1.0.0-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550851" version="1" comment="qemu-kvm is &lt;2.6.2-41.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550852" version="1" comment="qemu-lang is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550853" version="1" comment="qemu-ppc is &lt;2.6.2-41.37.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550854" version="1" comment="qemu-s390 is &lt;2.6.2-41.37.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519067" version="1" comment="qemu-seabios is &lt;1.9.1-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519068" version="1" comment="qemu-sgabios is &lt;8-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550855" version="1" comment="qemu-tools is &lt;2.6.2-41.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519070" version="1" comment="qemu-vgabios is &lt;1.9.1-41.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519071" version="1" comment="qemu-x86 is &lt;2.6.2-41.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550667" version="1" comment="kernel-default is &lt;4.4.114-92.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550668" version="1" comment="kernel-default-base is &lt;4.4.114-92.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550669" version="1" comment="kernel-default-devel is &lt;4.4.114-92.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550670" version="1" comment="kernel-default-man is &lt;4.4.114-92.64.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518886" version="1" comment="kernel-devel is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518887" version="1" comment="kernel-macros is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518888" version="1" comment="kernel-source is &lt;4.4.114-92.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550671" version="1" comment="kernel-syms is &lt;4.4.114-92.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530236" version="1" comment="dovecot22 is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530237" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530238" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530239" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545750" version="1" comment="dovecot22 is &lt;2.2.31-19.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545751" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545752" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545753" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594553" version="1" comment="dovecot22 is &lt;2.2.31-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594554" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594555" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594556" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338983" version="1" comment="xdg-user-dirs is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550717" version="1" comment="dovecot22 is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550718" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550719" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550720" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595457" version="1" comment="openstack-cinder is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595458" version="1" comment="openstack-cinder-api is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595459" version="1" comment="openstack-cinder-backup is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595460" version="1" comment="openstack-cinder-doc is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595461" version="1" comment="openstack-cinder-scheduler is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595462" version="1" comment="openstack-cinder-volume is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595463" version="1" comment="openstack-horizon-plugin-designate-ui is &lt;3.0.2~dev1-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595464" version="1" comment="openstack-neutron is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595465" version="1" comment="openstack-neutron-dhcp-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595466" version="1" comment="openstack-neutron-doc is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595467" version="1" comment="openstack-neutron-ha-tool is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595468" version="1" comment="openstack-neutron-l3-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595469" version="1" comment="openstack-neutron-lbaas is &lt;9.2.2~dev11-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595470" version="1" comment="openstack-neutron-lbaas-agent is &lt;9.2.2~dev11-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595471" version="1" comment="openstack-neutron-lbaas-doc is &lt;9.2.2~dev11-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595472" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595473" version="1" comment="openstack-neutron-macvtap-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595474" version="1" comment="openstack-neutron-metadata-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595475" version="1" comment="openstack-neutron-metering-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595476" version="1" comment="openstack-neutron-openvswitch-agent is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595477" version="1" comment="openstack-neutron-server is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595478" version="1" comment="python-cinder is &lt;9.1.5~dev6-4.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595479" version="1" comment="python-horizon-plugin-designate-ui is &lt;3.0.2~dev1-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595480" version="1" comment="python-neutron is &lt;9.4.2~dev21-7.27.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595481" version="1" comment="python-neutron-lbaas is &lt;9.2.2~dev11-4.15.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549766" version="1" comment="libwireshark8 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549767" version="1" comment="libwiretap6 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549768" version="1" comment="libwscodecs1 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549769" version="1" comment="libwsutil7 is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549770" version="1" comment="wireshark is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549771" version="1" comment="wireshark-gtk is &lt;2.2.10-48.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550599" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550600" version="1" comment="libjpeg62 is &lt;62.2.0-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550601" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.7.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550602" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550603" version="1" comment="libjpeg8 is &lt;8.1.2-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550604" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.7.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550605" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518378" version="1" comment="xen is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549901" version="1" comment="xen-doc-html is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518379" version="1" comment="xen-libs is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518380" version="1" comment="xen-libs-32bit is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549902" version="1" comment="xen-tools is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549903" version="1" comment="xen-tools-domU is &lt;4.7.4_02-43.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334386" version="1" comment="mongodb is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518245" version="1" comment="xen is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549772" version="1" comment="xen-doc-html is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518246" version="1" comment="xen-libs is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518247" version="1" comment="xen-libs-32bit is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549773" version="1" comment="xen-tools is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549774" version="1" comment="xen-tools-domU is &lt;4.7.3_06-43.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518951" version="1" comment="xen is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550721" version="1" comment="xen-doc-html is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518952" version="1" comment="xen-libs is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518953" version="1" comment="xen-libs-32bit is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550722" version="1" comment="xen-tools is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550723" version="1" comment="xen-tools-domU is &lt;4.7.4_06-43.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518256" version="1" comment="SuSEfirewall2 is &lt;3.6.312-2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533263" version="1" comment="tomcat is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533264" version="1" comment="tomcat-admin-webapps is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533265" version="1" comment="tomcat-docs-webapp is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533266" version="1" comment="tomcat-el-3_0-api is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533267" version="1" comment="tomcat-javadoc is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533268" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533269" version="1" comment="tomcat-lib is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533270" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533271" version="1" comment="tomcat-webapps is &lt;8.0.50-29.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552190" version="1" comment="apache2 is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536748" version="1" comment="apache2-doc is &lt;2.4.23-29.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552191" version="1" comment="apache2-example-pages is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552192" version="1" comment="apache2-prefork is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552193" version="1" comment="apache2-utils is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552194" version="1" comment="apache2-worker is &lt;2.4.23-29.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550965" version="1" comment="apache2 is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550966" version="1" comment="apache2-example-pages is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550967" version="1" comment="apache2-prefork is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550968" version="1" comment="apache2-utils is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550969" version="1" comment="apache2-worker is &lt;2.4.23-29.18.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338984" version="1" comment="busybox is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550566" version="1" comment="libsystemd0 is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550567" version="1" comment="libsystemd0-32bit is &lt;228-150.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550568" version="1" comment="libudev1 is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550569" version="1" comment="libudev1-32bit is &lt;228-150.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550570" version="1" comment="systemd is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550571" version="1" comment="systemd-32bit is &lt;228-150.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518816" version="1" comment="systemd-bash-completion is &lt;228-150.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550572" version="1" comment="systemd-sysvinit is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550573" version="1" comment="udev is &lt;228-150.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338986" version="1" comment="rsync is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550710" version="1" comment="libfpm_pb0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550711" version="1" comment="libospf0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550712" version="1" comment="libospfapiclient0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550713" version="1" comment="libquagga_pb0 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550714" version="1" comment="libzebra1 is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550715" version="1" comment="quagga is &lt;1.1.1-17.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594304" version="1" comment="openstack-nova is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594305" version="1" comment="openstack-nova-api is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594306" version="1" comment="openstack-nova-cells is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594307" version="1" comment="openstack-nova-cert is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594308" version="1" comment="openstack-nova-compute is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594309" version="1" comment="openstack-nova-conductor is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594310" version="1" comment="openstack-nova-console is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594311" version="1" comment="openstack-nova-consoleauth is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594312" version="1" comment="openstack-nova-doc is &lt;14.0.10~dev13-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594313" version="1" comment="openstack-nova-novncproxy is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594314" version="1" comment="openstack-nova-placement-api is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594315" version="1" comment="openstack-nova-scheduler is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594316" version="1" comment="openstack-nova-serialproxy is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594317" version="1" comment="openstack-nova-vncproxy is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594318" version="1" comment="python-nova is &lt;14.0.10~dev13-4.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596499" version="1" comment="ruby2.1-rubygem-yajl-ruby is &lt;1.3.1-4.3.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520319" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520320" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530323" version="1" comment="MozillaFirefox-devel is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520321" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530324" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520322" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520323" version="1" comment="libfreebl3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530325" version="1" comment="libfreebl3-hmac is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530326" version="1" comment="libfreebl3-hmac-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520324" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520325" version="1" comment="libsoftokn3-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530327" version="1" comment="libsoftokn3-hmac is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530328" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520326" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520327" version="1" comment="mozilla-nspr-32bit is &lt;4.19-19.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520328" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520329" version="1" comment="mozilla-nss-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520330" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520331" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520332" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520333" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520334" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545896" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545897" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545898" version="1" comment="MozillaFirefox-devel is &lt;60.2.2esr-109.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545899" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548361" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.6.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545900" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545901" version="1" comment="libfreebl3-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545902" version="1" comment="libfreebl3-hmac is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545903" version="1" comment="libfreebl3-hmac-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545904" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545905" version="1" comment="libsoftokn3-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545906" version="1" comment="libsoftokn3-hmac is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545907" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545908" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545909" version="1" comment="mozilla-nspr-32bit is &lt;4.19-19.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545911" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545912" version="1" comment="mozilla-nss-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545913" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545914" version="1" comment="mozilla-nss-certs-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545916" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545917" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545918" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594643" version="1" comment="MozillaFirefox is &lt;60.2.2esr-109.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594644" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594645" version="1" comment="MozillaFirefox-devel is &lt;60.2.2esr-109.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594646" version="1" comment="MozillaFirefox-translations-common is &lt;60.2.2esr-109.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594647" version="1" comment="apache2-mod_nss is &lt;1.0.14-19.6.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594648" version="1" comment="libfreebl3 is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594649" version="1" comment="libfreebl3-hmac is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594650" version="1" comment="libsoftokn3 is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594651" version="1" comment="libsoftokn3-hmac is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594652" version="1" comment="mozilla-nspr is &lt;4.19-19.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594653" version="1" comment="mozilla-nss is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594654" version="1" comment="mozilla-nss-certs is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594655" version="1" comment="mozilla-nss-sysinit is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594656" version="1" comment="mozilla-nss-tools is &lt;3.36.4-58.15.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550975" version="1" comment="rsync is &lt;3.1.0-13.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549908" version="1" comment="libXcursor1 is &lt;1.1.14-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549909" version="1" comment="libXcursor1-32bit is &lt;1.1.14-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334046" version="1" comment="ceph is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549840" version="1" comment="tboot is &lt;20160518_1.9.4-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550417" version="1" comment="procmail is &lt;3.22-269.3.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549910" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549911" version="1" comment="libshibsp6 is &lt;2.5.5-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549912" version="1" comment="shibboleth-sp is &lt;2.5.5-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549922" version="1" comment="libsaml8 is &lt;2.5.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549923" version="1" comment="opensaml-bin is &lt;2.5.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549924" version="1" comment="opensaml-schemas is &lt;2.5.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334357" version="1" comment="ncurses is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550456" version="1" comment="transfig is &lt;3.2.5e-2.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549962" version="1" comment="libwireshark8 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549963" version="1" comment="libwiretap6 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549964" version="1" comment="libwscodecs1 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549965" version="1" comment="libwsutil7 is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549966" version="1" comment="wireshark is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549967" version="1" comment="wireshark-gtk is &lt;2.2.11-48.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666234" version="1" comment="libtiff5 is &lt;4.0.9-44.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666205" version="1" comment="libtiff5-32bit is &lt;4.0.9-44.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666235" version="1" comment="tiff is &lt;4.0.9-44.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333938" version="1" comment="glibc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334049" version="1" comment="mutt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550392" version="1" comment="kernel-default is &lt;4.4.103-92.56.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550393" version="1" comment="kernel-default-base is &lt;4.4.103-92.56.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550394" version="1" comment="kernel-default-devel is &lt;4.4.103-92.56.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550395" version="1" comment="kernel-default-man is &lt;4.4.103-92.56.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518759" version="1" comment="kernel-devel is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518760" version="1" comment="kernel-macros is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518761" version="1" comment="kernel-source is &lt;4.4.103-92.56.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550396" version="1" comment="kernel-syms is &lt;4.4.103-92.56.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520128" version="1" comment="openslp is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520129" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530283" version="1" comment="openslp-server is &lt;2.0.0-18.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545818" version="1" comment="openslp is &lt;2.0.0-18.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545819" version="1" comment="openslp-32bit is &lt;2.0.0-18.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545820" version="1" comment="openslp-server is &lt;2.0.0-18.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594597" version="1" comment="openslp is &lt;2.0.0-18.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594598" version="1" comment="openslp-server is &lt;2.0.0-18.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334392" version="1" comment="rubygem-rails-4_2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550430" version="1" comment="libwireshark8 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550431" version="1" comment="libwiretap6 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550432" version="1" comment="libwscodecs1 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550433" version="1" comment="libwsutil7 is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550434" version="1" comment="wireshark is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550435" version="1" comment="wireshark-gtk is &lt;2.2.12-48.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550828" version="1" comment="libwireshark8 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550829" version="1" comment="libwiretap6 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550830" version="1" comment="libwscodecs1 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550831" version="1" comment="libwsutil7 is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550832" version="1" comment="wireshark is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550833" version="1" comment="wireshark-gtk is &lt;2.2.13-48.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550737" version="1" comment="libsystemd0 is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550738" version="1" comment="libsystemd0-32bit is &lt;228-150.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550739" version="1" comment="libudev1 is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550740" version="1" comment="libudev1-32bit is &lt;228-150.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550741" version="1" comment="systemd is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550742" version="1" comment="systemd-32bit is &lt;228-150.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518969" version="1" comment="systemd-bash-completion is &lt;228-150.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550743" version="1" comment="systemd-sysvinit is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550744" version="1" comment="udev is &lt;228-150.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550751" version="1" comment="cups is &lt;1.7.5-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550752" version="1" comment="cups-client is &lt;1.7.5-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550753" version="1" comment="cups-libs is &lt;1.7.5-20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546056" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594768" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594769" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594770" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594771" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594772" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594773" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594774" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594775" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594776" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594777" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594778" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594779" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594780" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594781" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594782" version="1" comment="python-nova is &lt;14.0.11~dev13-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550780" version="1" comment="libcdio14 is &lt;0.90-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550781" version="1" comment="libcdio14-32bit is &lt;0.90-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531606" version="1" comment="kernel-default is &lt;4.4.121-92.146.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531607" version="1" comment="kernel-default-base is &lt;4.4.121-92.146.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531608" version="1" comment="kernel-default-devel is &lt;4.4.121-92.146.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531609" version="1" comment="kernel-devel is &lt;4.4.121-92.146.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531610" version="1" comment="kernel-macros is &lt;4.4.121-92.146.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531611" version="1" comment="kernel-source is &lt;4.4.121-92.146.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531612" version="1" comment="kernel-syms is &lt;4.4.121-92.146.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531613" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551954" version="1" comment="kernel-default is &lt;4.4.121-92.146.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551955" version="1" comment="kernel-default-base is &lt;4.4.121-92.146.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551956" version="1" comment="kernel-default-devel is &lt;4.4.121-92.146.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551957" version="1" comment="kernel-default-man is &lt;4.4.121-92.146.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551958" version="1" comment="kernel-syms is &lt;4.4.121-92.146.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537916" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;1-3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596102" version="1" comment="kernel-default is &lt;4.4.121-92.146.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596103" version="1" comment="kernel-default-base is &lt;4.4.121-92.146.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596104" version="1" comment="kernel-default-devel is &lt;4.4.121-92.146.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596105" version="1" comment="kernel-syms is &lt;4.4.121-92.146.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530947" version="1" comment="kernel-default is &lt;4.4.121-92.129.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530948" version="1" comment="kernel-default-base is &lt;4.4.121-92.129.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530949" version="1" comment="kernel-default-devel is &lt;4.4.121-92.129.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530950" version="1" comment="kernel-devel is &lt;4.4.121-92.129.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530951" version="1" comment="kernel-macros is &lt;4.4.121-92.129.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530952" version="1" comment="kernel-source is &lt;4.4.121-92.129.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530953" version="1" comment="kernel-syms is &lt;4.4.121-92.129.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530954" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551444" version="1" comment="kernel-default is &lt;4.4.121-92.129.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551445" version="1" comment="kernel-default-base is &lt;4.4.121-92.129.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551446" version="1" comment="kernel-default-devel is &lt;4.4.121-92.129.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551447" version="1" comment="kernel-default-man is &lt;4.4.121-92.129.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551448" version="1" comment="kernel-syms is &lt;4.4.121-92.129.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537459" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595570" version="1" comment="kernel-default is &lt;4.4.121-92.129.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595571" version="1" comment="kernel-default-base is &lt;4.4.121-92.129.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595572" version="1" comment="kernel-default-devel is &lt;4.4.121-92.129.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595573" version="1" comment="kernel-syms is &lt;4.4.121-92.129.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530379" version="1" comment="kernel-default is &lt;4.4.121-92.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530380" version="1" comment="kernel-default-base is &lt;4.4.121-92.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530381" version="1" comment="kernel-default-devel is &lt;4.4.121-92.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530382" version="1" comment="kernel-devel is &lt;4.4.121-92.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530383" version="1" comment="kernel-macros is &lt;4.4.121-92.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530384" version="1" comment="kernel-source is &lt;4.4.121-92.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530385" version="1" comment="kernel-syms is &lt;4.4.121-92.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530386" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550970" version="1" comment="kernel-default is &lt;4.4.121-92.73.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550971" version="1" comment="kernel-default-base is &lt;4.4.121-92.73.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550972" version="1" comment="kernel-default-devel is &lt;4.4.121-92.73.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550973" version="1" comment="kernel-default-man is &lt;4.4.121-92.73.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550974" version="1" comment="kernel-syms is &lt;4.4.121-92.73.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594741" version="1" comment="kernel-default is &lt;4.4.121-92.73.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594742" version="1" comment="kernel-default-base is &lt;4.4.121-92.73.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594743" version="1" comment="kernel-default-devel is &lt;4.4.121-92.73.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594744" version="1" comment="kernel-syms is &lt;4.4.121-92.73.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519646" version="1" comment="glibc is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519647" version="1" comment="glibc-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519648" version="1" comment="glibc-devel is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519649" version="1" comment="glibc-devel-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530084" version="1" comment="glibc-html is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519650" version="1" comment="glibc-i18ndata is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530085" version="1" comment="glibc-info is &lt;2.22-62.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519651" version="1" comment="glibc-locale is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519652" version="1" comment="glibc-locale-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530086" version="1" comment="glibc-profile is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530087" version="1" comment="glibc-profile-32bit is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519653" version="1" comment="nscd is &lt;2.22-62.13.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550383" version="1" comment="glibc is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550384" version="1" comment="glibc-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550385" version="1" comment="glibc-devel is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550386" version="1" comment="glibc-devel-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550387" version="1" comment="glibc-locale is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550388" version="1" comment="glibc-locale-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550389" version="1" comment="glibc-profile is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550390" version="1" comment="glibc-profile-32bit is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550391" version="1" comment="nscd is &lt;2.22-62.13.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594389" version="1" comment="glibc is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594390" version="1" comment="glibc-devel is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594391" version="1" comment="glibc-locale is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594392" version="1" comment="glibc-profile is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594393" version="1" comment="nscd is &lt;2.22-62.13.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530195" version="1" comment="kernel-default is &lt;4.4.121-92.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530196" version="1" comment="kernel-default-base is &lt;4.4.121-92.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530197" version="1" comment="kernel-default-devel is &lt;4.4.121-92.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530198" version="1" comment="kernel-devel is &lt;4.4.121-92.92.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530199" version="1" comment="kernel-macros is &lt;4.4.121-92.92.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530200" version="1" comment="kernel-source is &lt;4.4.121-92.92.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530201" version="1" comment="kernel-syms is &lt;4.4.121-92.92.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530202" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530203" version="1" comment="lttng-modules is &lt;2.7.1-9.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530204" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.121_92.92-9.4.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550501" version="1" comment="kernel-default is &lt;4.4.121-92.92.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550502" version="1" comment="kernel-default-base is &lt;4.4.121-92.92.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550503" version="1" comment="kernel-default-devel is &lt;4.4.121-92.92.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550504" version="1" comment="kernel-default-man is &lt;4.4.121-92.92.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550505" version="1" comment="kernel-syms is &lt;4.4.121-92.92.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536553" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536552" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536551" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536550" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536548" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536547" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594482" version="1" comment="kernel-default is &lt;4.4.121-92.92.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594483" version="1" comment="kernel-default-base is &lt;4.4.121-92.92.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594484" version="1" comment="kernel-default-devel is &lt;4.4.121-92.92.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594485" version="1" comment="kernel-syms is &lt;4.4.121-92.92.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530679" version="1" comment="kernel-default is &lt;4.4.121-92.120.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530680" version="1" comment="kernel-default-base is &lt;4.4.121-92.120.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530681" version="1" comment="kernel-default-devel is &lt;4.4.121-92.120.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530682" version="1" comment="kernel-devel is &lt;4.4.121-92.120.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530683" version="1" comment="kernel-macros is &lt;4.4.121-92.120.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530684" version="1" comment="kernel-source is &lt;4.4.121-92.120.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530685" version="1" comment="kernel-syms is &lt;4.4.121-92.120.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530686" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551243" version="1" comment="kernel-default is &lt;4.4.121-92.120.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551244" version="1" comment="kernel-default-base is &lt;4.4.121-92.120.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551245" version="1" comment="kernel-default-devel is &lt;4.4.121-92.120.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551246" version="1" comment="kernel-default-man is &lt;4.4.121-92.120.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551247" version="1" comment="kernel-syms is &lt;4.4.121-92.120.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537117" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595126" version="1" comment="kernel-default is &lt;4.4.121-92.120.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595127" version="1" comment="kernel-default-base is &lt;4.4.121-92.120.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595128" version="1" comment="kernel-default-devel is &lt;4.4.121-92.120.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595129" version="1" comment="kernel-syms is &lt;4.4.121-92.120.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339376" version="1" comment="novnc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531163" version="1" comment="libvncclient0 is &lt;0.9.9-17.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531164" version="1" comment="libvncserver0 is &lt;0.9.9-17.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551587" version="1" comment="libvncclient0 is &lt;0.9.9-17.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551588" version="1" comment="libvncserver0 is &lt;0.9.9-17.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595702" version="1" comment="libvncclient0 is &lt;0.9.9-17.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595703" version="1" comment="libvncserver0 is &lt;0.9.9-17.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531577" version="1" comment="libraptor2-0 is &lt;2.0.15-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551930" version="1" comment="libraptor2-0 is &lt;2.0.15-5.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596079" version="1" comment="libraptor2-0 is &lt;2.0.15-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522390" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522391" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522392" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548838" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548839" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548840" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595281" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595282" version="1" comment="sqlite3 is &lt;3.8.10.2-9.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549781" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549782" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549783" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549784" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549785" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.18.0-2.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550352" version="1" comment="libnetpbm11 is &lt;10.66.3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550353" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550354" version="1" comment="netpbm is &lt;10.66.3-7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594680" version="1" comment="python-oslo.cache is &lt;1.14.1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594681" version="1" comment="python-oslo.concurrency is &lt;3.14.1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594682" version="1" comment="python-oslo.db is &lt;4.13.6-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594683" version="1" comment="python-oslo.log is &lt;3.16.1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594684" version="1" comment="python-oslo.messaging is &lt;5.10.2-3.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594685" version="1" comment="python-oslo.middleware is &lt;3.19.1-4.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594686" version="1" comment="python-oslo.serialization is &lt;2.13.2-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594687" version="1" comment="python-oslo.service is &lt;1.16.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594688" version="1" comment="python-oslo.utils is &lt;3.16.1-3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594689" version="1" comment="python-oslo.versionedobjects is &lt;1.17.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594690" version="1" comment="python-oslo.vmware is &lt;2.14.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594691" version="1" comment="python-oslotest is &lt;2.10.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549993" version="1" comment="libblkid1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549994" version="1" comment="libblkid1-32bit is &lt;2.28-44.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549995" version="1" comment="libfdisk1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549996" version="1" comment="libmount1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549997" version="1" comment="libmount1-32bit is &lt;2.28-44.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549998" version="1" comment="libsmartcols1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549999" version="1" comment="libuuid1 is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550000" version="1" comment="libuuid1-32bit is &lt;2.28-44.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550001" version="1" comment="python-libmount is &lt;2.28-44.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550002" version="1" comment="util-linux is &lt;2.28-44.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518461" version="1" comment="util-linux-lang is &lt;2.28-44.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550003" version="1" comment="util-linux-systemd is &lt;2.28-44.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550004" version="1" comment="uuidd is &lt;2.28-44.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333935" version="1" comment="coreutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562140" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562141" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562142" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562143" version="1" comment="libdcerpc0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562144" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562145" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562146" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562147" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562148" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562149" version="1" comment="libndr-standard0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562150" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562151" version="1" comment="libndr0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562152" version="1" comment="libndr0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562153" version="1" comment="libnetapi0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562154" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562155" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562156" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562157" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562158" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562159" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562160" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562161" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562162" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562163" version="1" comment="libsamba-util0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562164" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562165" version="1" comment="libsamdb0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562166" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562167" version="1" comment="libsmbclient0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562168" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562169" version="1" comment="libsmbconf0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562170" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562171" version="1" comment="libsmbldap0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562172" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562173" version="1" comment="libtevent-util0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562174" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562175" version="1" comment="libwbclient0 is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562176" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562177" version="1" comment="samba is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562178" version="1" comment="samba-client is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562179" version="1" comment="samba-client-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562086" version="1" comment="samba-doc is &lt;4.4.2-38.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562180" version="1" comment="samba-libs is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562181" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562182" version="1" comment="samba-winbind is &lt;4.4.2-38.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562183" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549375" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549376" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549464" version="1" comment="libXdmcp6 is &lt;1.1.1-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549465" version="1" comment="libXdmcp6-32bit is &lt;1.1.1-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549455" version="1" comment="libICE6 is &lt;1.0.8-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549456" version="1" comment="libICE6-32bit is &lt;1.0.8-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550103" version="1" comment="kernel-default is &lt;4.4.49-92.14.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550104" version="1" comment="kernel-default-base is &lt;4.4.49-92.14.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550105" version="1" comment="kernel-default-devel is &lt;4.4.49-92.14.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550106" version="1" comment="kernel-default-man is &lt;4.4.49-92.14.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518541" version="1" comment="kernel-devel is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518542" version="1" comment="kernel-macros is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518543" version="1" comment="kernel-source is &lt;4.4.49-92.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550107" version="1" comment="kernel-syms is &lt;4.4.49-92.14.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532899" version="1" comment="dovecot is &lt;2.2-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550205" version="1" comment="dovecot22 is &lt;2.2.29.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550206" version="1" comment="dovecot22-backend-mysql is &lt;2.2.29.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550207" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.29.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550208" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.29.1-11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525122" version="1" comment="python-tablib is &lt;0.9.11-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518058" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-19.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549603" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549604" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-19.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549605" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549606" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-19.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549607" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-19.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549535" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549536" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518003" version="1" comment="libsoup-lang is &lt;2.54.1-5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549537" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551267" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551268" version="1" comment="libsoup-2_4-1-32bit is &lt;2.62.2-5.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519875" version="1" comment="libsoup-lang is &lt;2.62.2-5.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551269" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595173" version="1" comment="libsoup-2_4-1 is &lt;2.62.2-5.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595174" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.62.2-5.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334058" version="1" comment="SDL is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550013" version="1" comment="bind is &lt;9.9.9P1-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550014" version="1" comment="bind-chrootenv is &lt;9.9.9P1-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532737" version="1" comment="bind-doc is &lt;9.9.9P1-56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550015" version="1" comment="bind-libs is &lt;9.9.9P1-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547858" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550016" version="1" comment="bind-utils is &lt;9.9.9P1-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549405" version="1" comment="bind is &lt;9.9.9P1-62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549406" version="1" comment="bind-chrootenv is &lt;9.9.9P1-62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532221" version="1" comment="bind-doc is &lt;9.9.9P1-62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549407" version="1" comment="bind-libs is &lt;9.9.9P1-62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547561" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549408" version="1" comment="bind-utils is &lt;9.9.9P1-62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550733" version="1" comment="dhcp is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550734" version="1" comment="dhcp-client is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550735" version="1" comment="dhcp-relay is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550736" version="1" comment="dhcp-server is &lt;4.3.3-10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550579" version="1" comment="bind is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550580" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533101" version="1" comment="bind-doc is &lt;9.9.9P1-63.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550581" version="1" comment="bind-libs is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548322" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550582" version="1" comment="bind-utils is &lt;9.9.9P1-63.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549397" version="1" comment="apache2 is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532211" version="1" comment="apache2-doc is &lt;2.4.23-28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549398" version="1" comment="apache2-example-pages is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549399" version="1" comment="apache2-prefork is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549400" version="1" comment="apache2-utils is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549401" version="1" comment="apache2-worker is &lt;2.4.23-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334115" version="1" comment="u-boot is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550287" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.141-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550288" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.141-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550289" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.141-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550290" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.141-42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550229" version="1" comment="libmysqlclient18 is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548048" version="1" comment="libmysqlclient18-32bit is &lt;10.0.30-25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550230" version="1" comment="mariadb is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550231" version="1" comment="mariadb-client is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550232" version="1" comment="mariadb-errormessages is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550233" version="1" comment="mariadb-tools is &lt;10.0.30-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549504" version="1" comment="libmysqlclient18 is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547567" version="1" comment="libmysqlclient18-32bit is &lt;10.0.31-29.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549505" version="1" comment="mariadb is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549506" version="1" comment="mariadb-client is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549507" version="1" comment="mariadb-errormessages is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549508" version="1" comment="mariadb-tools is &lt;10.0.31-29.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550301" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.131-26.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550302" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.131-26.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550303" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.131-26.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550304" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.131-26.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550956" version="1" comment="libmysqlclient18 is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550957" version="1" comment="libmysqlclient18-32bit is &lt;10.0.32-29.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550958" version="1" comment="mariadb is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550959" version="1" comment="mariadb-client is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550960" version="1" comment="mariadb-errormessages is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550961" version="1" comment="mariadb-tools is &lt;10.0.32-29.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541071" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549895" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549896" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549897" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549898" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549899" version="1" comment="openssl is &lt;1.0.2j-60.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532635" version="1" comment="openssl-doc is &lt;1.0.2j-60.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541101" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549931" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549932" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.20.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549933" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549934" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.20.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549935" version="1" comment="openssl is &lt;1.0.2j-60.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532667" version="1" comment="openssl-doc is &lt;1.0.2j-60.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550242" version="1" comment="libplist3 is &lt;1.12-19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549981" version="1" comment="libtiff5 is &lt;4.0.7-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547806" version="1" comment="libtiff5-32bit is &lt;4.0.7-40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549982" version="1" comment="tiff is &lt;4.0.7-40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549973" version="1" comment="MozillaFirefox is &lt;45.7.0esr-99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549974" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550034" version="1" comment="MozillaFirefox is &lt;45.8.0esr-102.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550035" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-102.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550183" version="1" comment="libgraphite2-3 is &lt;1.3.1-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548017" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334061" version="1" comment="screen is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334062" version="1" comment="log4j is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550801" version="1" comment="crash is &lt;7.1.5-15.3.45 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550802" version="1" comment="crash-kmp-default is &lt;7.1.5_k4.4.114_92.67-15.3.45 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519174" version="1" comment="kernel-firmware is &lt;20170530-21.16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550914" version="1" comment="libvirt is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550915" version="1" comment="libvirt-client is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550916" version="1" comment="libvirt-daemon is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550917" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550918" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550919" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519135" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550920" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550921" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550922" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550923" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550924" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550925" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550926" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550927" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550928" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550929" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519145" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550930" version="1" comment="libvirt-doc is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550931" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550932" version="1" comment="libvirt-nss is &lt;2.0.0-27.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519175" version="1" comment="ucode-amd is &lt;20170530-21.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519024" version="1" comment="ucode-intel is &lt;20180312-13.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519157" version="1" comment="xen is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550943" version="1" comment="xen-doc-html is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519158" version="1" comment="xen-libs is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519159" version="1" comment="xen-libs-32bit is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550944" version="1" comment="xen-tools is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550945" version="1" comment="xen-tools-domU is &lt;4.7.5_02-43.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519660" version="1" comment="kernel-firmware is &lt;20170530-21.22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530215" version="1" comment="libvirt is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530216" version="1" comment="libvirt-client is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530217" version="1" comment="libvirt-daemon is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530218" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530219" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530220" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530221" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530222" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530223" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530224" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530225" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530226" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530227" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530228" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530229" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530230" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530231" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530232" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530233" version="1" comment="libvirt-doc is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530234" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530235" version="1" comment="libvirt-nss is &lt;2.0.0-27.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519661" version="1" comment="ucode-amd is &lt;20170530-21.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530115" version="1" comment="xen is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530116" version="1" comment="xen-doc-html is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530117" version="1" comment="xen-libs is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530118" version="1" comment="xen-libs-32bit is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530119" version="1" comment="xen-tools is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530120" version="1" comment="xen-tools-domU is &lt;4.7.5_04-43.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550517" version="1" comment="libvirt is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550518" version="1" comment="libvirt-client is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550519" version="1" comment="libvirt-daemon is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550520" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550521" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550522" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550523" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550524" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550525" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550526" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550527" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550528" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550529" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550530" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550531" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550532" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550533" version="1" comment="libvirt-doc is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550534" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550535" version="1" comment="libvirt-nss is &lt;2.0.0-27.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594534" version="1" comment="libvirt is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594535" version="1" comment="libvirt-client is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594536" version="1" comment="libvirt-daemon is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594537" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594538" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594539" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594540" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594541" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594542" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594543" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594544" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594545" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594546" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594547" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594548" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594549" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594550" version="1" comment="libvirt-doc is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594551" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594552" version="1" comment="libvirt-nss is &lt;2.0.0-27.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550791" version="1" comment="kernel-default is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550792" version="1" comment="kernel-default-base is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550793" version="1" comment="kernel-default-devel is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550794" version="1" comment="kernel-default-man is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550795" version="1" comment="kernel-devel is &lt;4.4.103-92.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550796" version="1" comment="kernel-macros is &lt;4.4.103-92.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550797" version="1" comment="kernel-source is &lt;4.4.103-92.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550798" version="1" comment="kernel-syms is &lt;4.4.103-92.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657863" version="1" comment="kernel-default is &lt;4.4.121-92.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657864" version="1" comment="kernel-default-base is &lt;4.4.121-92.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657865" version="1" comment="kernel-default-devel is &lt;4.4.121-92.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657866" version="1" comment="kernel-devel is &lt;4.4.121-92.161.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657867" version="1" comment="kernel-macros is &lt;4.4.121-92.161.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657868" version="1" comment="kernel-source is &lt;4.4.121-92.161.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657869" version="1" comment="kernel-syms is &lt;4.4.121-92.161.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550140" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-17.13 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550144" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518582" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-12.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550145" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550141" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-17.13 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550146" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550147" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550148" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550149" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550150" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550142" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-17.13 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550151" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550152" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550153" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550154" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550155" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550156" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550157" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550158" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550159" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-12.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550160" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-12.11 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550128" version="1" comment="gstreamer is &lt;1.8.3-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518564" version="1" comment="gstreamer-lang is &lt;1.8.3-9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550129" version="1" comment="gstreamer-utils is &lt;1.8.3-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550130" version="1" comment="libgstreamer-1_0-0 is &lt;1.8.3-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550131" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.8.3-9.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550132" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.8.3-9.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550118" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518552" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550119" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550120" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550121" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550122" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550123" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550124" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550125" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550126" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550127" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541177" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628130" version="1" comment="libgtk-vnc-1_0-0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628131" version="1" comment="libgtk-vnc-2_0-0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628132" version="1" comment="libgvnc-1_0-0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628133" version="1" comment="python-gtk-vnc is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628134" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628135" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;0.6.0-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334330" version="1" comment="bash is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549402" version="1" comment="gvim is &lt;7.4.326-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549403" version="1" comment="vim is &lt;7.4.326-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517666" version="1" comment="vim-data is &lt;7.4.326-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653038" version="1" comment="libpcre1 is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653016" version="1" comment="libpcre1-32bit is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653039" version="1" comment="libpcre16-0 is &lt;8.45-8.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653349" version="1" comment="selinux-policy is &lt;20140730-36.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653350" version="1" comment="selinux-policy-devel is &lt;20140730-36.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653351" version="1" comment="selinux-policy-minimum is &lt;20140730-36.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333994" version="1" comment="gdk-pixbuf is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550036" version="1" comment="sane-backends is &lt;1.0.24-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531452" version="1" comment="sane-backends is &lt;1.0.31-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551826" version="1" comment="sane-backends is &lt;1.0.31-4.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595990" version="1" comment="sane-backends is &lt;1.0.31-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550380" version="1" comment="gd is &lt;2.1.0-24.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549559" version="1" comment="libplist3 is &lt;1.12-20.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550324" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550325" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518569" version="1" comment="xen is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550133" version="1" comment="xen-doc-html is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518570" version="1" comment="xen-libs is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518571" version="1" comment="xen-libs-32bit is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550134" version="1" comment="xen-tools is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550135" version="1" comment="xen-tools-domU is &lt;4.7.2_02-36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550184" version="1" comment="apache2-mod_apparmor is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517324" version="1" comment="apparmor-docs is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550185" version="1" comment="apparmor-parser is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517326" version="1" comment="apparmor-profiles is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517327" version="1" comment="apparmor-utils is &lt;2.8.2-54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550186" version="1" comment="libapparmor1 is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548021" version="1" comment="libapparmor1-32bit is &lt;2.8.2-54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550187" version="1" comment="pam_apparmor is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548023" version="1" comment="pam_apparmor-32bit is &lt;2.8.2-54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550188" version="1" comment="perl-apparmor is &lt;2.8.2-54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550055" version="1" comment="wget is &lt;1.14-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338989" version="1" comment="avahi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531102" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551536" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595663" version="1" comment="xrdp is &lt;0.9.0~git.1456906198.f422461-16.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594325" version="1" comment="openstack-ceilometer is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594326" version="1" comment="openstack-ceilometer-agent-central is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594327" version="1" comment="openstack-ceilometer-agent-compute is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594328" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594329" version="1" comment="openstack-ceilometer-agent-notification is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594330" version="1" comment="openstack-ceilometer-api is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594331" version="1" comment="openstack-ceilometer-collector is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594332" version="1" comment="openstack-ceilometer-doc is &lt;7.0.4~a0~dev7-3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594333" version="1" comment="openstack-ceilometer-polling is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594334" version="1" comment="openstack-cinder is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594335" version="1" comment="openstack-cinder-api is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594336" version="1" comment="openstack-cinder-backup is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594337" version="1" comment="openstack-cinder-doc is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594338" version="1" comment="openstack-cinder-scheduler is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594339" version="1" comment="openstack-cinder-volume is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594340" version="1" comment="openstack-dashboard is &lt;10.0.4~a0~dev2-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594341" version="1" comment="openstack-glance is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594342" version="1" comment="openstack-glance-api is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594343" version="1" comment="openstack-glance-doc is &lt;13.0.1~a0~dev6-3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594344" version="1" comment="openstack-glance-glare is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594345" version="1" comment="openstack-glance-registry is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594346" version="1" comment="openstack-heat is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594347" version="1" comment="openstack-heat-api is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594348" version="1" comment="openstack-heat-api-cfn is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594349" version="1" comment="openstack-heat-api-cloudwatch is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594350" version="1" comment="openstack-heat-doc is &lt;7.0.4~a0~dev4-4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594351" version="1" comment="openstack-heat-engine is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594352" version="1" comment="openstack-heat-plugin-heat_docker is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594353" version="1" comment="openstack-heat-test is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594354" version="1" comment="openstack-keystone is &lt;10.0.2~a0~dev2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594355" version="1" comment="openstack-keystone-doc is &lt;10.0.2~a0~dev2-6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594356" version="1" comment="openstack-magnum is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594357" version="1" comment="openstack-magnum-api is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594358" version="1" comment="openstack-magnum-conductor is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594359" version="1" comment="openstack-magnum-doc is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594360" version="1" comment="openstack-manila is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594361" version="1" comment="openstack-manila-api is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594362" version="1" comment="openstack-manila-data is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594363" version="1" comment="openstack-manila-doc is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594364" version="1" comment="openstack-manila-scheduler is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594365" version="1" comment="openstack-manila-share is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594366" version="1" comment="openstack-nova is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594367" version="1" comment="openstack-nova-api is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594368" version="1" comment="openstack-nova-cells is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594369" version="1" comment="openstack-nova-cert is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594370" version="1" comment="openstack-nova-compute is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594371" version="1" comment="openstack-nova-conductor is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594372" version="1" comment="openstack-nova-console is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594373" version="1" comment="openstack-nova-consoleauth is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594374" version="1" comment="openstack-nova-doc is &lt;14.0.6~a0~dev16-3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594375" version="1" comment="openstack-nova-novncproxy is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594376" version="1" comment="openstack-nova-placement-api is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594377" version="1" comment="openstack-nova-scheduler is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594378" version="1" comment="openstack-nova-serialproxy is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594379" version="1" comment="openstack-nova-vncproxy is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594380" version="1" comment="python-ceilometer is &lt;7.0.4~a0~dev7-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594381" version="1" comment="python-cinder is &lt;9.1.5~a0~dev1-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594382" version="1" comment="python-glance is &lt;13.0.1~a0~dev6-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594383" version="1" comment="python-heat is &lt;7.0.4~a0~dev4-4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594384" version="1" comment="python-horizon is &lt;10.0.4~a0~dev2-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594385" version="1" comment="python-keystone is &lt;10.0.2~a0~dev2-6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594386" version="1" comment="python-magnum is &lt;3.1.2~a0~dev22-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594387" version="1" comment="python-manila is &lt;3.0.1~a0~dev27-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594388" version="1" comment="python-nova is &lt;14.0.6~a0~dev16-3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334068" version="1" comment="pcre is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549410" version="1" comment="libxml2-2 is &lt;2.9.4-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549411" version="1" comment="libxml2-2-32bit is &lt;2.9.4-45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532226" version="1" comment="libxml2-doc is &lt;2.9.4-45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549412" version="1" comment="libxml2-tools is &lt;2.9.4-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549413" version="1" comment="python-libxml2 is &lt;2.9.4-45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550172" version="1" comment="libXvnc1 is &lt;1.6.0-18.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550173" version="1" comment="tigervnc is &lt;1.6.0-18.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550174" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549520" version="1" comment="libzypp is &lt;16.15.2-27.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549521" version="1" comment="zypper is &lt;1.13.30-18.13.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517973" version="1" comment="zypper-log is &lt;1.13.30-18.13.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550171" version="1" comment="minicom is &lt;2.7-3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334070" version="1" comment="emacs is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334071" version="1" comment="lftp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549378" version="1" comment="postgresql94 is &lt;9.4.12-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549379" version="1" comment="postgresql94-contrib is &lt;9.4.12-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532193" version="1" comment="postgresql94-docs is &lt;9.4.12-20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549380" version="1" comment="postgresql94-server is &lt;9.4.12-20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550286" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550243" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550244" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550245" version="1" comment="libdcerpc0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550246" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550247" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550248" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550249" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550250" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550251" version="1" comment="libndr-standard0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550252" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550253" version="1" comment="libndr0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550254" version="1" comment="libndr0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550255" version="1" comment="libnetapi0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550256" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550257" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550258" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550259" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550260" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550261" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550262" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550263" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550264" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550265" version="1" comment="libsamba-util0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550266" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550267" version="1" comment="libsamdb0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550268" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550269" version="1" comment="libsmbclient0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550270" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550271" version="1" comment="libsmbconf0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550272" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550273" version="1" comment="libsmbldap0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550274" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550275" version="1" comment="libtevent-util0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550276" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550277" version="1" comment="libwbclient0 is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550278" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550279" version="1" comment="samba is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550280" version="1" comment="samba-client is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550281" version="1" comment="samba-client-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518677" version="1" comment="samba-doc is &lt;4.4.2-38.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550282" version="1" comment="samba-libs is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550283" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550284" version="1" comment="samba-winbind is &lt;4.4.2-38.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550285" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521784" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520377" version="1" comment="rpm is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520378" version="1" comment="rpm-32bit is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520379" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520380" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545949" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545950" version="1" comment="rpm is &lt;4.11.2-16.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545951" version="1" comment="rpm-32bit is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545952" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545953" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594669" version="1" comment="python3-rpm is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594670" version="1" comment="rpm is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594671" version="1" comment="rpm-build is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594672" version="1" comment="rpm-python is &lt;4.11.2-16.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517898" version="1" comment="libspice-server1 is &lt;0.12.7-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549451" version="1" comment="gnutls is &lt;3.2.15-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549452" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549453" version="1" comment="libgnutls28 is &lt;3.2.15-18.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549454" version="1" comment="libgnutls28-32bit is &lt;3.2.15-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549338" version="1" comment="openvpn is &lt;2.3.8-16.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549339" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549497" version="1" comment="libpoppler-glib8 is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549498" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549499" version="1" comment="libpoppler60 is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549500" version="1" comment="poppler-tools is &lt;0.43.0-16.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338991" version="1" comment="cpio is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549437" version="1" comment="libgcrypt20 is &lt;1.6.1-16.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549438" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549439" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549440" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549515" version="1" comment="kernel-default is &lt;4.4.74-92.32.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549516" version="1" comment="kernel-default-base is &lt;4.4.74-92.32.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549517" version="1" comment="kernel-default-devel is &lt;4.4.74-92.32.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549518" version="1" comment="kernel-default-man is &lt;4.4.74-92.32.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517967" version="1" comment="kernel-devel is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517968" version="1" comment="kernel-macros is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517969" version="1" comment="kernel-source is &lt;4.4.74-92.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549519" version="1" comment="kernel-syms is &lt;4.4.74-92.32.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334446" version="1" comment="openstack-neutron is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549598" version="1" comment="libecpg6 is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549599" version="1" comment="libpq5 is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009544979" version="1" comment="libpq5-32bit is &lt;9.6.4-3.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549595" version="1" comment="postgresql94 is &lt;9.4.13-21.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549596" version="1" comment="postgresql94-contrib is &lt;9.4.13-21.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532380" version="1" comment="postgresql94-docs is &lt;9.4.13-21.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549597" version="1" comment="postgresql94-server is &lt;9.4.13-21.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549600" version="1" comment="postgresql96 is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549601" version="1" comment="postgresql96-contrib is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532386" version="1" comment="postgresql96-docs is &lt;9.6.4-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549602" version="1" comment="postgresql96-server is &lt;9.6.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594735" version="1" comment="ansible is &lt;2.2.3.0-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550756" version="1" comment="augeas is &lt;1.2.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550757" version="1" comment="augeas-lenses is &lt;1.2.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550758" version="1" comment="libaugeas0 is &lt;1.2.0-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550241" version="1" comment="libsndfile1 is &lt;1.0.25-35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548072" version="1" comment="libsndfile1-32bit is &lt;1.0.25-35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550161" version="1" comment="libsndfile1 is &lt;1.0.25-28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009547992" version="1" comment="libsndfile1-32bit is &lt;1.0.25-28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334073" version="1" comment="elfutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550512" version="1" comment="apache2 is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533082" version="1" comment="apache2-doc is &lt;2.4.23-29.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550513" version="1" comment="apache2-example-pages is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550514" version="1" comment="apache2-prefork is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550515" version="1" comment="apache2-utils is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550516" version="1" comment="apache2-worker is &lt;2.4.23-29.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333965" version="1" comment="apache2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518607" version="1" comment="xen is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550180" version="1" comment="xen-doc-html is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518608" version="1" comment="xen-libs is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518609" version="1" comment="xen-libs-32bit is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550181" version="1" comment="xen-tools is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550182" version="1" comment="xen-tools-domU is &lt;4.7.2_04-39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549666" version="1" comment="MozillaFirefox is &lt;52.3.0esr-109.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549667" version="1" comment="MozillaFirefox-translations is &lt;52.3.0esr-109.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549722" version="1" comment="MozillaFirefox is &lt;52.4.0esr-109.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549723" version="1" comment="MozillaFirefox-translations is &lt;52.4.0esr-109.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549724" version="1" comment="libfreebl3 is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545037" version="1" comment="libfreebl3-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549725" version="1" comment="libfreebl3-hmac is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545039" version="1" comment="libfreebl3-hmac-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549726" version="1" comment="libsoftokn3 is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545041" version="1" comment="libsoftokn3-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549727" version="1" comment="libsoftokn3-hmac is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545043" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549728" version="1" comment="mozilla-nss is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545045" version="1" comment="mozilla-nss-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549729" version="1" comment="mozilla-nss-certs is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545047" version="1" comment="mozilla-nss-certs-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549730" version="1" comment="mozilla-nss-sysinit is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545050" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.29.5-58.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549731" version="1" comment="mozilla-nss-tools is &lt;3.29.5-58.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549904" version="1" comment="MozillaFirefox is &lt;52.5.0esr-109.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549905" version="1" comment="MozillaFirefox-translations is &lt;52.5.0esr-109.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334128" version="1" comment="freetype2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549562" version="1" comment="gnome-shell is &lt;3.20.4-77.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549563" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-77.7.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518036" version="1" comment="gnome-shell-lang is &lt;3.20.4-77.7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517676" version="1" comment="xen is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549414" version="1" comment="xen-doc-html is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517677" version="1" comment="xen-libs is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517678" version="1" comment="xen-libs-32bit is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549415" version="1" comment="xen-tools is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549416" version="1" comment="xen-tools-domU is &lt;4.7.2_06-42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541230" version="1" comment="git-core is &lt;2.12.3-26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532935" version="1" comment="git-doc is &lt;2.12.3-26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550238" version="1" comment="libkde4 is &lt;4.12.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548055" version="1" comment="libkde4-32bit is &lt;4.12.0-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550239" version="1" comment="libkdecore4 is &lt;4.12.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548057" version="1" comment="libkdecore4-32bit is &lt;4.12.0-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550240" version="1" comment="libksuseinstall1 is &lt;4.12.0-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548059" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550234" version="1" comment="libtirpc-netconfig is &lt;1.0.1-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550235" version="1" comment="libtirpc3 is &lt;1.0.1-16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550236" version="1" comment="libtirpc3-32bit is &lt;1.0.1-16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550237" version="1" comment="rpcbind is &lt;0.2.3-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550985" version="1" comment="curl is &lt;7.37.0-37.11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550986" version="1" comment="libcurl4 is &lt;7.37.0-37.11.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550987" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.11.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549548" version="1" comment="libxml2-2 is &lt;2.9.4-46.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549549" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532336" version="1" comment="libxml2-doc is &lt;2.9.4-46.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549550" version="1" comment="libxml2-tools is &lt;2.9.4-46.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549551" version="1" comment="python-libxml2 is &lt;2.9.4-46.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550316" version="1" comment="strongswan is &lt;5.1.3-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518698" version="1" comment="strongswan-doc is &lt;5.1.3-25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550317" version="1" comment="strongswan-hmac is &lt;5.1.3-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550318" version="1" comment="strongswan-ipsec is &lt;5.1.3-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550319" version="1" comment="strongswan-libs0 is &lt;5.1.3-25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550326" version="1" comment="libxml2-2 is &lt;2.9.4-39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550327" version="1" comment="libxml2-2-32bit is &lt;2.9.4-39.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532998" version="1" comment="libxml2-doc is &lt;2.9.4-39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550328" version="1" comment="libxml2-tools is &lt;2.9.4-39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550329" version="1" comment="python-libxml2 is &lt;2.9.4-39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549377" version="1" comment="libpoppler44 is &lt;0.24.4-14.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531033" version="1" comment="libadns1 is &lt;1.4-103.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551486" version="1" comment="libadns1 is &lt;1.4-103.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595622" version="1" comment="libadns1 is &lt;1.4-103.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334075" version="1" comment="openexr is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549436" version="1" comment="libquicktime0 is &lt;1.2.4-13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549381" version="1" comment="freeradius-server is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549382" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549383" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549384" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549385" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549386" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549387" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549388" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549389" version="1" comment="freeradius-server-python is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549390" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549391" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549427" version="1" comment="libsystemd0 is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549428" version="1" comment="libsystemd0-32bit is &lt;228-149.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549429" version="1" comment="libudev1 is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549430" version="1" comment="libudev1-32bit is &lt;228-149.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549431" version="1" comment="systemd is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549432" version="1" comment="systemd-32bit is &lt;228-149.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517694" version="1" comment="systemd-bash-completion is &lt;228-149.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549433" version="1" comment="systemd-sysvinit is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549434" version="1" comment="udev is &lt;228-149.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530245" version="1" comment="libzypp is &lt;16.17.20-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530246" version="1" comment="zypper is &lt;1.13.45-18.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530247" version="1" comment="zypper-log is &lt;1.13.45-18.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550536" version="1" comment="libzypp is &lt;16.17.20-27.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550537" version="1" comment="zypper is &lt;1.13.45-18.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594560" version="1" comment="libzypp is &lt;16.17.20-27.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594561" version="1" comment="zypper is &lt;1.13.45-18.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550330" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550331" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550332" version="1" comment="openldap2 is &lt;2.4.41-18.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550333" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550334" version="1" comment="openldap2-client is &lt;2.4.41-18.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549357" version="1" comment="libwireshark8 is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549358" version="1" comment="libwiretap6 is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549359" version="1" comment="libwscodecs1 is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549360" version="1" comment="libwsutil7 is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549361" version="1" comment="wireshark is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549362" version="1" comment="wireshark-gtk is &lt;2.2.7-47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541441" version="1" comment="libpoppler44 is &lt;0.24.4-14.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549477" version="1" comment="dracut is &lt;044.1-109.8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549478" version="1" comment="dracut-fips is &lt;044.1-109.8.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549479" version="1" comment="libsystemd0 is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549480" version="1" comment="libsystemd0-32bit is &lt;228-150.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549481" version="1" comment="libudev1 is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549482" version="1" comment="libudev1-32bit is &lt;228-150.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549483" version="1" comment="systemd is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549484" version="1" comment="systemd-32bit is &lt;228-150.7.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009517931" version="1" comment="systemd-bash-completion is &lt;228-150.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549485" version="1" comment="systemd-sysvinit is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549486" version="1" comment="udev is &lt;228-150.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550355" version="1" comment="libgcrypt20 is &lt;1.6.1-16.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550356" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550357" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550358" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549489" version="1" comment="apache2 is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532285" version="1" comment="apache2-doc is &lt;2.4.23-29.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549490" version="1" comment="apache2-example-pages is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549491" version="1" comment="apache2-prefork is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549492" version="1" comment="apache2-utils is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549493" version="1" comment="apache2-worker is &lt;2.4.23-29.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549648" version="1" comment="apache2 is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532426" version="1" comment="apache2-doc is &lt;2.4.23-29.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549649" version="1" comment="apache2-example-pages is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549650" version="1" comment="apache2-prefork is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549651" version="1" comment="apache2-utils is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549652" version="1" comment="apache2-worker is &lt;2.4.23-29.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594301" version="1" comment="storm is &lt;1.0.5-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594302" version="1" comment="storm-nimbus is &lt;1.0.5-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594303" version="1" comment="storm-supervisor is &lt;1.0.5-5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334077" version="1" comment="tiff is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550899" version="1" comment="memcached is &lt;1.4.39-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519953" version="1" comment="clamav is &lt;0.100.1-33.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545663" version="1" comment="clamav is &lt;0.100.1-33.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594480" version="1" comment="clamav is &lt;0.100.1-33.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550799" version="1" comment="libxmltooling6 is &lt;1.5.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550800" version="1" comment="xmltooling-schemas is &lt;1.5.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520455" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530364" version="1" comment="MozillaFirefox-devel is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520456" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520457" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520458" version="1" comment="libfreebl3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520459" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520460" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520461" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520462" version="1" comment="mozilla-nspr-32bit is &lt;4.20-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520463" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520464" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520465" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520466" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520467" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520468" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520469" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546018" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546019" version="1" comment="MozillaFirefox-devel is &lt;60.4.0esr-109.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546020" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546021" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546022" version="1" comment="libfreebl3-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546023" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546024" version="1" comment="libsoftokn3-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546025" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546026" version="1" comment="mozilla-nspr-32bit is &lt;4.20-19.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546028" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546029" version="1" comment="mozilla-nss-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546030" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546031" version="1" comment="mozilla-nss-certs-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546033" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546034" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546035" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594718" version="1" comment="MozillaFirefox is &lt;60.4.0esr-109.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594719" version="1" comment="MozillaFirefox-devel is &lt;60.4.0esr-109.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594720" version="1" comment="MozillaFirefox-translations-common is &lt;60.4.0esr-109.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594721" version="1" comment="libfreebl3 is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594722" version="1" comment="libsoftokn3 is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594723" version="1" comment="mozilla-nspr is &lt;4.20-19.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594724" version="1" comment="mozilla-nss is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594725" version="1" comment="mozilla-nss-certs is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594726" version="1" comment="mozilla-nss-sysinit is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594727" version="1" comment="mozilla-nss-tools is &lt;3.40.1-58.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663987" version="1" comment="zsh is &lt;5.0.5-6.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519760" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519761" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519762" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530140" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530141" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519763" version="1" comment="openssl is &lt;1.0.2j-60.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530142" version="1" comment="openssl-doc is &lt;1.0.2j-60.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550424" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550425" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550426" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550427" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550428" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550429" version="1" comment="openssl is &lt;1.0.2j-60.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594446" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594447" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594448" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594564" version="1" comment="nodejs6 is &lt;6.14.4-11.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594449" version="1" comment="openssl is &lt;1.0.2j-60.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520373" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520374" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520375" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530330" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530331" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520376" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530332" version="1" comment="openssl-doc is &lt;1.0.2j-60.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550655" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550656" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550657" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550658" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550659" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550660" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594665" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594666" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594667" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595376" version="1" comment="nodejs6 is &lt;6.16.0-11.21.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594668" version="1" comment="openssl is &lt;1.0.2j-60.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520119" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520120" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520121" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530267" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530268" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520122" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530269" version="1" comment="openssl-doc is &lt;1.0.2j-60.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550543" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550544" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550545" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550546" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550547" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550548" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594585" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594586" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594587" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594588" version="1" comment="openssl is &lt;1.0.2j-60.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541426" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550948" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550949" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550950" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550951" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550952" version="1" comment="openssl is &lt;1.0.2j-60.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533365" version="1" comment="openssl-doc is &lt;1.0.2j-60.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538002" version="1" comment="ovmf is &lt;2015+git1462940744.321151f-19.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538003" version="1" comment="ovmf-tools is &lt;2015+git1462940744.321151f-19.10.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538004" version="1" comment="qemu-ovmf-x86_64 is &lt;2015+git1462940744.321151f-19.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536741" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536740" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536745" version="1" comment="kgraft-patch-4_4_59-92_20-default is &lt;10-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536734" version="1" comment="kgraft-patch-4_4_59-92_24-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536738" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536739" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536737" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536746" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536743" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536744" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550442" version="1" comment="curl is &lt;7.37.0-37.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550443" version="1" comment="libcurl4 is &lt;7.37.0-37.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550444" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550755" version="1" comment="squid is &lt;3.5.21-26.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536593" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536592" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536596" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536595" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536594" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536591" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536590" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338997" version="1" comment="unzip is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334079" version="1" comment="sharutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550809" version="1" comment="curl is &lt;7.37.0-37.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550810" version="1" comment="libcurl4 is &lt;7.37.0-37.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550811" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550843" version="1" comment="librelp0 is &lt;1.2.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334053" version="1" comment="nmap is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334080" version="1" comment="nghttp2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536767" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536766" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536757" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536468" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536469" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340771" version="1" comment="rubygem-ffi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520965" version="1" comment="curl is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520966" version="1" comment="libcurl4 is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520967" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546202" version="1" comment="curl is &lt;7.37.0-37.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546203" version="1" comment="libcurl4 is &lt;7.37.0-37.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546204" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594748" version="1" comment="curl is &lt;7.37.0-37.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594749" version="1" comment="libcurl4 is &lt;7.37.0-37.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522041" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522042" version="1" comment="python3 is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522043" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522044" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548677" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548678" version="1" comment="python3 is &lt;3.4.6-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548679" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551198" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595054" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595055" version="1" comment="python3 is &lt;3.4.6-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595056" version="1" comment="python3-base is &lt;3.4.6-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595057" version="1" comment="python3-curses is &lt;3.4.6-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595389" version="1" comment="python-amqp is &lt;1.4.9-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595390" version="1" comment="python-oslo.messaging is &lt;5.10.2-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595391" version="1" comment="python-ovs is &lt;2.5.0-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595392" version="1" comment="python-paramiko is &lt;2.0.9-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595393" version="1" comment="python-psql2mysql is &lt;0.5.0+git.1539592188.13e5d0f-1.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520401" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520402" version="1" comment="python-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520403" version="1" comment="python-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521791" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521792" version="1" comment="python3-pyOpenSSL is &lt;16.0.0-4.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520404" version="1" comment="python3-setuptools is &lt;18.0.1-4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550676" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550677" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594695" version="1" comment="python-cryptography is &lt;1.3.1-7.13.4 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594696" version="1" comment="python3-cryptography is &lt;1.3.1-7.13.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334411" version="1" comment="grafana is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522248" version="1" comment="binutils is &lt;2.32-9.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530717" version="1" comment="binutils-devel is &lt;2.32-9.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548760" version="1" comment="binutils is &lt;2.32-9.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548761" version="1" comment="binutils-devel is &lt;2.32-9.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595181" version="1" comment="binutils is &lt;2.32-9.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595182" version="1" comment="binutils-devel is &lt;2.32-9.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334011" version="1" comment="p7zip is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530387" version="1" comment="xen is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530388" version="1" comment="xen-doc-html is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530389" version="1" comment="xen-libs is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530390" version="1" comment="xen-libs-32bit is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530391" version="1" comment="xen-tools is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530392" version="1" comment="xen-tools-domU is &lt;4.7.5_02-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550856" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550857" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550858" version="1" comment="libdcerpc0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550859" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550860" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550861" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550862" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550863" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550864" version="1" comment="libndr-standard0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550865" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550866" version="1" comment="libndr0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550867" version="1" comment="libndr0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550868" version="1" comment="libnetapi0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550869" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550870" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550871" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550872" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550873" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550874" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550875" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550876" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550877" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550878" version="1" comment="libsamba-util0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550879" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550880" version="1" comment="libsamdb0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550881" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550882" version="1" comment="libsmbclient0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550883" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550884" version="1" comment="libsmbconf0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550885" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550886" version="1" comment="libsmbldap0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550887" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550888" version="1" comment="libtevent-util0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550889" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550890" version="1" comment="libwbclient0 is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550891" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550892" version="1" comment="samba is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550893" version="1" comment="samba-client is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550894" version="1" comment="samba-client-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519111" version="1" comment="samba-doc is &lt;4.4.2-38.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550895" version="1" comment="samba-libs is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550896" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550897" version="1" comment="samba-winbind is &lt;4.4.2-38.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550898" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530194" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550500" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594481" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550724" version="1" comment="libecpg6 is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550725" version="1" comment="libpq5 is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550726" version="1" comment="libpq5-32bit is &lt;9.6.7-3.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550777" version="1" comment="postgresql94 is &lt;9.4.16-21.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550778" version="1" comment="postgresql94-contrib is &lt;9.4.16-21.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533230" version="1" comment="postgresql94-docs is &lt;9.4.16-21.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550779" version="1" comment="postgresql94-server is &lt;9.4.16-21.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550727" version="1" comment="postgresql96 is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550728" version="1" comment="postgresql96-contrib is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533185" version="1" comment="postgresql96-docs is &lt;9.6.7-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550729" version="1" comment="postgresql96-server is &lt;9.6.7-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334120" version="1" comment="wavpack is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550803" version="1" comment="libecpg6 is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550804" version="1" comment="libpq5 is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550805" version="1" comment="libpq5-32bit is &lt;9.6.8-3.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550936" version="1" comment="postgresql94 is &lt;9.4.17-21.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550937" version="1" comment="postgresql94-contrib is &lt;9.4.17-21.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533353" version="1" comment="postgresql94-docs is &lt;9.4.17-21.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550938" version="1" comment="postgresql94-server is &lt;9.4.17-21.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550806" version="1" comment="postgresql96 is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550807" version="1" comment="postgresql96-contrib is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533246" version="1" comment="postgresql96-docs is &lt;9.6.8-3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550808" version="1" comment="postgresql96-server is &lt;9.6.8-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550946" version="1" comment="policycoreutils is &lt;2.5-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550947" version="1" comment="policycoreutils-python is &lt;2.5-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536736" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536742" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522423" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522424" version="1" comment="strongswan-doc is &lt;5.1.3-26.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552195" version="1" comment="strongswan-hmac is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522425" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522426" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548852" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548853" version="1" comment="strongswan-hmac is &lt;5.1.3-26.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548854" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548855" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595296" version="1" comment="strongswan is &lt;5.1.3-26.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595297" version="1" comment="strongswan-hmac is &lt;5.1.3-26.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595298" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595299" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530365" version="1" comment="qemu is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530366" version="1" comment="qemu-block-curl is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530367" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530368" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530369" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530370" version="1" comment="qemu-ipxe is &lt;1.0.0-41.46.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530371" version="1" comment="qemu-kvm is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530372" version="1" comment="qemu-lang is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530373" version="1" comment="qemu-seabios is &lt;1.9.1-41.46.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530374" version="1" comment="qemu-sgabios is &lt;8-41.46.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530375" version="1" comment="qemu-tools is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530376" version="1" comment="qemu-vgabios is &lt;1.9.1-41.46.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530377" version="1" comment="qemu-x86 is &lt;2.6.2-41.46.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550693" version="1" comment="qemu is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550694" version="1" comment="qemu-block-curl is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550695" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550696" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550697" version="1" comment="qemu-kvm is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550698" version="1" comment="qemu-lang is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536732" version="1" comment="qemu-ppc is &lt;2.6.2-41.46.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550699" version="1" comment="qemu-s390 is &lt;2.6.2-41.46.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550700" version="1" comment="qemu-tools is &lt;2.6.2-41.46.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594728" version="1" comment="qemu is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594729" version="1" comment="qemu-block-curl is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594730" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594731" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594732" version="1" comment="qemu-lang is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594733" version="1" comment="qemu-tools is &lt;2.6.2-41.46.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551396" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551397" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551398" version="1" comment="libsss_sudo is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551399" version="1" comment="python-sssd-config is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551400" version="1" comment="sssd is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551401" version="1" comment="sssd-32bit is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551402" version="1" comment="sssd-ad is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551403" version="1" comment="sssd-ipa is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551404" version="1" comment="sssd-krb5 is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551405" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551406" version="1" comment="sssd-ldap is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551407" version="1" comment="sssd-proxy is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551408" version="1" comment="sssd-tools is &lt;1.13.4-34.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595490" version="1" comment="libipa_hbac0 is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595491" version="1" comment="libsss_idmap0 is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595492" version="1" comment="libsss_sudo is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595493" version="1" comment="python-sssd-config is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595494" version="1" comment="sssd is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595495" version="1" comment="sssd-ad is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595496" version="1" comment="sssd-ipa is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595497" version="1" comment="sssd-krb5 is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595498" version="1" comment="sssd-krb5-common is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595499" version="1" comment="sssd-ldap is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595500" version="1" comment="sssd-proxy is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595501" version="1" comment="sssd-tools is &lt;1.13.4-34.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530295" version="1" comment="kernel-default is &lt;4.4.121-92.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530296" version="1" comment="kernel-default-base is &lt;4.4.121-92.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530297" version="1" comment="kernel-default-devel is &lt;4.4.121-92.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530298" version="1" comment="kernel-devel is &lt;4.4.121-92.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530299" version="1" comment="kernel-macros is &lt;4.4.121-92.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530300" version="1" comment="kernel-source is &lt;4.4.121-92.95.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530301" version="1" comment="kernel-syms is &lt;4.4.121-92.95.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530303" version="1" comment="lttng-modules is &lt;2.7.1-9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530304" version="1" comment="lttng-modules-kmp-default is &lt;2.7.1_k4.4.121_92.95-9.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550574" version="1" comment="kernel-default is &lt;4.4.121-92.95.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550575" version="1" comment="kernel-default-base is &lt;4.4.121-92.95.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550576" version="1" comment="kernel-default-devel is &lt;4.4.121-92.95.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550577" version="1" comment="kernel-default-man is &lt;4.4.121-92.95.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550578" version="1" comment="kernel-syms is &lt;4.4.121-92.95.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536543" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536544" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536545" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536546" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536577" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536620" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;1-3.4.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594614" version="1" comment="kernel-default is &lt;4.4.121-92.95.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594615" version="1" comment="kernel-default-base is &lt;4.4.121-92.95.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594616" version="1" comment="kernel-default-devel is &lt;4.4.121-92.95.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594617" version="1" comment="kernel-syms is &lt;4.4.121-92.95.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530302" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;1-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530149" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530150" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530151" version="1" comment="libdcerpc0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530152" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530153" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530154" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530155" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530156" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530157" version="1" comment="libndr-standard0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530158" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530159" version="1" comment="libndr0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530160" version="1" comment="libndr0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530161" version="1" comment="libnetapi0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530162" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530163" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530164" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530165" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530166" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530167" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530168" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530169" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530170" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530171" version="1" comment="libsamba-util0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530172" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530173" version="1" comment="libsamdb0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530174" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530175" version="1" comment="libsmbclient0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530176" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530177" version="1" comment="libsmbconf0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530178" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530179" version="1" comment="libsmbldap0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530180" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530181" version="1" comment="libtevent-util0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530182" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530183" version="1" comment="libwbclient0 is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530184" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530185" version="1" comment="samba is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530186" version="1" comment="samba-client is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530187" version="1" comment="samba-client-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530188" version="1" comment="samba-doc is &lt;4.4.2-38.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530189" version="1" comment="samba-libs is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530190" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530191" version="1" comment="samba-winbind is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530192" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550457" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550458" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550459" version="1" comment="libdcerpc0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550460" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550461" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550462" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550463" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550464" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550465" version="1" comment="libndr-standard0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550466" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550467" version="1" comment="libndr0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550468" version="1" comment="libndr0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550469" version="1" comment="libnetapi0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550470" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550471" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550472" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550473" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550474" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550475" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550476" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550477" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550478" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550479" version="1" comment="libsamba-util0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550480" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550481" version="1" comment="libsamdb0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550482" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550483" version="1" comment="libsmbclient0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550484" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550485" version="1" comment="libsmbconf0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550486" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550487" version="1" comment="libsmbldap0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550488" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550489" version="1" comment="libtevent-util0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550490" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550491" version="1" comment="libwbclient0 is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550492" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550493" version="1" comment="samba is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550494" version="1" comment="samba-client is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550495" version="1" comment="samba-client-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550496" version="1" comment="samba-libs is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550497" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550498" version="1" comment="samba-winbind is &lt;4.4.2-38.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550499" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594455" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594456" version="1" comment="libdcerpc0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594457" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594458" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594459" version="1" comment="libndr-standard0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594460" version="1" comment="libndr0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594461" version="1" comment="libnetapi0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594462" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594463" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594464" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594465" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594466" version="1" comment="libsamba-util0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594467" version="1" comment="libsamdb0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594468" version="1" comment="libsmbclient0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594469" version="1" comment="libsmbconf0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594470" version="1" comment="libsmbldap0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594471" version="1" comment="libtevent-util0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594472" version="1" comment="libwbclient0 is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594473" version="1" comment="samba is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594474" version="1" comment="samba-client is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594475" version="1" comment="samba-libs is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594476" version="1" comment="samba-winbind is &lt;4.4.2-38.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536455" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531669" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531670" version="1" comment="libspice-client-glib-helper is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531671" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531672" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531673" version="1" comment="libspice-controller0 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531676" version="1" comment="libspice-server1 is &lt;0.12.7-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531674" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531675" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-9.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552001" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552002" version="1" comment="libspice-client-glib-helper is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552003" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552004" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552005" version="1" comment="libspice-controller0 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552006" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552007" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-9.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596154" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596155" version="1" comment="libspice-client-glib-helper is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596156" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596157" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596158" version="1" comment="libspice-controller0 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596159" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596160" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-9.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536586" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536587" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536588" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536589" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536585" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531783" version="1" comment="python-cffi is &lt;1.11.2-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531784" version="1" comment="python-cryptography is &lt;2.1.4-7.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531785" version="1" comment="python-xattr is &lt;0.7.5-6.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531786" version="1" comment="python3-cffi is &lt;1.11.2-5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531787" version="1" comment="python3-cryptography is &lt;2.1.4-7.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552044" version="1" comment="python-cffi is &lt;1.11.2-5.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552045" version="1" comment="python-cryptography is &lt;2.1.4-7.28.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552046" version="1" comment="python-xattr is &lt;0.7.5-6.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552047" version="1" comment="python3-cffi is &lt;1.11.2-5.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552048" version="1" comment="python3-cryptography is &lt;2.1.4-7.28.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596247" version="1" comment="python-cffi is &lt;1.11.2-5.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596248" version="1" comment="python-cryptography is &lt;2.1.4-7.28.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596249" version="1" comment="python-xattr is &lt;0.7.5-6.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596250" version="1" comment="python3-cffi is &lt;1.11.2-5.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596251" version="1" comment="python3-cryptography is &lt;2.1.4-7.28.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545954" version="1" comment="postgresql94 is &lt;9.4.19-21.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545955" version="1" comment="postgresql94-contrib is &lt;9.4.19-21.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530335" version="1" comment="postgresql94-docs is &lt;9.4.19-21.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545956" version="1" comment="postgresql94-server is &lt;9.4.19-21.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545885" version="1" comment="postgresql96 is &lt;9.6.10-3.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545886" version="1" comment="postgresql96-contrib is &lt;9.6.10-3.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530312" version="1" comment="postgresql96-docs is &lt;9.6.10-3.22.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545887" version="1" comment="postgresql96-server is &lt;9.6.10-3.22.7 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594673" version="1" comment="postgresql94 is &lt;9.4.19-21.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594674" version="1" comment="postgresql94-contrib is &lt;9.4.19-21.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594675" version="1" comment="postgresql94-server is &lt;9.4.19-21.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594621" version="1" comment="postgresql96 is &lt;9.6.10-3.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594622" version="1" comment="postgresql96-contrib is &lt;9.6.10-3.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594623" version="1" comment="postgresql96-server is &lt;9.6.10-3.22.7 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670824" version="1" comment="zsh is &lt;5.0.5-6.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334179" version="1" comment="dhcp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333980" version="1" comment="haproxy is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521232" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530522" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530523" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521233" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530865" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530866" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530867" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530868" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530869" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.40-38.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530698" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530699" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530700" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530701" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.40-30.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521150" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530485" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530486" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521151" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546379" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546380" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.221-43.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546381" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.221-43.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546382" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546656" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-38.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542123" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.40-38.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546657" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-38.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548732" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-30.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542257" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.40-30.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548547" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548548" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-27.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548549" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-27.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548550" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594879" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.221-43.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594880" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.221-43.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594881" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.221-43.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594882" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.221-43.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595451" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.40-38.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595452" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.40-38.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595453" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.40-38.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595144" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.40-30.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595145" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.40-30.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594842" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.212-27.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594843" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.212-27.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594844" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.212-27.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594845" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.212-27.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521630" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521631" version="1" comment="procps is &lt;3.3.9-11.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546605" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546606" version="1" comment="procps is &lt;3.3.9-11.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595386" version="1" comment="libprocps3 is &lt;3.3.9-11.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595387" version="1" comment="procps is &lt;3.3.9-11.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530088" version="1" comment="git-core is &lt;2.12.3-27.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530089" version="1" comment="git-doc is &lt;2.12.3-27.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545508" version="1" comment="git-core is &lt;2.12.3-27.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594394" version="1" comment="git-core is &lt;2.12.3-27.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520113" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520114" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520115" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520116" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520117" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520118" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545810" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545811" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545812" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545813" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545814" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545815" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594576" version="1" comment="libwireshark9 is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594577" version="1" comment="libwiretap7 is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594578" version="1" comment="libwscodecs1 is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594579" version="1" comment="libwsutil8 is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594580" version="1" comment="wireshark is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594581" version="1" comment="wireshark-gtk is &lt;2.4.9-48.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340772" version="1" comment="rubygem-sinatra is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530317" version="1" comment="apache2 is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530318" version="1" comment="apache2-doc is &lt;2.4.23-29.27.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530319" version="1" comment="apache2-example-pages is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530320" version="1" comment="apache2-prefork is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530321" version="1" comment="apache2-utils is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530322" version="1" comment="apache2-worker is &lt;2.4.23-29.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550594" version="1" comment="apache2 is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550595" version="1" comment="apache2-example-pages is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550596" version="1" comment="apache2-prefork is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550597" version="1" comment="apache2-utils is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550598" version="1" comment="apache2-worker is &lt;2.4.23-29.27.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594632" version="1" comment="apache2 is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594633" version="1" comment="apache2-example-pages is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594634" version="1" comment="apache2-prefork is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594635" version="1" comment="apache2-utils is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594636" version="1" comment="apache2-worker is &lt;2.4.23-29.27.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334443" version="1" comment="storm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531788" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531789" version="1" comment="spamassassin is &lt;3.4.2-44.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549119" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549120" version="1" comment="spamassassin is &lt;3.4.2-44.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596275" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-44.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596276" version="1" comment="spamassassin is &lt;3.4.2-44.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530270" version="1" comment="qemu is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530271" version="1" comment="qemu-block-curl is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530272" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530273" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530274" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530275" version="1" comment="qemu-ipxe is &lt;1.0.0-41.43.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530276" version="1" comment="qemu-kvm is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530277" version="1" comment="qemu-lang is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530278" version="1" comment="qemu-seabios is &lt;1.9.1-41.43.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530279" version="1" comment="qemu-sgabios is &lt;8-41.43.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530280" version="1" comment="qemu-tools is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530281" version="1" comment="qemu-vgabios is &lt;1.9.1-41.43.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530282" version="1" comment="qemu-x86 is &lt;2.6.2-41.43.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530143" version="1" comment="xen is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530144" version="1" comment="xen-doc-html is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530145" version="1" comment="xen-libs is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530146" version="1" comment="xen-libs-32bit is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530147" version="1" comment="xen-tools is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530148" version="1" comment="xen-tools-domU is &lt;4.7.6_02-43.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550558" version="1" comment="qemu is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550559" version="1" comment="qemu-block-curl is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550560" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550561" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550562" version="1" comment="qemu-kvm is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550563" version="1" comment="qemu-lang is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536606" version="1" comment="qemu-ppc is &lt;2.6.2-41.43.3 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550564" version="1" comment="qemu-s390 is &lt;2.6.2-41.43.3 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550565" version="1" comment="qemu-tools is &lt;2.6.2-41.43.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594589" version="1" comment="qemu is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594590" version="1" comment="qemu-block-curl is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594591" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594592" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594593" version="1" comment="qemu-lang is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594594" version="1" comment="qemu-tools is &lt;2.6.2-41.43.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519792" version="1" comment="perl is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519793" version="1" comment="perl-32bit is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519794" version="1" comment="perl-base is &lt;5.18.2-12.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519795" version="1" comment="perl-doc is &lt;5.18.2-12.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545541" version="1" comment="perl is &lt;5.18.2-12.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545542" version="1" comment="perl-32bit is &lt;5.18.2-12.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545543" version="1" comment="perl-base is &lt;5.18.2-12.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594451" version="1" comment="perl is &lt;5.18.2-12.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594452" version="1" comment="perl-base is &lt;5.18.2-12.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519719" version="1" comment="gpg2 is &lt;2.0.24-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519720" version="1" comment="gpg2-lang is &lt;2.0.24-9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545522" version="1" comment="gpg2 is &lt;2.0.24-9.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594422" version="1" comment="gpg2 is &lt;2.0.24-9.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520313" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520314" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520315" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520316" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520317" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520318" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545890" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545891" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545892" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545893" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545894" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545895" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594637" version="1" comment="libwireshark9 is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594638" version="1" comment="libwiretap7 is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594639" version="1" comment="libwscodecs1 is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594640" version="1" comment="libwsutil8 is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594641" version="1" comment="wireshark is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594642" version="1" comment="wireshark-gtk is &lt;2.4.10-48.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594490" version="1" comment="grafana is &lt;4.5.1-1.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594491" version="1" comment="kafka is &lt;0.10.2.2-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594492" version="1" comment="logstash is &lt;2.4.1-5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594493" version="1" comment="monasca-installer is &lt;20180608_12.47-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530527" version="1" comment="libvirt is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530528" version="1" comment="libvirt-client is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530529" version="1" comment="libvirt-daemon is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530530" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530531" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530532" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530533" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530534" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530535" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530536" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530537" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530538" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530539" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530540" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530541" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530542" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530543" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530544" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530545" version="1" comment="libvirt-doc is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530546" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530547" version="1" comment="libvirt-nss is &lt;2.0.0-27.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530488" version="1" comment="qemu is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530489" version="1" comment="qemu-block-curl is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530490" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530491" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530492" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530493" version="1" comment="qemu-ipxe is &lt;1.0.0-41.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530494" version="1" comment="qemu-kvm is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530495" version="1" comment="qemu-lang is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530496" version="1" comment="qemu-seabios is &lt;1.9.1-41.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530497" version="1" comment="qemu-sgabios is &lt;8-41.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530498" version="1" comment="qemu-tools is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530499" version="1" comment="qemu-vgabios is &lt;1.9.1-41.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530500" version="1" comment="qemu-x86 is &lt;2.6.2-41.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521994" version="1" comment="ucode-intel is &lt;20190618-13.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530515" version="1" comment="xen is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530516" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530517" version="1" comment="xen-libs is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530518" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530519" version="1" comment="xen-tools is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530520" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551106" version="1" comment="libvirt is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551107" version="1" comment="libvirt-client is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551108" version="1" comment="libvirt-daemon is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551109" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551110" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551111" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551112" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551113" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551114" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551115" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551116" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551117" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551118" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551119" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551120" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551121" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551122" version="1" comment="libvirt-doc is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551123" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551124" version="1" comment="libvirt-nss is &lt;2.0.0-27.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551081" version="1" comment="qemu is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551082" version="1" comment="qemu-block-curl is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551083" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551084" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551085" version="1" comment="qemu-kvm is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551086" version="1" comment="qemu-lang is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536858" version="1" comment="qemu-ppc is &lt;2.6.2-41.52.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551087" version="1" comment="qemu-s390 is &lt;2.6.2-41.52.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551088" version="1" comment="qemu-tools is &lt;2.6.2-41.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594887" version="1" comment="libvirt is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594888" version="1" comment="libvirt-client is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594889" version="1" comment="libvirt-daemon is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594890" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594891" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594892" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594893" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594894" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594895" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594896" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594897" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594898" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594899" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594900" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594901" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594902" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594903" version="1" comment="libvirt-doc is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594904" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594905" version="1" comment="libvirt-nss is &lt;2.0.0-27.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594852" version="1" comment="qemu is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594853" version="1" comment="qemu-block-curl is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594854" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594855" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594856" version="1" comment="qemu-lang is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594857" version="1" comment="qemu-tools is &lt;2.6.2-41.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531540" version="1" comment="xen is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531541" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531542" version="1" comment="xen-libs is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531543" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531544" version="1" comment="xen-tools is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531545" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520262" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520263" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548351" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548352" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594619" version="1" comment="ntp is &lt;4.2.8p12-64.8.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594620" version="1" comment="ntp-doc is &lt;4.2.8p12-64.8.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519951" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530193" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-109.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545660" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545661" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-109.38.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545662" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594477" version="1" comment="MozillaFirefox is &lt;52.9.0esr-109.38.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594478" version="1" comment="MozillaFirefox-devel is &lt;52.9.0esr-109.38.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594479" version="1" comment="MozillaFirefox-translations is &lt;52.9.0esr-109.38.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520350" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530329" version="1" comment="MozillaFirefox-devel is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520351" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545922" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545923" version="1" comment="MozillaFirefox-devel is &lt;60.3.0-109.50.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545924" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594657" version="1" comment="MozillaFirefox is &lt;60.3.0-109.50.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594658" version="1" comment="MozillaFirefox-devel is &lt;60.3.0-109.50.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594659" version="1" comment="MozillaFirefox-translations-common is &lt;60.3.0-109.50.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530263" version="1" comment="res-signingkeys is &lt;3.0.37-52.23.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530264" version="1" comment="smt is &lt;3.0.37-52.23.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530265" version="1" comment="smt-support is &lt;3.0.37-52.23.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548301" version="1" comment="res-signingkeys is &lt;3.0.37-52.23.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548302" version="1" comment="smt is &lt;3.0.37-52.23.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548303" version="1" comment="smt-support is &lt;3.0.37-52.23.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594582" version="1" comment="res-signingkeys is &lt;3.0.37-52.23.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594583" version="1" comment="smt is &lt;3.0.37-52.23.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594584" version="1" comment="smt-support is &lt;3.0.37-52.23.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530314" version="1" comment="res-signingkeys is &lt;3.0.38-52.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530315" version="1" comment="smt is &lt;3.0.38-52.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530316" version="1" comment="smt-support is &lt;3.0.38-52.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548358" version="1" comment="res-signingkeys is &lt;3.0.38-52.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548359" version="1" comment="smt is &lt;3.0.38-52.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548360" version="1" comment="smt-support is &lt;3.0.38-52.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594629" version="1" comment="res-signingkeys is &lt;3.0.38-52.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594630" version="1" comment="smt is &lt;3.0.38-52.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594631" version="1" comment="smt-support is &lt;3.0.38-52.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596500" version="1" comment="caasp-openstack-heat-templates is &lt;1.0+git.1540887180.64bfde8-1.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530240" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530241" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530242" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530243" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530244" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.30-38.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545756" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-38.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541609" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.30-38.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545757" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-38.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594557" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.30-38.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594558" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.30-38.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594559" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.30-38.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334397" version="1" comment="rabbitmq-server is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626903" version="1" comment="libsndfile1 is &lt;1.0.25-36.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626901" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334100" version="1" comment="apache2-mod_jk is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521642" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530836" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530837" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521643" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530338" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530339" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530340" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530341" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530342" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.35-38.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530343" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530344" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530345" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530346" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.25-30.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521667" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530861" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530862" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521668" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546622" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546623" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.201-43.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546624" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.201-43.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546625" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545971" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-38.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541807" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.35-38.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545972" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-38.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548395" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-30.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541816" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.25-30.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548938" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548939" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-27.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548940" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-27.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548941" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595410" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.201-43.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595411" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.201-43.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595412" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.201-43.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595413" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.201-43.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594692" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.35-38.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594693" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.35-38.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594694" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.35-38.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594697" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.25-30.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594698" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.25-30.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595440" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.191-27.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595441" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.191-27.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595442" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.191-27.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595443" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.191-27.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530125" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530126" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530127" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530128" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530129" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.25-38.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530121" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530122" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530123" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530124" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.15-30.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545536" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-38.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541517" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.25-38.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545537" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-38.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548180" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.15-30.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009541516" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.15-30.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594425" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.25-38.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594426" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.25-38.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594427" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.25-38.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594423" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.15-30.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594424" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.15-30.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594495" version="1" comment="openstack-dashboard is &lt;10.0.6~dev4-4.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594496" version="1" comment="openstack-heat is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594497" version="1" comment="openstack-heat-api is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594498" version="1" comment="openstack-heat-api-cfn is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594499" version="1" comment="openstack-heat-api-cloudwatch is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594500" version="1" comment="openstack-heat-doc is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594501" version="1" comment="openstack-heat-engine is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594502" version="1" comment="openstack-heat-plugin-heat_docker is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594503" version="1" comment="openstack-heat-test is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594504" version="1" comment="openstack-horizon-plugin-designate-ui is &lt;3.0.2~dev1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594505" version="1" comment="openstack-keystone is &lt;10.0.3~dev9-7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594506" version="1" comment="openstack-keystone-doc is &lt;10.0.3~dev9-7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594507" version="1" comment="openstack-nova is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594508" version="1" comment="openstack-nova-api is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594509" version="1" comment="openstack-nova-cells is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594510" version="1" comment="openstack-nova-cert is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594511" version="1" comment="openstack-nova-compute is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594512" version="1" comment="openstack-nova-conductor is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594513" version="1" comment="openstack-nova-console is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594514" version="1" comment="openstack-nova-consoleauth is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594515" version="1" comment="openstack-nova-doc is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594516" version="1" comment="openstack-nova-novncproxy is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594517" version="1" comment="openstack-nova-placement-api is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594518" version="1" comment="openstack-nova-scheduler is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594519" version="1" comment="openstack-nova-serialproxy is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594520" version="1" comment="openstack-nova-vncproxy is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594521" version="1" comment="python-heat is &lt;7.0.7~dev10-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594522" version="1" comment="python-horizon is &lt;10.0.6~dev4-4.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594523" version="1" comment="python-horizon-plugin-designate-ui is &lt;3.0.2~dev1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594524" version="1" comment="python-keystone is &lt;10.0.3~dev9-7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594525" version="1" comment="python-nova is &lt;14.0.11~dev13-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594526" version="1" comment="python-os-vif is &lt;1.2.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521119" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546274" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594799" version="1" comment="wpa_supplicant is &lt;2.6-15.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530877" version="1" comment="kernel-default is &lt;4.4.121-92.104.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530878" version="1" comment="kernel-default-base is &lt;4.4.121-92.104.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530879" version="1" comment="kernel-default-devel is &lt;4.4.121-92.104.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530880" version="1" comment="kernel-devel is &lt;4.4.121-92.104.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530881" version="1" comment="kernel-macros is &lt;4.4.121-92.104.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530882" version="1" comment="kernel-source is &lt;4.4.121-92.104.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530883" version="1" comment="kernel-syms is &lt;4.4.121-92.104.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536629" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536628" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536631" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536630" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536623" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552439" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530884" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536622" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536624" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536625" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536621" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552398" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552399" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536626" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536627" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551409" version="1" comment="kernel-default is &lt;4.4.121-92.104.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551410" version="1" comment="kernel-default-base is &lt;4.4.121-92.104.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551411" version="1" comment="kernel-default-devel is &lt;4.4.121-92.104.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551412" version="1" comment="kernel-default-man is &lt;4.4.121-92.104.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551413" version="1" comment="kernel-syms is &lt;4.4.121-92.104.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537370" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537391" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536642" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536662" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595503" version="1" comment="kernel-default is &lt;4.4.121-92.104.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595504" version="1" comment="kernel-default-base is &lt;4.4.121-92.104.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595505" version="1" comment="kernel-default-devel is &lt;4.4.121-92.104.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595506" version="1" comment="kernel-syms is &lt;4.4.121-92.104.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521634" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521635" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531303" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521636" version="1" comment="python is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530816" version="1" comment="python-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521637" version="1" comment="python-base is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530817" version="1" comment="python-base-32bit is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521638" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530818" version="1" comment="python-demo is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530819" version="1" comment="python-doc is &lt;2.7.13-28.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530820" version="1" comment="python-doc-pdf is &lt;2.7.13-28.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530821" version="1" comment="python-gdbm is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530822" version="1" comment="python-idle is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521640" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521641" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531304" version="1" comment="python3 is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531305" version="1" comment="python3-base is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531306" version="1" comment="python3-curses is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531307" version="1" comment="python3-devel is &lt;3.4.10-25.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548896" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548897" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551688" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548898" version="1" comment="python is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548899" version="1" comment="python-32bit is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548900" version="1" comment="python-base is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548901" version="1" comment="python-base-32bit is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548902" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548903" version="1" comment="python-demo is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548905" version="1" comment="python-gdbm is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548906" version="1" comment="python-idle is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548907" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548908" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551689" version="1" comment="python3 is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551690" version="1" comment="python3-base is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551691" version="1" comment="python3-curses is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551692" version="1" comment="python3-devel is &lt;3.4.10-25.52.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595394" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595786" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595395" version="1" comment="python is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595396" version="1" comment="python-base is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595397" version="1" comment="python-curses is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595398" version="1" comment="python-demo is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595399" version="1" comment="python-gdbm is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595400" version="1" comment="python-idle is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595401" version="1" comment="python-tk is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595402" version="1" comment="python-xml is &lt;2.7.13-28.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595787" version="1" comment="python3 is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595788" version="1" comment="python3-base is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595789" version="1" comment="python3-curses is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595790" version="1" comment="python3-devel is &lt;3.4.10-25.52.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656968" version="1" comment="clamav is &lt;0.103.4-33.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520273" version="1" comment="clamav is &lt;0.100.2-33.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545888" version="1" comment="clamav is &lt;0.100.2-33.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594624" version="1" comment="clamav is &lt;0.100.2-33.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536891" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530863" version="1" comment="libvncclient0 is &lt;0.9.9-17.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530864" version="1" comment="libvncserver0 is &lt;0.9.9-17.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546654" version="1" comment="libvncclient0 is &lt;0.9.9-17.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546655" version="1" comment="libvncserver0 is &lt;0.9.9-17.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595449" version="1" comment="libvncclient0 is &lt;0.9.9-17.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595450" version="1" comment="libvncserver0 is &lt;0.9.9-17.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530305" version="1" comment="xen is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530306" version="1" comment="xen-doc-html is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530307" version="1" comment="xen-libs is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530308" version="1" comment="xen-libs-32bit is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530309" version="1" comment="xen-tools is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530310" version="1" comment="xen-tools-domU is &lt;4.7.6_05-43.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520384" version="1" comment="openssh is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520385" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530337" version="1" comment="openssh-fips is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520386" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550663" version="1" comment="openssh is &lt;7.2p2-74.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550664" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550665" version="1" comment="openssh-fips is &lt;7.2p2-74.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550666" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594676" version="1" comment="openssh is &lt;7.2p2-74.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594677" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594678" version="1" comment="openssh-fips is &lt;7.2p2-74.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594679" version="1" comment="openssh-helpers is &lt;7.2p2-74.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530349" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530350" version="1" comment="libQt5Core5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530351" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530352" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530353" version="1" comment="libQt5Network5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530354" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530355" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530356" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530357" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530358" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530359" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530360" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530361" version="1" comment="libQt5Test5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530362" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530363" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550678" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550679" version="1" comment="libQt5Core5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550680" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550681" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550682" version="1" comment="libQt5Network5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550683" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550684" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550685" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550686" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550687" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550688" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550689" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550690" version="1" comment="libQt5Test5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550691" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550692" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.6.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594703" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594704" version="1" comment="libQt5Core5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594705" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594706" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594707" version="1" comment="libQt5Network5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594708" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594709" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594710" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594711" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594712" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594713" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594714" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594715" version="1" comment="libQt5Test5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594716" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594717" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.6.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520352" version="1" comment="libsystemd0 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520353" version="1" comment="libsystemd0-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520354" version="1" comment="libudev1 is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520355" version="1" comment="libudev1-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520356" version="1" comment="systemd is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520357" version="1" comment="systemd-32bit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520358" version="1" comment="systemd-bash-completion is &lt;228-150.53.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520359" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520360" version="1" comment="udev is &lt;228-150.53.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550609" version="1" comment="libsystemd0 is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550610" version="1" comment="libsystemd0-32bit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550611" version="1" comment="libudev1 is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550612" version="1" comment="libudev1-32bit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550613" version="1" comment="systemd is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550614" version="1" comment="systemd-32bit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550615" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550616" version="1" comment="udev is &lt;228-150.53.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594660" version="1" comment="libsystemd0 is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594661" version="1" comment="libudev1 is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594662" version="1" comment="systemd is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594663" version="1" comment="systemd-sysvinit is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594664" version="1" comment="udev is &lt;228-150.53.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520124" version="1" comment="ghostscript is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520125" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545816" version="1" comment="ghostscript is &lt;9.25-23.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545817" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594595" version="1" comment="ghostscript is &lt;9.25-23.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594596" version="1" comment="ghostscript-x11 is &lt;9.25-23.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522250" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668119" version="1" comment="tcpdump is &lt;4.9.2-14.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522252" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548763" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548764" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595184" version="1" comment="libpcap1 is &lt;1.8.1-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595185" version="1" comment="tcpdump is &lt;4.9.2-14.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521034" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521035" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521037" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521039" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546257" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546258" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546259" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546260" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594783" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.108.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594784" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.108.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594785" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.108.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594786" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.108.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521548" version="1" comment="glib2-lang is &lt;2.48.2-12.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521549" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521550" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521551" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521553" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521554" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521555" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521556" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521557" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521558" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521559" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521560" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551161" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551162" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551163" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551164" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551165" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551166" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551167" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551168" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551169" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551170" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551171" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594991" version="1" comment="glib2-tools is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594992" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594993" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594994" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594995" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594996" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595375" version="1" comment="ruby2.1-rubygem-loofah is &lt;2.0.2-3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334389" version="1" comment="rubygem-rack is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594919" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.11-3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594958" version="1" comment="ruby2.1-rubygem-activejob-4_2 is &lt;4.2.9-3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521781" version="1" comment="curl is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521782" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521783" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546716" version="1" comment="curl is &lt;7.37.0-37.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546717" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546718" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595530" version="1" comment="curl is &lt;7.37.0-37.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595531" version="1" comment="libcurl4 is &lt;7.37.0-37.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334447" version="1" comment="openstack-octavia is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530808" version="1" comment="kernel-default is &lt;4.4.121-92.101.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530809" version="1" comment="kernel-default-base is &lt;4.4.121-92.101.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530810" version="1" comment="kernel-default-devel is &lt;4.4.121-92.101.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530811" version="1" comment="kernel-devel is &lt;4.4.121-92.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530812" version="1" comment="kernel-macros is &lt;4.4.121-92.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530813" version="1" comment="kernel-source is &lt;4.4.121-92.101.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530814" version="1" comment="kernel-syms is &lt;4.4.121-92.101.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530815" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551346" version="1" comment="kernel-default is &lt;4.4.121-92.101.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551347" version="1" comment="kernel-default-base is &lt;4.4.121-92.101.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551348" version="1" comment="kernel-default-devel is &lt;4.4.121-92.101.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551349" version="1" comment="kernel-default-man is &lt;4.4.121-92.101.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551350" version="1" comment="kernel-syms is &lt;4.4.121-92.101.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537292" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595382" version="1" comment="kernel-default is &lt;4.4.121-92.101.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595383" version="1" comment="kernel-default-base is &lt;4.4.121-92.101.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595384" version="1" comment="kernel-default-devel is &lt;4.4.121-92.101.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595385" version="1" comment="kernel-syms is &lt;4.4.121-92.101.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521202" version="1" comment="libsystemd0 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521203" version="1" comment="libsystemd0-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521204" version="1" comment="libudev1 is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521205" version="1" comment="libudev1-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521206" version="1" comment="systemd is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521207" version="1" comment="systemd-32bit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521208" version="1" comment="systemd-bash-completion is &lt;228-150.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521209" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521210" version="1" comment="udev is &lt;228-150.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551098" version="1" comment="libsystemd0 is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551099" version="1" comment="libsystemd0-32bit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551100" version="1" comment="libudev1 is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551101" version="1" comment="libudev1-32bit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551102" version="1" comment="systemd is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551103" version="1" comment="systemd-32bit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551104" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551105" version="1" comment="udev is &lt;228-150.58.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594869" version="1" comment="libsystemd0 is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594870" version="1" comment="libudev1 is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594871" version="1" comment="systemd is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594872" version="1" comment="systemd-sysvinit is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594873" version="1" comment="udev is &lt;228-150.58.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537270" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537271" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537267" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537268" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537265" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537266" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537269" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552436" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552435" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537273" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537272" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521601" version="1" comment="curl is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521602" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521603" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546549" version="1" comment="curl is &lt;7.37.0-37.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546550" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546551" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595171" version="1" comment="curl is &lt;7.37.0-37.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595172" version="1" comment="libcurl4 is &lt;7.37.0-37.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520410" version="1" comment="ghostscript is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520411" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520412" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545983" version="1" comment="ghostscript is &lt;9.26-23.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545984" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545985" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594699" version="1" comment="ghostscript is &lt;9.26-23.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594700" version="1" comment="ghostscript-x11 is &lt;9.26-23.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594701" version="1" comment="libspectre1 is &lt;0.2.7-12.4.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520140" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546621" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595388" version="1" comment="libkpathsea6 is &lt;6.2.0dev-22.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530347" version="1" comment="git-core is &lt;2.12.3-27.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530348" version="1" comment="git-doc is &lt;2.12.3-27.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545986" version="1" comment="git-core is &lt;2.12.3-27.17.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594702" version="1" comment="git-core is &lt;2.12.3-27.17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339406" version="1" comment="influxdb is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595986" version="1" comment="openstack-neutron-fwaas is &lt;9.0.2~dev5-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595987" version="1" comment="openstack-neutron-fwaas-doc is &lt;9.0.2~dev5-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595988" version="1" comment="python-neutron-fwaas is &lt;9.0.2~dev5-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530558" version="1" comment="kernel-default is &lt;4.4.121-92.114.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530559" version="1" comment="kernel-default-base is &lt;4.4.121-92.114.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530560" version="1" comment="kernel-default-devel is &lt;4.4.121-92.114.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530561" version="1" comment="kernel-devel is &lt;4.4.121-92.114.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530562" version="1" comment="kernel-macros is &lt;4.4.121-92.114.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530563" version="1" comment="kernel-source is &lt;4.4.121-92.114.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530564" version="1" comment="kernel-syms is &lt;4.4.121-92.114.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530565" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551136" version="1" comment="kernel-default is &lt;4.4.121-92.114.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551137" version="1" comment="kernel-default-base is &lt;4.4.121-92.114.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551138" version="1" comment="kernel-default-devel is &lt;4.4.121-92.114.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551139" version="1" comment="kernel-default-man is &lt;4.4.121-92.114.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551140" version="1" comment="kernel-syms is &lt;4.4.121-92.114.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536941" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;1-3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594963" version="1" comment="kernel-default is &lt;4.4.121-92.114.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594964" version="1" comment="kernel-default-base is &lt;4.4.121-92.114.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594965" version="1" comment="kernel-default-devel is &lt;4.4.121-92.114.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594966" version="1" comment="kernel-syms is &lt;4.4.121-92.114.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520274" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520275" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520276" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520277" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520278" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548353" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548354" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548355" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548356" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548357" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594625" version="1" comment="libsnmp30 is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594626" version="1" comment="net-snmp is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594627" version="1" comment="perl-SNMP is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594628" version="1" comment="snmp-mibs is &lt;5.7.3-6.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595040" version="1" comment="python-requests is &lt;2.11.1-6.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522096" version="1" comment="perl is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522097" version="1" comment="perl-32bit is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522098" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522099" version="1" comment="perl-doc is &lt;5.18.2-12.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548721" version="1" comment="perl is &lt;5.18.2-12.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548722" version="1" comment="perl-32bit is &lt;5.18.2-12.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548723" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595119" version="1" comment="perl is &lt;5.18.2-12.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595120" version="1" comment="perl-base is &lt;5.18.2-12.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521754" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530885" version="1" comment="MozillaFirefox-devel is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521755" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546683" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546684" version="1" comment="MozillaFirefox-devel is &lt;60.6.1esr-109.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546685" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595509" version="1" comment="MozillaFirefox is &lt;60.6.1esr-109.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595510" version="1" comment="MozillaFirefox-devel is &lt;60.6.1esr-109.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595511" version="1" comment="MozillaFirefox-translations-common is &lt;60.6.1esr-109.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536668" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536669" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536670" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521605" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521606" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530790" version="1" comment="MozillaFirefox-devel is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521607" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521608" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521609" version="1" comment="libfreebl3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530791" version="1" comment="libfreebl3-hmac is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530792" version="1" comment="libfreebl3-hmac-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521610" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521611" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530793" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530794" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521612" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521613" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521614" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521615" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521616" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521617" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521618" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546570" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546571" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546572" version="1" comment="MozillaFirefox-devel is &lt;60.5.0esr-109.58.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546573" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546574" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546575" version="1" comment="libfreebl3-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546576" version="1" comment="libfreebl3-hmac is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546577" version="1" comment="libfreebl3-hmac-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546578" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546579" version="1" comment="libsoftokn3-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546580" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546581" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546582" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546583" version="1" comment="mozilla-nss-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546584" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546585" version="1" comment="mozilla-nss-certs-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546587" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546588" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546589" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595354" version="1" comment="MozillaFirefox is &lt;60.5.0esr-109.58.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595355" version="1" comment="MozillaFirefox-branding-SLE is &lt;60-32.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595356" version="1" comment="MozillaFirefox-devel is &lt;60.5.0esr-109.58.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595357" version="1" comment="MozillaFirefox-translations-common is &lt;60.5.0esr-109.58.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595358" version="1" comment="libfreebl3 is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595359" version="1" comment="libfreebl3-hmac is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595360" version="1" comment="libsoftokn3 is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595361" version="1" comment="libsoftokn3-hmac is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595362" version="1" comment="mozilla-nss is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595363" version="1" comment="mozilla-nss-certs is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595364" version="1" comment="mozilla-nss-sysinit is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595365" version="1" comment="mozilla-nss-tools is &lt;3.41.1-58.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530607" version="1" comment="xen is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530608" version="1" comment="xen-doc-html is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530609" version="1" comment="xen-libs is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530610" version="1" comment="xen-libs-32bit is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530611" version="1" comment="xen-tools is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530612" version="1" comment="xen-tools-domU is &lt;4.7.6_05-43.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530870" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530871" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530872" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530873" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.30-30.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548942" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-30.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542124" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.30-30.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595454" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.30-30.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595455" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.30-30.46.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530432" version="1" comment="hostinfo is &lt;1.0.1-19.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521131" version="1" comment="supportutils is &lt;3.0-95.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521590" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521592" version="1" comment="polkit is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521593" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546528" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546529" version="1" comment="polkit is &lt;0.113-5.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546530" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595028" version="1" comment="libpolkit0 is &lt;0.113-5.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595029" version="1" comment="polkit is &lt;0.113-5.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595030" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531478" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531479" version="1" comment="libQt5Core5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531480" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531481" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531482" version="1" comment="libQt5Network5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531483" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531484" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531485" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531486" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531487" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531488" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531489" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531490" version="1" comment="libQt5Test5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531491" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531492" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551846" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551847" version="1" comment="libQt5Core5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551848" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551849" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551850" version="1" comment="libQt5Network5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551851" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551852" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551853" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551854" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551855" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551856" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551857" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551858" version="1" comment="libQt5Test5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551859" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551860" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596010" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596011" version="1" comment="libQt5Core5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596012" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596013" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596014" version="1" comment="libQt5Network5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596015" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596016" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596017" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596018" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596019" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596020" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596021" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596022" version="1" comment="libQt5Test5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596023" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596024" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530896" version="1" comment="xen is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530897" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530898" version="1" comment="xen-libs is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530899" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530900" version="1" comment="xen-tools is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530901" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595152" version="1" comment="python-urllib3 is &lt;1.16-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521121" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521122" version="1" comment="krb5-32bit is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521123" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530427" version="1" comment="krb5-doc is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530428" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530429" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530430" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530431" version="1" comment="krb5-server is &lt;1.12.5-40.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551007" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551008" version="1" comment="krb5-32bit is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551009" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551010" version="1" comment="krb5-doc is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551011" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551012" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551013" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551014" version="1" comment="krb5-server is &lt;1.12.5-40.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594801" version="1" comment="krb5 is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594802" version="1" comment="krb5-client is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594803" version="1" comment="krb5-doc is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594804" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594805" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594806" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594807" version="1" comment="krb5-server is &lt;1.12.5-40.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521758" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521759" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521760" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548950" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548951" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548952" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595522" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595523" version="1" comment="sqlite3 is &lt;3.8.10.2-9.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521597" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521598" version="1" comment="python3 is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521599" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521600" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546546" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546547" version="1" comment="python3 is &lt;3.4.6-25.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546548" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551266" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595157" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595158" version="1" comment="python3 is &lt;3.4.6-25.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595159" version="1" comment="python3-base is &lt;3.4.6-25.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595160" version="1" comment="python3-curses is &lt;3.4.6-25.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522100" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522101" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530678" version="1" comment="perl-solv is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522102" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522103" version="1" comment="zypper is &lt;1.13.54-18.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522104" version="1" comment="zypper-log is &lt;1.13.54-18.40.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551238" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551239" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551240" version="1" comment="perl-solv is &lt;0.6.36-2.27.19.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551241" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551242" version="1" comment="zypper is &lt;1.13.54-18.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595121" version="1" comment="libsolv-tools is &lt;0.6.36-2.27.19.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595122" version="1" comment="libzypp is &lt;16.20.2-27.60.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595123" version="1" comment="perl-solv is &lt;0.6.36-2.27.19.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595124" version="1" comment="python-solv is &lt;0.6.36-2.27.19.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595125" version="1" comment="zypper is &lt;1.13.54-18.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521193" version="1" comment="openssh is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521194" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530509" version="1" comment="openssh-fips is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521195" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551094" version="1" comment="openssh is &lt;7.2p2-74.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551095" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551096" version="1" comment="openssh-fips is &lt;7.2p2-74.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551097" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594862" version="1" comment="openssh is &lt;7.2p2-74.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594863" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594864" version="1" comment="openssh-fips is &lt;7.2p2-74.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594865" version="1" comment="openssh-helpers is &lt;7.2p2-74.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530784" version="1" comment="libvncclient0 is &lt;0.9.9-17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530785" version="1" comment="libvncserver0 is &lt;0.9.9-17.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546552" version="1" comment="libvncclient0 is &lt;0.9.9-17.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546553" version="1" comment="libvncserver0 is &lt;0.9.9-17.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595292" version="1" comment="libvncclient0 is &lt;0.9.9-17.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595293" version="1" comment="libvncserver0 is &lt;0.9.9-17.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530581" version="1" comment="kernel-default is &lt;4.4.121-92.117.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530582" version="1" comment="kernel-default-base is &lt;4.4.121-92.117.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530583" version="1" comment="kernel-default-devel is &lt;4.4.121-92.117.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530584" version="1" comment="kernel-devel is &lt;4.4.121-92.117.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530585" version="1" comment="kernel-macros is &lt;4.4.121-92.117.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530586" version="1" comment="kernel-source is &lt;4.4.121-92.117.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530587" version="1" comment="kernel-syms is &lt;4.4.121-92.117.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530588" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551172" version="1" comment="kernel-default is &lt;4.4.121-92.117.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551173" version="1" comment="kernel-default-base is &lt;4.4.121-92.117.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551174" version="1" comment="kernel-default-devel is &lt;4.4.121-92.117.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551175" version="1" comment="kernel-default-man is &lt;4.4.121-92.117.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551176" version="1" comment="kernel-syms is &lt;4.4.121-92.117.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536991" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595006" version="1" comment="kernel-default is &lt;4.4.121-92.117.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595007" version="1" comment="kernel-default-base is &lt;4.4.121-92.117.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595008" version="1" comment="kernel-default-devel is &lt;4.4.121-92.117.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595009" version="1" comment="kernel-syms is &lt;4.4.121-92.117.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522067" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522068" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522069" version="1" comment="python is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530623" version="1" comment="python-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522070" version="1" comment="python-base is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530624" version="1" comment="python-base-32bit is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522071" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530625" version="1" comment="python-demo is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530626" version="1" comment="python-doc is &lt;2.7.13-28.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530627" version="1" comment="python-doc-pdf is &lt;2.7.13-28.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530628" version="1" comment="python-gdbm is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530629" version="1" comment="python-idle is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522073" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522074" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522072" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548680" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548681" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548682" version="1" comment="python is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548683" version="1" comment="python-32bit is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548684" version="1" comment="python-base is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548685" version="1" comment="python-base-32bit is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548686" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548687" version="1" comment="python-demo is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548688" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548689" version="1" comment="python-gdbm is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548690" version="1" comment="python-idle is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548691" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548692" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595071" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595072" version="1" comment="python is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595073" version="1" comment="python-base is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595074" version="1" comment="python-curses is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595075" version="1" comment="python-demo is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595076" version="1" comment="python-devel is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595077" version="1" comment="python-gdbm is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595078" version="1" comment="python-idle is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595079" version="1" comment="python-tk is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595080" version="1" comment="python-xml is &lt;2.7.13-28.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552429" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;7-2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552430" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;7-2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552431" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;7-2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552432" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552433" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537243" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;7-2.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537244" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;7-2.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537245" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;7-2.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537246" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537247" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552333" version="1" comment="libwebp5 is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538993" version="1" comment="libwebp5-32bit is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552334" version="1" comment="libwebpdemux1 is &lt;0.4.3-4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596320" version="1" comment="libwebpmux1 is &lt;0.4.3-4.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666910" version="1" comment="kernel-default is &lt;4.4.121-92.164.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666911" version="1" comment="kernel-default-base is &lt;4.4.121-92.164.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666912" version="1" comment="kernel-default-devel is &lt;4.4.121-92.164.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666913" version="1" comment="kernel-devel is &lt;4.4.121-92.164.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666914" version="1" comment="kernel-macros is &lt;4.4.121-92.164.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666915" version="1" comment="kernel-source is &lt;4.4.121-92.164.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666916" version="1" comment="kernel-syms is &lt;4.4.121-92.164.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677126" version="1" comment="libz1 is &lt;1.2.8-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677109" version="1" comment="libz1-32bit is &lt;1.2.8-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677127" version="1" comment="zlib-devel is &lt;1.2.8-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550786" version="1" comment="libmysqlclient18 is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548438" version="1" comment="libmysqlclient18-32bit is &lt;10.0.34-29.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550787" version="1" comment="mariadb is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550788" version="1" comment="mariadb-client is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550789" version="1" comment="mariadb-errormessages is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550790" version="1" comment="mariadb-tools is &lt;10.0.34-29.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550769" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550770" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550771" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550772" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.171-43.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546069" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.20-38.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535646" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.20-38.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546070" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.20-38.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535649" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.20-38.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548431" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.10-30.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535629" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.10-30.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009535631" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.10-30.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550773" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550774" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550775" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550776" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.161-27.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519740" version="1" comment="libmysqlclient18 is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519741" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519744" version="1" comment="mariadb is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519745" version="1" comment="mariadb-client is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519746" version="1" comment="mariadb-errormessages is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530130" version="1" comment="mariadb-tools is &lt;10.0.35-29.20.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548189" version="1" comment="libmysqlclient18 is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548190" version="1" comment="libmysqlclient18-32bit is &lt;10.0.35-29.20.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548194" version="1" comment="mariadb is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548195" version="1" comment="mariadb-client is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548196" version="1" comment="mariadb-errormessages is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548197" version="1" comment="mariadb-tools is &lt;10.0.35-29.20.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519713" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530113" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530114" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519714" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519711" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530111" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530112" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519712" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545518" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545519" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.181-43.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545520" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.181-43.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545521" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548176" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548177" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.171-27.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548178" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.171-27.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548179" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594418" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.181-43.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594419" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.181-43.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594420" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.181-43.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594421" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.181-43.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594414" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.171-27.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594415" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.171-27.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594416" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.171-27.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594417" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.171-27.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334125" version="1" comment="java-1_7_0-openjdk is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333949" version="1" comment="java-1_8_0-openjdk is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520141" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530284" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530285" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009520142" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548314" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548315" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-27.26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548316" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-27.26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548317" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594599" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.181-27.26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594600" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.181-27.26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594601" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.181-27.26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594602" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.181-27.26.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530407" version="1" comment="kernel-default is &lt;4.4.121-92.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530408" version="1" comment="kernel-default-base is &lt;4.4.121-92.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530409" version="1" comment="kernel-default-devel is &lt;4.4.121-92.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530410" version="1" comment="kernel-devel is &lt;4.4.121-92.80.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530411" version="1" comment="kernel-macros is &lt;4.4.121-92.80.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530412" version="1" comment="kernel-source is &lt;4.4.121-92.80.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530413" version="1" comment="kernel-syms is &lt;4.4.121-92.80.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530414" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;1-3.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530090" version="1" comment="libvirt is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530091" version="1" comment="libvirt-client is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530092" version="1" comment="libvirt-daemon is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530093" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530094" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530095" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530096" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530097" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530098" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530099" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530100" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530101" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530102" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530103" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530104" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530105" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530106" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530107" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530108" version="1" comment="libvirt-doc is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530109" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530110" version="1" comment="libvirt-nss is &lt;2.0.0-27.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519961" version="1" comment="ucode-intel is &lt;20180807-13.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550997" version="1" comment="kernel-default is &lt;4.4.121-92.80.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550998" version="1" comment="kernel-default-base is &lt;4.4.121-92.80.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550999" version="1" comment="kernel-default-devel is &lt;4.4.121-92.80.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551000" version="1" comment="kernel-default-man is &lt;4.4.121-92.80.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551001" version="1" comment="kernel-syms is &lt;4.4.121-92.80.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550397" version="1" comment="libvirt is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550398" version="1" comment="libvirt-client is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550399" version="1" comment="libvirt-daemon is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550400" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550401" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550402" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550403" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550404" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550405" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550406" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550407" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550408" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550409" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550410" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550411" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550412" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550413" version="1" comment="libvirt-doc is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550414" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550415" version="1" comment="libvirt-nss is &lt;2.0.0-27.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594759" version="1" comment="kernel-default is &lt;4.4.121-92.80.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594760" version="1" comment="kernel-default-base is &lt;4.4.121-92.80.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594761" version="1" comment="kernel-default-devel is &lt;4.4.121-92.80.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594762" version="1" comment="kernel-syms is &lt;4.4.121-92.80.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594395" version="1" comment="libvirt is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594396" version="1" comment="libvirt-client is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594397" version="1" comment="libvirt-daemon is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594398" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594399" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594400" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594401" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594402" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594403" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594404" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594405" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594406" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594407" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594408" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594409" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594410" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594411" version="1" comment="libvirt-doc is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594412" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594413" version="1" comment="libvirt-nss is &lt;2.0.0-27.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530205" version="1" comment="xen is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530206" version="1" comment="xen-doc-html is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530207" version="1" comment="xen-libs is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530208" version="1" comment="xen-libs-32bit is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530209" version="1" comment="xen-tools is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530210" version="1" comment="xen-tools-domU is &lt;4.7.6_04-43.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536504" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536505" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536502" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536503" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536509" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536510" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536508" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536513" version="1" comment="kgraft-patch-4_4_74-92_29-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536512" version="1" comment="kgraft-patch-4_4_74-92_32-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536515" version="1" comment="kgraft-patch-4_4_74-92_35-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536514" version="1" comment="kgraft-patch-4_4_74-92_38-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536506" version="1" comment="kgraft-patch-4_4_90-92_45-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536507" version="1" comment="kgraft-patch-4_4_90-92_50-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595117" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.3-8.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594532" version="1" comment="crowbar-openstack is &lt;4.0+git.1534254269.ce598a9fe-9.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594454" version="1" comment="ruby2.1-rubygem-sprockets-2_12 is &lt;2.12.5-1.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339407" version="1" comment="elasticsearch is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521678" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521679" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521681" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521682" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521683" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551385" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551386" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551387" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551388" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551389" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595444" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595445" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595446" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595447" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595448" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.4-2.29.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521430" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521431" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521432" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.5-2.32.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521433" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521434" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530555" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521435" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530556" version="1" comment="webkit2gtk3-devel is &lt;2.22.5-2.32.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551125" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551126" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551127" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551128" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551129" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551130" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551131" version="1" comment="webkit2gtk3-devel is &lt;2.22.5-2.32.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594951" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594952" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594953" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594954" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594955" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594956" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594957" version="1" comment="webkit2gtk3-devel is &lt;2.22.5-2.32.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550607" version="1" comment="MozillaFirefox is &lt;52.6.0esr-109.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550608" version="1" comment="MozillaFirefox-translations is &lt;52.6.0esr-109.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550908" version="1" comment="MozillaFirefox is &lt;52.7.3esr-109.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550909" version="1" comment="MozillaFirefox-translations is &lt;52.7.3esr-109.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009533250" version="1" comment="libvorbis-doc is &lt;1.3.3-10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550812" version="1" comment="libvorbis0 is &lt;1.3.3-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550813" version="1" comment="libvorbis0-32bit is &lt;1.3.3-10.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550814" version="1" comment="libvorbisenc2 is &lt;1.3.3-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550815" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-10.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550816" version="1" comment="libvorbisfile3 is &lt;1.3.3-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550817" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-10.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546207" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-109.31.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594752" version="1" comment="MozillaFirefox-translations is &lt;52.8.0esr-109.31.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521632" version="1" comment="kernel-firmware is &lt;20170530-21.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521633" version="1" comment="ucode-amd is &lt;20170530-21.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552440" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552400" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552406" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552413" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552416" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537409" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536890" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536978" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537105" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537162" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536663" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536664" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536667" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536666" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536665" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536671" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550511" version="1" comment="gd is &lt;2.1.0-24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550900" version="1" comment="krb5 is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550901" version="1" comment="krb5-32bit is &lt;1.12.5-40.23.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550902" version="1" comment="krb5-client is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550903" version="1" comment="krb5-doc is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550904" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550905" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550906" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550907" version="1" comment="krb5-server is &lt;1.12.5-40.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550824" version="1" comment="dhcp is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550825" version="1" comment="dhcp-client is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550826" version="1" comment="dhcp-relay is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550827" version="1" comment="dhcp-server is &lt;4.3.3-10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530524" version="1" comment="bind is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530525" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530526" version="1" comment="bind-doc is &lt;9.9.9P1-63.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521234" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521235" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548569" version="1" comment="bind is &lt;9.9.9P1-63.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548570" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548572" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548573" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594883" version="1" comment="bind is &lt;9.9.9P1-63.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594884" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594885" version="1" comment="bind-libs is &lt;9.9.9P1-63.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594886" version="1" comment="bind-utils is &lt;9.9.9P1-63.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531096" version="1" comment="bind is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531097" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531098" version="1" comment="bind-doc is &lt;9.9.9P1-63.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531099" version="1" comment="bind-libs is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531100" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531101" version="1" comment="bind-utils is &lt;9.9.9P1-63.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551531" version="1" comment="bind is &lt;9.9.9P1-63.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551532" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551533" version="1" comment="bind-libs is &lt;9.9.9P1-63.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551534" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551535" version="1" comment="bind-utils is &lt;9.9.9P1-63.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595659" version="1" comment="bind is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595660" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595661" version="1" comment="bind-libs is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595662" version="1" comment="bind-utils is &lt;9.9.9P1-63.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550633" version="1" comment="libvirt is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550634" version="1" comment="libvirt-client is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550635" version="1" comment="libvirt-daemon is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550636" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550637" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550638" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518865" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550639" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550640" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550641" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550642" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550643" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550644" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550645" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550646" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550647" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009518875" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550648" version="1" comment="libvirt-doc is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550649" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550650" version="1" comment="libvirt-nss is &lt;2.0.0-27.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550416" version="1" comment="rsync is &lt;3.1.0-13.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536699" version="1" comment="kgraft-patch-4_4_103-92_53-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536698" version="1" comment="kgraft-patch-4_4_103-92_56-default is &lt;12-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536701" version="1" comment="kgraft-patch-4_4_114-92_64-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536700" version="1" comment="kgraft-patch-4_4_114-92_67-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536695" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536696" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536697" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334127" version="1" comment="libtasn1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009519747" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530131" version="1" comment="MozillaFirefox-devel is &lt;52.8.1esr-109.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545538" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545539" version="1" comment="MozillaFirefox-devel is &lt;52.8.1esr-109.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009545540" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-109.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594430" version="1" comment="MozillaFirefox is &lt;52.8.1esr-109.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594431" version="1" comment="MozillaFirefox-devel is &lt;52.8.1esr-109.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594432" version="1" comment="MozillaFirefox-translations is &lt;52.8.1esr-109.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334024" version="1" comment="libgcrypt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521175" version="1" comment="libsystemd0 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521176" version="1" comment="libsystemd0-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521177" version="1" comment="libudev1 is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521178" version="1" comment="libudev1-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521179" version="1" comment="systemd is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521180" version="1" comment="systemd-32bit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521181" version="1" comment="systemd-bash-completion is &lt;228-150.66.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521182" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521183" version="1" comment="udev is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530487" version="1" comment="libudev-devel is &lt;228-150.66.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551072" version="1" comment="libsystemd0 is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551073" version="1" comment="libsystemd0-32bit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551074" version="1" comment="libudev-devel is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551075" version="1" comment="libudev1 is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551076" version="1" comment="libudev1-32bit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551077" version="1" comment="systemd is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551078" version="1" comment="systemd-32bit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551079" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551080" version="1" comment="udev is &lt;228-150.66.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594846" version="1" comment="libsystemd0 is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594847" version="1" comment="libudev-devel is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594848" version="1" comment="libudev1 is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594849" version="1" comment="systemd is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594850" version="1" comment="systemd-sysvinit is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594851" version="1" comment="udev is &lt;228-150.66.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594746" version="1" comment="nodejs6 is &lt;6.14.1-11.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594450" version="1" comment="nodejs6 is &lt;6.14.3-11.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550768" version="1" comment="shadow is &lt;4.2.1-27.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334129" version="1" comment="tigervnc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334323" version="1" comment="LibVNCServer is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339511" version="1" comment="zsh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334131" version="1" comment="libzypp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334096" version="1" comment="exempi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530795" version="1" comment="libblkid1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530796" version="1" comment="libblkid1-32bit is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530797" version="1" comment="libfdisk1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530798" version="1" comment="libmount1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530799" version="1" comment="libmount1-32bit is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530800" version="1" comment="libsmartcols1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530801" version="1" comment="libuuid1 is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530802" version="1" comment="libuuid1-32bit is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530803" version="1" comment="python-libmount is &lt;2.28-44.18.38 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530804" version="1" comment="util-linux is &lt;2.28-44.18.18 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530805" version="1" comment="util-linux-lang is &lt;2.28-44.18.18 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530806" version="1" comment="util-linux-systemd is &lt;2.28-44.18.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530807" version="1" comment="uuidd is &lt;2.28-44.18.25 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551326" version="1" comment="libblkid1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551327" version="1" comment="libblkid1-32bit is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551328" version="1" comment="libfdisk1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551329" version="1" comment="libmount1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551330" version="1" comment="libmount1-32bit is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551331" version="1" comment="libsmartcols1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551332" version="1" comment="libuuid1 is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551333" version="1" comment="libuuid1-32bit is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551334" version="1" comment="python-libmount is &lt;2.28-44.18.38 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551335" version="1" comment="util-linux is &lt;2.28-44.18.18 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551336" version="1" comment="util-linux-systemd is &lt;2.28-44.18.25 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551337" version="1" comment="uuidd is &lt;2.28-44.18.25 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595366" version="1" comment="libblkid1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595367" version="1" comment="libfdisk1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595368" version="1" comment="libmount1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595369" version="1" comment="libsmartcols1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595370" version="1" comment="libuuid1 is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595371" version="1" comment="python-libmount is &lt;2.28-44.18.38 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595372" version="1" comment="util-linux is &lt;2.28-44.18.18 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595373" version="1" comment="util-linux-systemd is &lt;2.28-44.18.25 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595374" version="1" comment="uuidd is &lt;2.28-44.18.25 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594737" version="1" comment="python-paramiko is &lt;2.0.8-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550912" version="1" comment="libgraphite2-3 is &lt;1.3.1-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009550913" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-10.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595118" version="1" comment="ruby2.1-rubygem-loofah is &lt;2.0.2-3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663980" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663981" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663972" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.3-2.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663982" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663983" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663984" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663985" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663986" version="1" comment="webkit2gtk3-devel is &lt;2.34.3-2.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531066" version="1" comment="ntp is &lt;4.2.8p15-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531067" version="1" comment="ntp-doc is &lt;4.2.8p15-88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551502" version="1" comment="ntp is &lt;4.2.8p15-88.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551503" version="1" comment="ntp-doc is &lt;4.2.8p15-88.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595639" version="1" comment="ntp is &lt;4.2.8p15-88.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595640" version="1" comment="ntp-doc is &lt;4.2.8p15-88.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333951" version="1" comment="gpg2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334133" version="1" comment="openvpn is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552459" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537677" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530886" version="1" comment="apache2 is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530887" version="1" comment="apache2-doc is &lt;2.4.23-29.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530888" version="1" comment="apache2-example-pages is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530889" version="1" comment="apache2-prefork is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530890" version="1" comment="apache2-utils is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530891" version="1" comment="apache2-worker is &lt;2.4.23-29.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551417" version="1" comment="apache2 is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551418" version="1" comment="apache2-example-pages is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551419" version="1" comment="apache2-prefork is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551420" version="1" comment="apache2-utils is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551421" version="1" comment="apache2-worker is &lt;2.4.23-29.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595512" version="1" comment="apache2 is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595513" version="1" comment="apache2-example-pages is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595514" version="1" comment="apache2-prefork is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595515" version="1" comment="apache2-utils is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595516" version="1" comment="apache2-worker is &lt;2.4.23-29.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530964" version="1" comment="tomcat is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530965" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530966" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530967" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530968" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530969" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530970" version="1" comment="tomcat-lib is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530971" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530972" version="1" comment="tomcat-webapps is &lt;8.0.53-29.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522052" version="1" comment="evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522053" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522054" version="1" comment="evince-lang is &lt;3.20.2-6.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522055" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522056" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522057" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522058" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522059" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522060" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522061" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522062" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522063" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551199" version="1" comment="evince is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551200" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551201" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551202" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551203" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551204" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551205" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551206" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551207" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551208" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551209" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595059" version="1" comment="evince is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595060" version="1" comment="evince-browser-plugin is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595061" version="1" comment="evince-plugin-djvudocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595062" version="1" comment="evince-plugin-dvidocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595063" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595064" version="1" comment="evince-plugin-psdocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595065" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595066" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595067" version="1" comment="libevdocument3-4 is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595068" version="1" comment="libevview3-3 is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595069" version="1" comment="nautilus-evince is &lt;3.20.2-6.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530772" version="1" comment="gdb is &lt;8.3.1-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548818" version="1" comment="gdb is &lt;8.3.1-1.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595266" version="1" comment="gdb is &lt;8.3.1-1.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530630" version="1" comment="libvirt is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530631" version="1" comment="libvirt-client is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530632" version="1" comment="libvirt-daemon is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530633" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530634" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530635" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530636" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530637" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530638" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530639" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530640" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530641" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530642" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530643" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530644" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530645" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530646" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530647" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530648" version="1" comment="libvirt-doc is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530649" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530650" version="1" comment="libvirt-nss is &lt;2.0.0-27.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551211" version="1" comment="libvirt is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551212" version="1" comment="libvirt-client is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551213" version="1" comment="libvirt-daemon is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551214" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551215" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551216" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551217" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551218" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551219" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551220" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551221" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551222" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551223" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551224" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551225" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551226" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551227" version="1" comment="libvirt-doc is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551228" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551229" version="1" comment="libvirt-nss is &lt;2.0.0-27.61.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595081" version="1" comment="libvirt is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595082" version="1" comment="libvirt-client is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595083" version="1" comment="libvirt-daemon is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595084" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595085" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595086" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595087" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595088" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595089" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595090" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595091" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595092" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595093" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595094" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595095" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595096" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595097" version="1" comment="libvirt-doc is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595098" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595099" version="1" comment="libvirt-nss is &lt;2.0.0-27.61.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521936" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521937" version="1" comment="libpq5 is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521938" version="1" comment="libpq5-32bit is &lt;10.9-1.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521939" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530575" version="1" comment="postgresql10-contrib is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530576" version="1" comment="postgresql10-docs is &lt;10.9-1.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530577" version="1" comment="postgresql10-plperl is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530578" version="1" comment="postgresql10-plpython is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530579" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530580" version="1" comment="postgresql10-server is &lt;10.9-1.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546508" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546509" version="1" comment="libpq5 is &lt;10.9-1.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546510" version="1" comment="libpq5-32bit is &lt;10.9-1.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546511" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546512" version="1" comment="postgresql10-contrib is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546513" version="1" comment="postgresql10-plperl is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546514" version="1" comment="postgresql10-plpython is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546515" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546516" version="1" comment="postgresql10-server is &lt;10.9-1.12.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594998" version="1" comment="libecpg6 is &lt;10.9-1.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594999" version="1" comment="libpq5 is &lt;10.9-1.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595000" version="1" comment="postgresql10 is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595001" version="1" comment="postgresql10-contrib is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595002" version="1" comment="postgresql10-plperl is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595003" version="1" comment="postgresql10-plpython is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595004" version="1" comment="postgresql10-pltcl is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595005" version="1" comment="postgresql10-server is &lt;10.9-1.12.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530664" version="1" comment="postgresql94 is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530665" version="1" comment="postgresql94-contrib is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530666" version="1" comment="postgresql94-docs is &lt;9.4.24-21.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530667" version="1" comment="postgresql94-plperl is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530668" version="1" comment="postgresql94-plpython is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530669" version="1" comment="postgresql94-pltcl is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530670" version="1" comment="postgresql94-server is &lt;9.4.24-21.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530671" version="1" comment="postgresql96 is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530672" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530673" version="1" comment="postgresql96-docs is &lt;9.6.15-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530674" version="1" comment="postgresql96-plperl is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530675" version="1" comment="postgresql96-plpython is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530676" version="1" comment="postgresql96-pltcl is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530677" version="1" comment="postgresql96-server is &lt;9.6.15-3.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548696" version="1" comment="postgresql94 is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548697" version="1" comment="postgresql94-contrib is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548698" version="1" comment="postgresql94-plperl is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548699" version="1" comment="postgresql94-plpython is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548700" version="1" comment="postgresql94-pltcl is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548701" version="1" comment="postgresql94-server is &lt;9.4.24-21.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548702" version="1" comment="postgresql96 is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548703" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548704" version="1" comment="postgresql96-plperl is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548705" version="1" comment="postgresql96-plpython is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548706" version="1" comment="postgresql96-pltcl is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548707" version="1" comment="postgresql96-server is &lt;9.6.15-3.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595106" version="1" comment="postgresql94 is &lt;9.4.24-21.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595107" version="1" comment="postgresql94-contrib is &lt;9.4.24-21.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595108" version="1" comment="postgresql94-server is &lt;9.4.24-21.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595109" version="1" comment="postgresql96 is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595110" version="1" comment="postgresql96-contrib is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595111" version="1" comment="postgresql96-plperl is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595112" version="1" comment="postgresql96-plpython is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595113" version="1" comment="postgresql96-pltcl is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595114" version="1" comment="postgresql96-server is &lt;9.6.15-3.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530727" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530728" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530729" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530730" version="1" comment="libdcerpc0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530731" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530732" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530733" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530734" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530735" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530736" version="1" comment="libndr-standard0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530737" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530738" version="1" comment="libndr0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530739" version="1" comment="libndr0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530740" version="1" comment="libnetapi0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530741" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530742" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530743" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530744" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530745" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530746" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530747" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530748" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530749" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530750" version="1" comment="libsamba-util0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530751" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530752" version="1" comment="libsamdb0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530753" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530754" version="1" comment="libsmbclient0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530755" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530756" version="1" comment="libsmbconf0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530757" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530758" version="1" comment="libsmbldap0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530759" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530760" version="1" comment="libtevent-util0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530761" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530762" version="1" comment="libwbclient0 is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530763" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530764" version="1" comment="samba is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530765" version="1" comment="samba-client is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530766" version="1" comment="samba-client-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530767" version="1" comment="samba-doc is &lt;4.4.2-38.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530768" version="1" comment="samba-libs is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530769" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530770" version="1" comment="samba-winbind is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530771" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551274" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551275" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551276" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551277" version="1" comment="libdcerpc0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551278" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551279" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551280" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551281" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551282" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551283" version="1" comment="libndr-standard0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551284" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551285" version="1" comment="libndr0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551286" version="1" comment="libndr0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551287" version="1" comment="libnetapi0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551288" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551289" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551290" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551291" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551292" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551293" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551294" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551295" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551296" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551297" version="1" comment="libsamba-util0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551298" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551299" version="1" comment="libsamdb0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551300" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551301" version="1" comment="libsmbclient0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551302" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551303" version="1" comment="libsmbconf0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551304" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551305" version="1" comment="libsmbldap0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551306" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551307" version="1" comment="libtevent-util0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551308" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551309" version="1" comment="libwbclient0 is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551310" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551311" version="1" comment="samba is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551312" version="1" comment="samba-client is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551313" version="1" comment="samba-client-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551314" version="1" comment="samba-libs is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551315" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551316" version="1" comment="samba-winbind is &lt;4.4.2-38.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551317" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595243" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595244" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595245" version="1" comment="libdcerpc0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595246" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595247" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595248" version="1" comment="libndr-standard0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595249" version="1" comment="libndr0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595250" version="1" comment="libnetapi0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595251" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595252" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595253" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595254" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595255" version="1" comment="libsamba-util0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595256" version="1" comment="libsamdb0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595257" version="1" comment="libsmbclient0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595258" version="1" comment="libsmbconf0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595259" version="1" comment="libsmbldap0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595260" version="1" comment="libtevent-util0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595261" version="1" comment="libwbclient0 is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595262" version="1" comment="samba is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595263" version="1" comment="samba-client is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595264" version="1" comment="samba-libs is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595265" version="1" comment="samba-winbind is &lt;4.4.2-38.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552434" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552422" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537248" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537180" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530510" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530511" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530512" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530513" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530514" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.45-38.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530570" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530571" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530572" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530573" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr5.35-30.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546364" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-38.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542012" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-38.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546365" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-38.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548612" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-30.50.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542060" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.35-30.50.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594866" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.45-38.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594867" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.45-38.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594868" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.45-38.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594985" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr5.35-30.50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594986" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr5.35-30.50.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521136" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521137" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521138" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.1-2.41.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521139" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521140" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530436" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521141" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530437" version="1" comment="webkit2gtk3-devel is &lt;2.24.1-2.41.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551021" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551022" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551023" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551024" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551025" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551026" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551027" version="1" comment="webkit2gtk3-devel is &lt;2.24.1-2.41.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594812" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594813" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594814" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594815" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594816" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594817" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594818" version="1" comment="webkit2gtk3-devel is &lt;2.24.1-2.41.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522383" version="1" comment="ucode-intel is &lt;20191112a-13.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530416" version="1" comment="freeradius-server is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530417" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530418" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530419" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530420" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530421" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530422" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530423" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530424" version="1" comment="freeradius-server-python is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530425" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530426" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546261" version="1" comment="freeradius-server is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546262" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546263" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546264" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546265" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546266" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546267" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546268" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546269" version="1" comment="freeradius-server-python is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546270" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546271" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594787" version="1" comment="freeradius-server is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594788" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594789" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594790" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594791" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594792" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594793" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594794" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594795" version="1" comment="freeradius-server-python is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594796" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594797" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521120" version="1" comment="atftp is &lt;0.7.0-160.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546275" version="1" comment="atftp is &lt;0.7.0-160.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594800" version="1" comment="atftp is &lt;0.7.0-160.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552409" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552410" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552411" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536963" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537013" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552407" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552408" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537016" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537017" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537018" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537014" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537015" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552412" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537019" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552405" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552404" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552403" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536962" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552401" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552402" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536968" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536967" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536966" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536964" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009536965" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530710" version="1" comment="dovecot22 is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530711" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530712" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530713" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548746" version="1" comment="dovecot22 is &lt;2.2.31-19.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548747" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548748" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548749" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595165" version="1" comment="dovecot22 is &lt;2.2.31-19.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595166" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595167" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595168" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521224" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530521" version="1" comment="MozillaFirefox-devel is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521225" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546376" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546377" version="1" comment="MozillaFirefox-devel is &lt;60.7.0-109.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546378" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594876" version="1" comment="MozillaFirefox is &lt;60.7.0-109.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594877" version="1" comment="MozillaFirefox-devel is &lt;60.7.0-109.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594878" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.0-109.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562509" version="1" comment="MozillaFirefox is &lt;60.7.1-109.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562511" version="1" comment="MozillaFirefox-devel is &lt;60.7.1-109.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562510" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.1-109.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562512" version="1" comment="MozillaFirefox is &lt;60.7.1-109.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562513" version="1" comment="MozillaFirefox-devel is &lt;60.7.1-109.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562514" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.1-109.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596501" version="1" comment="MozillaFirefox is &lt;60.7.1-109.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596502" version="1" comment="MozillaFirefox-devel is &lt;60.7.1-109.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596503" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.1-109.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521537" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530574" version="1" comment="MozillaFirefox-devel is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521538" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546473" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546474" version="1" comment="MozillaFirefox-devel is &lt;60.7.2-109.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546475" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594987" version="1" comment="MozillaFirefox is &lt;60.7.2-109.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594988" version="1" comment="MozillaFirefox-devel is &lt;60.7.2-109.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594989" version="1" comment="MozillaFirefox-translations-common is &lt;60.7.2-109.80.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522245" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522246" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530716" version="1" comment="MozillaFirefox-devel is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522247" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521976" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521977" version="1" comment="libfreebl3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530590" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530591" version="1" comment="libfreebl3-hmac-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521978" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521979" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530592" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530593" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521980" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521981" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521982" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521983" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521984" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521985" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521986" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548756" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548757" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548758" version="1" comment="MozillaFirefox-devel is &lt;68.1.0-109.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548759" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548633" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548634" version="1" comment="libfreebl3-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548635" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548636" version="1" comment="libfreebl3-hmac-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548637" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548638" version="1" comment="libsoftokn3-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548639" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548640" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548641" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548642" version="1" comment="mozilla-nss-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548643" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548644" version="1" comment="mozilla-nss-certs-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548646" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548647" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548648" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595177" version="1" comment="MozillaFirefox is &lt;68.1.0-109.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595178" version="1" comment="MozillaFirefox-branding-SLE is &lt;68-32.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595179" version="1" comment="MozillaFirefox-devel is &lt;68.1.0-109.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595180" version="1" comment="MozillaFirefox-translations-common is &lt;68.1.0-109.89.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595020" version="1" comment="libfreebl3 is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595021" version="1" comment="libfreebl3-hmac is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595022" version="1" comment="libsoftokn3 is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595023" version="1" comment="libsoftokn3-hmac is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595024" version="1" comment="mozilla-nss is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595025" version="1" comment="mozilla-nss-certs is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595026" version="1" comment="mozilla-nss-sysinit is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595027" version="1" comment="mozilla-nss-tools is &lt;3.44.1-58.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522433" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530789" version="1" comment="MozillaFirefox-devel is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522434" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522675" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522676" version="1" comment="libfreebl3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531795" version="1" comment="libfreebl3-hmac is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531796" version="1" comment="libfreebl3-hmac-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522677" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522678" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531797" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531798" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522679" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522680" version="1" comment="mozilla-nspr-32bit is &lt;4.23-19.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522681" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522682" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522683" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522684" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522685" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522686" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522687" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548857" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548858" version="1" comment="MozillaFirefox-devel is &lt;68.3.0-109.98.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548859" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549126" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549127" version="1" comment="libfreebl3-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549128" version="1" comment="libfreebl3-hmac is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549129" version="1" comment="libfreebl3-hmac-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549130" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549131" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549132" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549133" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549134" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549135" version="1" comment="mozilla-nspr-32bit is &lt;4.23-19.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549137" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549138" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549139" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549140" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549142" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549143" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549144" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595351" version="1" comment="MozillaFirefox is &lt;68.3.0-109.98.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595352" version="1" comment="MozillaFirefox-devel is &lt;68.3.0-109.98.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595353" version="1" comment="MozillaFirefox-translations-common is &lt;68.3.0-109.98.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596287" version="1" comment="libfreebl3 is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596288" version="1" comment="libfreebl3-hmac is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596289" version="1" comment="libsoftokn3 is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596290" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596291" version="1" comment="mozilla-nspr is &lt;4.23-19.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596292" version="1" comment="mozilla-nss is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596293" version="1" comment="mozilla-nss-certs is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596294" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596295" version="1" comment="mozilla-nss-tools is &lt;3.47.1-58.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530688" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530689" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530690" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530691" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530692" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.50-38.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548727" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-38.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542250" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-38.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548728" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-38.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595131" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.50-38.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595132" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.50-38.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595133" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.50-38.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530990" version="1" comment="qemu is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530991" version="1" comment="qemu-block-curl is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530992" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530993" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530994" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530995" version="1" comment="qemu-ipxe is &lt;1.0.0-41.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530996" version="1" comment="qemu-kvm is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530997" version="1" comment="qemu-lang is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530998" version="1" comment="qemu-seabios is &lt;1.9.1-41.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530999" version="1" comment="qemu-sgabios is &lt;8-41.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531000" version="1" comment="qemu-tools is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531001" version="1" comment="qemu-vgabios is &lt;1.9.1-41.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531002" version="1" comment="qemu-x86 is &lt;2.6.2-41.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530720" version="1" comment="xen is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530721" version="1" comment="xen-doc-html is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530722" version="1" comment="xen-libs is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530723" version="1" comment="xen-libs-32bit is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530724" version="1" comment="xen-tools is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530725" version="1" comment="xen-tools-domU is &lt;4.7.6_06-43.54.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551454" version="1" comment="qemu is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551455" version="1" comment="qemu-block-curl is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551456" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551457" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551458" version="1" comment="qemu-kvm is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551459" version="1" comment="qemu-lang is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537488" version="1" comment="qemu-ppc is &lt;2.6.2-41.59.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551460" version="1" comment="qemu-s390 is &lt;2.6.2-41.59.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551461" version="1" comment="qemu-tools is &lt;2.6.2-41.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595592" version="1" comment="qemu is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595593" version="1" comment="qemu-block-curl is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595594" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595595" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595596" version="1" comment="qemu-lang is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595597" version="1" comment="qemu-tools is &lt;2.6.2-41.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530651" version="1" comment="qemu is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530652" version="1" comment="qemu-block-curl is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530653" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530654" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530655" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530656" version="1" comment="qemu-ipxe is &lt;1.0.0-41.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530657" version="1" comment="qemu-kvm is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530658" version="1" comment="qemu-lang is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530659" version="1" comment="qemu-seabios is &lt;1.9.1-41.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530660" version="1" comment="qemu-sgabios is &lt;8-41.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530661" version="1" comment="qemu-tools is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530662" version="1" comment="qemu-vgabios is &lt;1.9.1-41.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530663" version="1" comment="qemu-x86 is &lt;2.6.2-41.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551230" version="1" comment="qemu is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551231" version="1" comment="qemu-block-curl is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551232" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551233" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551234" version="1" comment="qemu-kvm is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551235" version="1" comment="qemu-lang is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537091" version="1" comment="qemu-ppc is &lt;2.6.2-41.55.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551236" version="1" comment="qemu-s390 is &lt;2.6.2-41.55.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551237" version="1" comment="qemu-tools is &lt;2.6.2-41.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595100" version="1" comment="qemu is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595101" version="1" comment="qemu-block-curl is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595102" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595103" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595104" version="1" comment="qemu-lang is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595105" version="1" comment="qemu-tools is &lt;2.6.2-41.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595058" version="1" comment="python-Twisted is &lt;15.2.1-9.5.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552206" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.5-44.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552207" version="1" comment="spamassassin is &lt;3.4.5-44.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530946" version="1" comment="squid is &lt;3.5.21-26.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551443" version="1" comment="squid is &lt;3.5.21-26.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595569" version="1" comment="squid is &lt;3.5.21-26.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531763" version="1" comment="squid is &lt;3.5.21-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552043" version="1" comment="squid is &lt;3.5.21-26.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596232" version="1" comment="squid is &lt;3.5.21-26.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530622" version="1" comment="squid is &lt;3.5.21-26.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551210" version="1" comment="squid is &lt;3.5.21-26.17.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595070" version="1" comment="squid is &lt;3.5.21-26.17.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522401" version="1" comment="clamav is &lt;0.100.3-33.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548845" version="1" comment="clamav is &lt;0.100.3-33.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595286" version="1" comment="clamav is &lt;0.100.3-33.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521427" version="1" comment="gvim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521428" version="1" comment="vim is &lt;7.4.326-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521429" version="1" comment="vim-data is &lt;7.4.326-17.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546416" version="1" comment="gvim is &lt;7.4.326-17.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546417" version="1" comment="vim is &lt;7.4.326-17.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594949" version="1" comment="gvim is &lt;7.4.326-17.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594950" version="1" comment="vim is &lt;7.4.326-17.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530566" version="1" comment="dbus-1 is &lt;1.8.22-24.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530567" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530568" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530569" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546447" version="1" comment="dbus-1 is &lt;1.8.22-24.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546448" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546449" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546450" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594967" version="1" comment="dbus-1 is &lt;1.8.22-24.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594968" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594969" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595146" version="1" comment="python-Django is &lt;1.8.19-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595164" version="1" comment="python-Twisted is &lt;15.2.1-9.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522027" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530613" version="1" comment="bzip2-doc is &lt;1.0.6-30.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531686" version="1" comment="clamav is &lt;0.103.0-33.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522028" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522029" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548657" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552011" version="1" comment="clamav is &lt;0.103.0-33.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548658" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548659" version="1" comment="libbz2-1-32bit is &lt;1.0.6-30.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595038" version="1" comment="bzip2 is &lt;1.0.6-30.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596164" version="1" comment="clamav is &lt;0.103.0-33.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595039" version="1" comment="libbz2-1 is &lt;1.0.6-30.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653540" version="1" comment="binutils is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653541" version="1" comment="binutils-devel is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653542" version="1" comment="libctf-nobfd0 is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653543" version="1" comment="libctf0 is &lt;2.37-9.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522218" version="1" comment="ghostscript is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522219" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548750" version="1" comment="ghostscript is &lt;9.27-23.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548751" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595169" version="1" comment="ghostscript is &lt;9.27-23.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595170" version="1" comment="ghostscript-x11 is &lt;9.27-23.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521943" version="1" comment="glib2-lang is &lt;2.48.2-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521944" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521945" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521946" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521948" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521949" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521950" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521951" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521952" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521953" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521954" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521955" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551177" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551178" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551179" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551180" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551181" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551182" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551183" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551184" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551185" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551186" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551187" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595010" version="1" comment="glib2-tools is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595011" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595012" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595013" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595014" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595015" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595116" version="1" comment="nodejs6 is &lt;6.17.0-11.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531242" version="1" comment="freeradius-server is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531243" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531244" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531245" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531246" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531247" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531248" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531249" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531250" version="1" comment="freeradius-server-python is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531251" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531252" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551653" version="1" comment="freeradius-server is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551654" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551655" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551656" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551657" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551658" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551659" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551660" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551661" version="1" comment="freeradius-server-python is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551662" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551663" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.15.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595743" version="1" comment="freeradius-server is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595744" version="1" comment="freeradius-server-doc is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595745" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595746" version="1" comment="freeradius-server-ldap is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595747" version="1" comment="freeradius-server-libs is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595748" version="1" comment="freeradius-server-mysql is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595749" version="1" comment="freeradius-server-perl is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595750" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595751" version="1" comment="freeradius-server-python is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595752" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595753" version="1" comment="freeradius-server-utils is &lt;3.0.3-17.15.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530787" version="1" comment="git-core is &lt;2.12.3-27.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530788" version="1" comment="git-doc is &lt;2.12.3-27.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548856" version="1" comment="git-core is &lt;2.12.3-27.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595350" version="1" comment="git-core is &lt;2.12.3-27.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522236" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522237" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530714" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530715" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548752" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548753" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548754" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548755" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595175" version="1" comment="libgcrypt20 is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595176" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595115" version="1" comment="python-Django is &lt;1.8.19-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531700" version="1" comment="libasan5 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531701" version="1" comment="libasan5-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531702" version="1" comment="libatomic1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531703" version="1" comment="libatomic1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531704" version="1" comment="libgcc_s1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531705" version="1" comment="libgcc_s1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531706" version="1" comment="libgfortran5 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531707" version="1" comment="libgfortran5-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531708" version="1" comment="libgo14 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531709" version="1" comment="libgo14-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531710" version="1" comment="libgomp1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531711" version="1" comment="libgomp1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531712" version="1" comment="libitm1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531713" version="1" comment="libitm1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531714" version="1" comment="liblsan0 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531715" version="1" comment="libquadmath0 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531716" version="1" comment="libquadmath0-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531717" version="1" comment="libstdc++6 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531718" version="1" comment="libstdc++6-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531719" version="1" comment="libstdc++6-locale is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531720" version="1" comment="libtsan0 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531721" version="1" comment="libubsan1 is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531722" version="1" comment="libubsan1-32bit is &lt;9.2.1+r275327-1.3.9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549030" version="1" comment="libasan5 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549031" version="1" comment="libasan5-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549032" version="1" comment="libatomic1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549033" version="1" comment="libatomic1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549034" version="1" comment="libgcc_s1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549035" version="1" comment="libgcc_s1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549036" version="1" comment="libgfortran5 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549037" version="1" comment="libgfortran5-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549038" version="1" comment="libgo14 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549039" version="1" comment="libgo14-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549040" version="1" comment="libgomp1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549041" version="1" comment="libgomp1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549042" version="1" comment="libitm1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549043" version="1" comment="libitm1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537986" version="1" comment="liblsan0 is &lt;9.2.1+r275327-1.3.9 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537987" version="1" comment="libquadmath0 is &lt;9.2.1+r275327-1.3.9 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549044" version="1" comment="libstdc++6 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549045" version="1" comment="libstdc++6-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549046" version="1" comment="libstdc++6-locale is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537990" version="1" comment="libtsan0 is &lt;9.2.1+r275327-1.3.9 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549047" version="1" comment="libubsan1 is &lt;9.2.1+r275327-1.3.9 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549048" version="1" comment="libubsan1-32bit is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596172" version="1" comment="libasan5 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596173" version="1" comment="libatomic1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596174" version="1" comment="libgcc_s1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596175" version="1" comment="libgfortran5 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596176" version="1" comment="libgo14 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596177" version="1" comment="libgomp1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596178" version="1" comment="libitm1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596179" version="1" comment="libstdc++6 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596180" version="1" comment="libstdc++6-locale is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596181" version="1" comment="libubsan1 is &lt;9.2.1+r275327-1.3.9 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530718" version="1" comment="sudo is &lt;1.8.10p3-10.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551270" version="1" comment="sudo is &lt;1.8.10p3-10.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595183" version="1" comment="sudo is &lt;1.8.10p3-10.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531453" version="1" comment="ovmf is &lt;2015+git1462940744.321151f-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531454" version="1" comment="ovmf-tools is &lt;2015+git1462940744.321151f-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531455" version="1" comment="qemu-ovmf-x86_64 is &lt;2015+git1462940744.321151f-19.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552383" version="1" comment="ovmf is &lt;2015+git1462940744.321151f-19.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552384" version="1" comment="ovmf-tools is &lt;2015+git1462940744.321151f-19.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552385" version="1" comment="qemu-ovmf-x86_64 is &lt;2015+git1462940744.321151f-19.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522144" version="1" comment="ibus is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522145" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522146" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522148" version="1" comment="ibus-lang is &lt;1.5.13-15.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522149" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522152" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551255" version="1" comment="ibus is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551256" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551257" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551258" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551259" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595147" version="1" comment="ibus is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595148" version="1" comment="ibus-gtk is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595149" version="1" comment="ibus-gtk3 is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595150" version="1" comment="libibus-1_0-5 is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595151" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.13-15.11.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596183" version="1" comment="dnsmasq-utils is &lt;2.78-18.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552421" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552420" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552419" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552418" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552417" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552414" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552415" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537167" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537166" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537165" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537164" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537163" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537160" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537161" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525259" version="1" comment="python-ecdsa is &lt;0.13.3-5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522381" version="1" comment="ghostscript is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522382" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548836" version="1" comment="ghostscript is &lt;9.27-23.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548837" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595275" version="1" comment="ghostscript is &lt;9.27-23.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595276" version="1" comment="ghostscript-x11 is &lt;9.27-23.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552460" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537678" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552458" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552457" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552456" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552455" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552454" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552453" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552452" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537569" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537568" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537567" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537566" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537565" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537562" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537561" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340774" version="1" comment="rubygem-rest-client is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530702" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530703" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530704" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530705" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530706" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530707" version="1" comment="openssl is &lt;1.0.2j-60.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530708" version="1" comment="openssl-doc is &lt;1.0.2j-60.55.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551260" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551261" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551262" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551263" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551264" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551265" version="1" comment="openssl is &lt;1.0.2j-60.55.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595153" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595154" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595155" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595156" version="1" comment="openssl is &lt;1.0.2j-60.55.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531729" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531730" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531731" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531732" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531733" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531734" version="1" comment="openssl is &lt;1.0.2j-60.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531735" version="1" comment="openssl-doc is &lt;1.0.2j-60.60.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552026" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552027" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552028" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552029" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552030" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552031" version="1" comment="openssl is &lt;1.0.2j-60.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596188" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596189" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596190" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596191" version="1" comment="openssl is &lt;1.0.2j-60.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521711" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521712" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521713" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530874" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530875" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521714" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530876" version="1" comment="openssl-doc is &lt;1.0.2j-60.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551390" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551391" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551392" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551393" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551394" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551395" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595486" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595487" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595488" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595502" version="1" comment="nodejs6 is &lt;6.17.0-11.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595489" version="1" comment="openssl is &lt;1.0.2j-60.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596192" version="1" comment="nodejs6 is &lt;6.17.1-11.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552451" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552450" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552449" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537533" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;10-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537532" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537531" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530919" version="1" comment="libvncclient0 is &lt;0.9.9-17.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530920" version="1" comment="libvncserver0 is &lt;0.9.9-17.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548967" version="1" comment="libvncclient0 is &lt;0.9.9-17.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548968" version="1" comment="libvncserver0 is &lt;0.9.9-17.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595546" version="1" comment="libvncclient0 is &lt;0.9.9-17.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595547" version="1" comment="libvncserver0 is &lt;0.9.9-17.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531021" version="1" comment="libXvnc1 is &lt;1.6.0-18.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531022" version="1" comment="tigervnc is &lt;1.6.0-18.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531023" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551477" version="1" comment="libXvnc1 is &lt;1.6.0-18.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551478" version="1" comment="tigervnc is &lt;1.6.0-18.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551479" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595614" version="1" comment="libXvnc1 is &lt;1.6.0-18.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595615" version="1" comment="tigervnc is &lt;1.6.0-18.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595616" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-18.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339412" version="1" comment="python-os-vif is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552320" version="1" comment="qemu is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552321" version="1" comment="qemu-block-curl is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552322" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552323" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552324" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552325" version="1" comment="qemu-ipxe is &lt;1.0.0-41.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552326" version="1" comment="qemu-kvm is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552327" version="1" comment="qemu-lang is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552328" version="1" comment="qemu-seabios is &lt;1.9.1_0_gb3ef39f-41.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552329" version="1" comment="qemu-sgabios is &lt;8-41.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552330" version="1" comment="qemu-tools is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552331" version="1" comment="qemu-vgabios is &lt;1.9.1_0_gb3ef39f-41.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552332" version="1" comment="qemu-x86 is &lt;2.6.2-41.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531899" version="1" comment="wpa_supplicant is &lt;2.6-15.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552105" version="1" comment="wpa_supplicant is &lt;2.6-15.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596372" version="1" comment="wpa_supplicant is &lt;2.6-15.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531283" version="1" comment="kernel-default is &lt;4.4.121-92.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531284" version="1" comment="kernel-default-base is &lt;4.4.121-92.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531285" version="1" comment="kernel-default-devel is &lt;4.4.121-92.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531286" version="1" comment="kernel-devel is &lt;4.4.121-92.141.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531287" version="1" comment="kernel-macros is &lt;4.4.121-92.141.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531288" version="1" comment="kernel-source is &lt;4.4.121-92.141.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531289" version="1" comment="kernel-syms is &lt;4.4.121-92.141.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552461" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552462" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552463" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531290" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551682" version="1" comment="kernel-default is &lt;4.4.121-92.141.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551683" version="1" comment="kernel-default-base is &lt;4.4.121-92.141.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551684" version="1" comment="kernel-default-devel is &lt;4.4.121-92.141.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551685" version="1" comment="kernel-default-man is &lt;4.4.121-92.141.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551686" version="1" comment="kernel-syms is &lt;4.4.121-92.141.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537679" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537680" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537681" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537689" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595775" version="1" comment="kernel-default is &lt;4.4.121-92.141.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595776" version="1" comment="kernel-default-base is &lt;4.4.121-92.141.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595777" version="1" comment="kernel-default-devel is &lt;4.4.121-92.141.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595778" version="1" comment="kernel-syms is &lt;4.4.121-92.141.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595983" version="1" comment="crowbar-core is &lt;4.0+git.1578392992.fabfd186c-9.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595984" version="1" comment="crowbar-core-branding-upstream is &lt;4.0+git.1578392992.fabfd186c-9.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595985" version="1" comment="crowbar-openstack is &lt;4.0+git.1579171175.d53ab6363-9.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595989" version="1" comment="ruby2.1-rubygem-crowbar-client is &lt;3.9.1-7.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595765" version="1" comment="nodejs6 is &lt;6.17.1-11.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596310" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595784" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.13-3.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531068" version="1" comment="libfreebl3 is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531069" version="1" comment="libfreebl3-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531070" version="1" comment="libfreebl3-hmac is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531071" version="1" comment="libfreebl3-hmac-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531072" version="1" comment="libsoftokn3 is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531073" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531074" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531075" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531076" version="1" comment="mozilla-nspr is &lt;4.25-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531077" version="1" comment="mozilla-nspr-32bit is &lt;4.25-19.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531078" version="1" comment="mozilla-nss is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531079" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531080" version="1" comment="mozilla-nss-certs is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531081" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531082" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531083" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531084" version="1" comment="mozilla-nss-tools is &lt;3.53.1-58.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551504" version="1" comment="libfreebl3 is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551505" version="1" comment="libfreebl3-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551506" version="1" comment="libfreebl3-hmac is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551507" version="1" comment="libfreebl3-hmac-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551508" version="1" comment="libsoftokn3 is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551509" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551510" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551511" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551512" version="1" comment="mozilla-nspr is &lt;4.25-19.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551513" version="1" comment="mozilla-nspr-32bit is &lt;4.25-19.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551514" version="1" comment="mozilla-nss is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551515" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551516" version="1" comment="mozilla-nss-certs is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551517" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551518" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551519" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551520" version="1" comment="mozilla-nss-tools is &lt;3.53.1-58.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595641" version="1" comment="libfreebl3 is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595642" version="1" comment="libfreebl3-hmac is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595643" version="1" comment="libsoftokn3 is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595644" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595645" version="1" comment="mozilla-nspr is &lt;4.25-19.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595646" version="1" comment="mozilla-nss is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595647" version="1" comment="mozilla-nss-certs is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595648" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595649" version="1" comment="mozilla-nss-tools is &lt;3.53.1-58.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522668" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531764" version="1" comment="MozillaFirefox-devel is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522669" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549099" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549100" version="1" comment="MozillaFirefox-devel is &lt;68.4.1-109.101.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549101" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596233" version="1" comment="MozillaFirefox is &lt;68.4.1-109.101.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596234" version="1" comment="MozillaFirefox-devel is &lt;68.4.1-109.101.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596235" version="1" comment="MozillaFirefox-translations-common is &lt;68.4.1-109.101.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552196" version="1" comment="rsyslog is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552197" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552198" version="1" comment="rsyslog-doc is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552199" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552200" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552201" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552202" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552203" version="1" comment="rsyslog-module-relp is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552204" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552205" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-18.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552032" version="1" comment="rsyslog is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552033" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552034" version="1" comment="rsyslog-doc is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552035" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552036" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552037" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552038" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552039" version="1" comment="rsyslog-module-relp is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552040" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552041" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-18.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596207" version="1" comment="rsyslog is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596208" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596209" version="1" comment="rsyslog-doc is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596210" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596211" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596212" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596213" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596214" version="1" comment="rsyslog-module-relp is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596215" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596216" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-18.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552423" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552424" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552425" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552426" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552427" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552428" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537181" version="1" comment="kgraft-patch-4_4_121-92_101-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537182" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537183" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537184" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537185" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537186" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522350" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522351" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548819" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548820" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595268" version="1" comment="libssh2-1 is &lt;1.4.3-20.14.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334122" version="1" comment="python is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334187" version="1" comment="python3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531752" version="1" comment="log4j is &lt;1.2.15-126.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531253" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531254" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531255" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531256" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.0-30.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549012" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.0-30.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542568" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.0-30.60.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595754" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.0-30.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595755" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.0-30.60.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531275" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531276" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531277" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531278" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531279" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.70-38.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531265" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531266" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531267" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531268" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.15-30.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551677" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-38.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542900" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-38.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551678" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-38.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551671" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.15-30.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542898" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.15-30.72.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595769" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.70-38.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595770" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.70-38.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595771" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.70-38.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595763" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.15-30.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595764" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.15-30.72.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521756" version="1" comment="clamav is &lt;0.100.3-33.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546692" version="1" comment="clamav is &lt;0.100.3-33.21.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595517" version="1" comment="clamav is &lt;0.100.3-33.21.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531799" version="1" comment="libxslt-tools is &lt;1.1.28-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531800" version="1" comment="libxslt1 is &lt;1.1.28-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531801" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552049" version="1" comment="libxslt-tools is &lt;1.1.28-17.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552050" version="1" comment="libxslt1 is &lt;1.1.28-17.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552051" version="1" comment="libxslt1-32bit is &lt;1.1.28-17.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596296" version="1" comment="libxslt-tools is &lt;1.1.28-17.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596297" version="1" comment="libxslt1 is &lt;1.1.28-17.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628151" version="1" comment="file is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628152" version="1" comment="file-magic is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628153" version="1" comment="libmagic1 is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628154" version="1" comment="libmagic1-32bit is &lt;5.22-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595349" version="1" comment="haproxy is &lt;1.6.11-11.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531962" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531963" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531790" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531964" version="1" comment="python is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531965" version="1" comment="python-32bit is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531966" version="1" comment="python-base is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531967" version="1" comment="python-base-32bit is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531968" version="1" comment="python-curses is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531969" version="1" comment="python-demo is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531971" version="1" comment="python-doc is &lt;2.7.18-28.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531972" version="1" comment="python-doc-pdf is &lt;2.7.18-28.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531973" version="1" comment="python-gdbm is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531974" version="1" comment="python-idle is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530986" version="1" comment="python-rpm-macros is &lt;20200207.5feb6c1-3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531975" version="1" comment="python-tk is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531976" version="1" comment="python-xml is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531791" version="1" comment="python3 is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531792" version="1" comment="python3-base is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531793" version="1" comment="python3-curses is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530989" version="1" comment="shared-python-startup is &lt;0.1-1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531970" version="1" comment="python-devel is &lt;2.7.18-28.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531794" version="1" comment="python3-devel is &lt;3.4.10-25.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552151" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552152" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549121" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552153" version="1" comment="python is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552154" version="1" comment="python-32bit is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552155" version="1" comment="python-base is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552156" version="1" comment="python-base-32bit is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552157" version="1" comment="python-curses is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552158" version="1" comment="python-demo is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552159" version="1" comment="python-devel is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552160" version="1" comment="python-gdbm is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552161" version="1" comment="python-idle is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552162" version="1" comment="python-tk is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552163" version="1" comment="python-xml is &lt;2.7.18-28.67.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549122" version="1" comment="python3 is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549123" version="1" comment="python3-base is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549124" version="1" comment="python3-curses is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549125" version="1" comment="python3-devel is &lt;3.4.10-25.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596416" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596282" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596417" version="1" comment="python is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596418" version="1" comment="python-base is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596419" version="1" comment="python-curses is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596420" version="1" comment="python-demo is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596421" version="1" comment="python-devel is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596422" version="1" comment="python-gdbm is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596423" version="1" comment="python-idle is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596424" version="1" comment="python-tk is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596425" version="1" comment="python-xml is &lt;2.7.18-28.67.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596283" version="1" comment="python3 is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596284" version="1" comment="python3-base is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596285" version="1" comment="python3-curses is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596286" version="1" comment="python3-devel is &lt;3.4.10-25.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522550" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551485" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595621" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339082" version="1" comment="fribidi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531723" version="1" comment="sudo is &lt;1.8.10p3-10.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552025" version="1" comment="sudo is &lt;1.8.10p3-10.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596182" version="1" comment="sudo is &lt;1.8.10p3-10.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552307" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531065" version="1" comment="squid is &lt;3.5.21-26.26.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551501" version="1" comment="squid is &lt;3.5.21-26.26.1 for i586,ppc64le,s390,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595638" version="1" comment="squid is &lt;3.5.21-26.26.1 for i586,s390,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531580" version="1" comment="libzypp is &lt;16.21.2-27.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531581" version="1" comment="libzypp-devel is &lt;16.21.2-27.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531582" version="1" comment="zypper is &lt;1.13.57-18.46.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531583" version="1" comment="zypper-log is &lt;1.13.57-18.46.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551931" version="1" comment="libzypp is &lt;16.21.2-27.70.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551932" version="1" comment="libzypp-devel is &lt;16.21.2-27.70.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551933" version="1" comment="zypper is &lt;1.13.57-18.46.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596080" version="1" comment="libzypp is &lt;16.21.2-27.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596081" version="1" comment="libzypp-devel is &lt;16.21.2-27.70.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596082" version="1" comment="zypper is &lt;1.13.57-18.46.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596277" version="1" comment="mariadb is &lt;10.2.31-16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596278" version="1" comment="mariadb-client is &lt;10.2.31-16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596279" version="1" comment="mariadb-errormessages is &lt;10.2.31-16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596280" version="1" comment="mariadb-galera is &lt;10.2.31-16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596281" version="1" comment="mariadb-tools is &lt;10.2.31-16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531887" version="1" comment="kernel-default is &lt;4.4.121-92.149.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531888" version="1" comment="kernel-default-base is &lt;4.4.121-92.149.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531889" version="1" comment="kernel-default-devel is &lt;4.4.121-92.149.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531890" version="1" comment="kernel-devel is &lt;4.4.121-92.149.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531891" version="1" comment="kernel-macros is &lt;4.4.121-92.149.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531892" version="1" comment="kernel-source is &lt;4.4.121-92.149.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531893" version="1" comment="kernel-syms is &lt;4.4.121-92.149.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531894" version="1" comment="kgraft-patch-4_4_121-92_149-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552098" version="1" comment="kernel-default is &lt;4.4.121-92.149.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552099" version="1" comment="kernel-default-base is &lt;4.4.121-92.149.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552100" version="1" comment="kernel-default-devel is &lt;4.4.121-92.149.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552101" version="1" comment="kernel-default-man is &lt;4.4.121-92.149.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552102" version="1" comment="kernel-syms is &lt;4.4.121-92.149.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538150" version="1" comment="kgraft-patch-4_4_121-92_149-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596366" version="1" comment="kernel-default is &lt;4.4.121-92.149.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596367" version="1" comment="kernel-default-base is &lt;4.4.121-92.149.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596368" version="1" comment="kernel-default-devel is &lt;4.4.121-92.149.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596369" version="1" comment="kernel-syms is &lt;4.4.121-92.149.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530916" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530917" version="1" comment="libshibsp6 is &lt;2.5.5-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530918" version="1" comment="shibboleth-sp is &lt;2.5.5-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548964" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548965" version="1" comment="libshibsp6 is &lt;2.5.5-6.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548966" version="1" comment="shibboleth-sp is &lt;2.5.5-6.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595543" version="1" comment="libshibsp-lite6 is &lt;2.5.5-6.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595544" version="1" comment="libshibsp6 is &lt;2.5.5-6.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595545" version="1" comment="shibboleth-sp is &lt;2.5.5-6.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334290" version="1" comment="sudo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631268" version="1" comment="transfig is &lt;3.2.8a-2.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339413" version="1" comment="openstack-keystone is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531687" version="1" comment="cyrus-sasl is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531688" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531689" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531690" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531691" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531692" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531693" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531694" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531695" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531696" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531697" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531698" version="1" comment="libsasl2-3 is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531699" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552012" version="1" comment="cyrus-sasl is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552013" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552014" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552015" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552016" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552017" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552018" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552019" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552020" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552021" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552022" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552023" version="1" comment="libsasl2-3 is &lt;2.1.26-8.13.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552024" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596165" version="1" comment="cyrus-sasl is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596166" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596167" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596168" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596169" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596170" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596171" version="1" comment="libsasl2-3 is &lt;2.1.26-8.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628213" version="1" comment="libesmtp is &lt;1.0.6-17.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552388" version="1" comment="libsolv-devel is &lt;0.6.37-2.27.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552389" version="1" comment="libsolv-tools is &lt;0.6.37-2.27.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552390" version="1" comment="libzypp is &lt;16.21.4-27.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552391" version="1" comment="libzypp-devel is &lt;16.21.4-27.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552392" version="1" comment="perl-solv is &lt;0.6.37-2.27.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552393" version="1" comment="python-solv is &lt;0.6.37-2.27.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334410" version="1" comment="python-PyYAML is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531771" version="1" comment="MozillaFirefox is &lt;68.6.0-109.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531772" version="1" comment="MozillaFirefox-devel is &lt;68.6.0-109.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531773" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-109.110.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549111" version="1" comment="MozillaFirefox is &lt;68.6.0-109.110.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549112" version="1" comment="MozillaFirefox-devel is &lt;68.6.0-109.110.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549113" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-109.110.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596244" version="1" comment="MozillaFirefox is &lt;68.6.0-109.110.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596245" version="1" comment="MozillaFirefox-devel is &lt;68.6.0-109.110.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596246" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.0-109.110.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531007" version="1" comment="gvim is &lt;7.4.326-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531008" version="1" comment="vim is &lt;7.4.326-17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531009" version="1" comment="vim-data is &lt;7.4.326-17.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551464" version="1" comment="gvim is &lt;7.4.326-17.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551465" version="1" comment="vim is &lt;7.4.326-17.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595601" version="1" comment="gvim is &lt;7.4.326-17.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595602" version="1" comment="vim is &lt;7.4.326-17.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531154" version="1" comment="kernel-default is &lt;4.4.121-92.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531155" version="1" comment="kernel-default-base is &lt;4.4.121-92.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531156" version="1" comment="kernel-default-devel is &lt;4.4.121-92.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531157" version="1" comment="kernel-devel is &lt;4.4.121-92.138.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531158" version="1" comment="kernel-macros is &lt;4.4.121-92.138.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531159" version="1" comment="kernel-source is &lt;4.4.121-92.138.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531160" version="1" comment="kernel-syms is &lt;4.4.121-92.138.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531161" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551582" version="1" comment="kernel-default is &lt;4.4.121-92.138.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551583" version="1" comment="kernel-default-base is &lt;4.4.121-92.138.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551584" version="1" comment="kernel-default-devel is &lt;4.4.121-92.138.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551585" version="1" comment="kernel-default-man is &lt;4.4.121-92.138.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551586" version="1" comment="kernel-syms is &lt;4.4.121-92.138.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537606" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;1-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595696" version="1" comment="kernel-default is &lt;4.4.121-92.138.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595697" version="1" comment="kernel-default-base is &lt;4.4.121-92.138.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595698" version="1" comment="kernel-default-devel is &lt;4.4.121-92.138.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595699" version="1" comment="kernel-syms is &lt;4.4.121-92.138.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531872" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531873" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531867" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531874" version="1" comment="python is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531875" version="1" comment="python-32bit is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531876" version="1" comment="python-base is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531877" version="1" comment="python-base-32bit is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531878" version="1" comment="python-curses is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531879" version="1" comment="python-demo is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531881" version="1" comment="python-doc is &lt;2.7.17-28.64.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531882" version="1" comment="python-doc-pdf is &lt;2.7.17-28.64.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531883" version="1" comment="python-gdbm is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531884" version="1" comment="python-idle is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009524556" version="1" comment="python-setuptools is &lt;40.6.2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531885" version="1" comment="python-tk is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531886" version="1" comment="python-xml is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531868" version="1" comment="python3 is &lt;3.4.10-25.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531869" version="1" comment="python3-base is &lt;3.4.10-25.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531870" version="1" comment="python3-curses is &lt;3.4.10-25.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525277" version="1" comment="python3-setuptools is &lt;40.6.2-4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531880" version="1" comment="python-devel is &lt;2.7.17-28.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531871" version="1" comment="python3-devel is &lt;3.4.10-25.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552085" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552086" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552080" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552087" version="1" comment="python is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552088" version="1" comment="python-32bit is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552089" version="1" comment="python-base is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552090" version="1" comment="python-base-32bit is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552091" version="1" comment="python-curses is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552092" version="1" comment="python-demo is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552093" version="1" comment="python-devel is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552094" version="1" comment="python-gdbm is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552095" version="1" comment="python-idle is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552096" version="1" comment="python-tk is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552097" version="1" comment="python-xml is &lt;2.7.17-28.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552081" version="1" comment="python3 is &lt;3.4.10-25.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552082" version="1" comment="python3-base is &lt;3.4.10-25.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552083" version="1" comment="python3-curses is &lt;3.4.10-25.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552084" version="1" comment="python3-devel is &lt;3.4.10-25.63.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596356" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596351" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596357" version="1" comment="python is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596358" version="1" comment="python-base is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596359" version="1" comment="python-curses is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596360" version="1" comment="python-demo is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596361" version="1" comment="python-devel is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596362" version="1" comment="python-gdbm is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596363" version="1" comment="python-idle is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525278" version="1" comment="python-pip is &lt;10.0.1-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596364" version="1" comment="python-tk is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596365" version="1" comment="python-xml is &lt;2.7.17-28.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596352" version="1" comment="python3 is &lt;3.4.10-25.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596353" version="1" comment="python3-base is &lt;3.4.10-25.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596354" version="1" comment="python3-curses is &lt;3.4.10-25.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596355" version="1" comment="python3-devel is &lt;3.4.10-25.63.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522374" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522375" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522376" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522377" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522378" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522379" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522380" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548826" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548827" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548828" version="1" comment="libjpeg62-32bit is &lt;62.2.0-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548829" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548830" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548831" version="1" comment="libjpeg8-32bit is &lt;8.1.2-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548832" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595270" version="1" comment="libjpeg-turbo is &lt;1.5.3-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595271" version="1" comment="libjpeg62 is &lt;62.2.0-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595272" version="1" comment="libjpeg62-turbo is &lt;1.5.3-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595273" version="1" comment="libjpeg8 is &lt;8.1.2-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595274" version="1" comment="libturbojpeg0 is &lt;8.1.2-31.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531914" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531915" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552116" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552117" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596383" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596384" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627800" version="1" comment="aspell is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627801" version="1" comment="aspell-ispell is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627802" version="1" comment="libaspell15 is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627791" version="1" comment="libaspell15-32bit is &lt;0.60.6.1-18.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595050" version="1" comment="mariadb is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595051" version="1" comment="mariadb-client is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595052" version="1" comment="mariadb-errormessages is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595053" version="1" comment="mariadb-tools is &lt;10.0.38-29.27.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522039" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530614" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530615" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522040" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548663" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548664" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548665" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548666" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595044" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.222-27.35.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595045" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.222-27.35.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595046" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.222-27.35.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595047" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.222-27.35.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522404" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530782" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530783" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522405" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548847" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548848" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.241-43.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548849" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.241-43.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548850" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595288" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.241-43.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595289" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.241-43.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595290" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.241-43.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595291" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.241-43.30.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531743" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531744" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531745" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531746" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531747" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.55-38.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549079" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-38.44.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542719" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.55-38.44.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549080" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-38.44.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596204" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.55-38.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596205" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.55-38.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596206" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.55-38.44.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531043" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531044" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531045" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531046" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.10-30.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551492" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.10-30.69.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542541" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.10-30.69.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595629" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.10-30.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595630" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.10-30.69.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531737" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531738" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531739" version="1" comment="mariadb is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531740" version="1" comment="mariadb-client is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531741" version="1" comment="mariadb-errormessages is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531742" version="1" comment="mariadb-tools is &lt;10.0.40.2-29.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549070" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549071" version="1" comment="libmysqlclient18-32bit is &lt;10.0.40.2-29.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549075" version="1" comment="mariadb is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549076" version="1" comment="mariadb-client is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549077" version="1" comment="mariadb-errormessages is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549078" version="1" comment="mariadb-tools is &lt;10.0.40.2-29.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596199" version="1" comment="libmysqlclient18 is &lt;10.0.40.2-29.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530786" version="1" comment="permissions is &lt;2015.09.28.1626-17.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551325" version="1" comment="permissions is &lt;2015.09.28.1626-17.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595295" version="1" comment="permissions is &lt;2015.09.28.1626-17.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522280" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530719" version="1" comment="nfs-doc is &lt;1.3.0-34.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522281" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551271" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551272" version="1" comment="nfs-doc is &lt;1.3.0-34.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551273" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595237" version="1" comment="nfs-client is &lt;1.3.0-34.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595238" version="1" comment="nfs-doc is &lt;1.3.0-34.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595239" version="1" comment="nfs-kernel-server is &lt;1.3.0-34.22.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530781" version="1" comment="mailman is &lt;2.1.17-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548846" version="1" comment="mailman is &lt;2.1.17-3.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595287" version="1" comment="mailman is &lt;2.1.17-3.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530687" version="1" comment="libspice-server1 is &lt;0.12.7-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530892" version="1" comment="dovecot22 is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530893" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530894" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530895" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546696" version="1" comment="dovecot22 is &lt;2.2.31-19.14.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546697" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.14.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546698" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.14.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546699" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.14.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595518" version="1" comment="dovecot22 is &lt;2.2.31-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595519" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595520" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595521" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.14.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339415" version="1" comment="openstack-ceilometer is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521696" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521697" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546672" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546673" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595482" version="1" comment="ghostscript is &lt;9.26a-23.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595483" version="1" comment="ghostscript-x11 is &lt;9.26a-23.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530840" version="1" comment="libvirt is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530841" version="1" comment="libvirt-client is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530842" version="1" comment="libvirt-daemon is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530843" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530844" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530845" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530846" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530847" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530848" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530849" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530850" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530851" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530852" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530853" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530854" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530855" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530856" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530857" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530858" version="1" comment="libvirt-doc is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530859" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530860" version="1" comment="libvirt-nss is &lt;2.0.0-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551366" version="1" comment="libvirt is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551367" version="1" comment="libvirt-client is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551368" version="1" comment="libvirt-daemon is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551369" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551370" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551371" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551372" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551373" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551374" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551375" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551376" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551377" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551378" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551379" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551380" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551381" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551382" version="1" comment="libvirt-doc is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551383" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551384" version="1" comment="libvirt-nss is &lt;2.0.0-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595421" version="1" comment="libvirt is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595422" version="1" comment="libvirt-client is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595423" version="1" comment="libvirt-daemon is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595424" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595425" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595426" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595427" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595428" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595429" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595430" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595431" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595432" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595433" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595434" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595435" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595436" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595437" version="1" comment="libvirt-doc is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595438" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595439" version="1" comment="libvirt-nss is &lt;2.0.0-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521685" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521686" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546670" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546671" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595456" version="1" comment="libssh2-1 is &lt;1.4.3-20.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521117" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521118" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546272" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546273" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594798" version="1" comment="libssh2-1 is &lt;1.4.3-20.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521526" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521924" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546463" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546464" version="1" comment="libssh2-1-32bit is &lt;1.4.3-20.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594984" version="1" comment="libssh2-1 is &lt;1.4.3-20.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530438" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530439" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530440" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530441" version="1" comment="libdcerpc0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530442" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530443" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530444" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530445" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530446" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530447" version="1" comment="libndr-standard0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530448" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530449" version="1" comment="libndr0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530450" version="1" comment="libndr0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530451" version="1" comment="libnetapi0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530452" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530453" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530454" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530455" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530456" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530457" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530458" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530459" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530460" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530461" version="1" comment="libsamba-util0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530462" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530463" version="1" comment="libsamdb0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530464" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530465" version="1" comment="libsmbclient0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530466" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530467" version="1" comment="libsmbconf0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530468" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530469" version="1" comment="libsmbldap0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530470" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530471" version="1" comment="libtevent-util0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530472" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530473" version="1" comment="libwbclient0 is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530474" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530475" version="1" comment="samba is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530476" version="1" comment="samba-client is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530477" version="1" comment="samba-client-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530478" version="1" comment="samba-doc is &lt;4.4.2-38.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530479" version="1" comment="samba-libs is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530480" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530481" version="1" comment="samba-winbind is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530482" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551028" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551029" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551030" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551031" version="1" comment="libdcerpc0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551032" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551033" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551034" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551035" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551036" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551037" version="1" comment="libndr-standard0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551038" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551039" version="1" comment="libndr0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551040" version="1" comment="libndr0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551041" version="1" comment="libnetapi0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551042" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551043" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551044" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551045" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551046" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551047" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551048" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551049" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551050" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551051" version="1" comment="libsamba-util0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551052" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551053" version="1" comment="libsamdb0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551054" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551055" version="1" comment="libsmbclient0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551056" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551057" version="1" comment="libsmbconf0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551058" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551059" version="1" comment="libsmbldap0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551060" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551061" version="1" comment="libtevent-util0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551062" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551063" version="1" comment="libwbclient0 is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551064" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551065" version="1" comment="samba is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551066" version="1" comment="samba-client is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551067" version="1" comment="samba-client-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551068" version="1" comment="samba-libs is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551069" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551070" version="1" comment="samba-winbind is &lt;4.4.2-38.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551071" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594819" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594820" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594821" version="1" comment="libdcerpc0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594822" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594823" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594824" version="1" comment="libndr-standard0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594825" version="1" comment="libndr0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594826" version="1" comment="libnetapi0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594827" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594828" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594829" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594830" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594831" version="1" comment="libsamba-util0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594832" version="1" comment="libsamdb0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594833" version="1" comment="libsmbclient0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594834" version="1" comment="libsmbconf0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594835" version="1" comment="libsmbldap0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594836" version="1" comment="libtevent-util0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594837" version="1" comment="libwbclient0 is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594838" version="1" comment="samba is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594839" version="1" comment="samba-client is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594840" version="1" comment="samba-libs is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594841" version="1" comment="samba-winbind is &lt;4.4.2-38.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334174" version="1" comment="rubygem-bundler is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531748" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531749" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531750" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531751" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.5-30.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549086" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.5-30.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542735" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.5-30.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596217" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.5-30.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596218" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.5-30.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632681" version="1" comment="Mesa is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632682" version="1" comment="Mesa-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632683" version="1" comment="Mesa-libEGL1 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632684" version="1" comment="Mesa-libEGL1-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632685" version="1" comment="Mesa-libGL1 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632686" version="1" comment="Mesa-libGL1-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632687" version="1" comment="Mesa-libGLESv2-2 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632688" version="1" comment="Mesa-libglapi0 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632689" version="1" comment="Mesa-libglapi0-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632690" version="1" comment="libgbm1 is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632691" version="1" comment="libgbm1-32bit is &lt;11.2.1-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632692" version="1" comment="libxatracker2 is &lt;1.0.0-104.9.49 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552484" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552483" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552482" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552481" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552480" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552479" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538074" version="1" comment="kgraft-patch-4_4_121-92_104-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538073" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538072" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538071" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538070" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538069" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595524" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521212" version="1" comment="curl is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521213" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521214" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546373" version="1" comment="curl is &lt;7.37.0-37.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546374" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546375" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594874" version="1" comment="curl is &lt;7.37.0-37.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594875" version="1" comment="libcurl4 is &lt;7.37.0-37.40.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596336" version="1" comment="ruby2.1-rubygem-nokogiri is &lt;1.6.1-5.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530693" version="1" comment="curl is &lt;7.37.0-37.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530694" version="1" comment="libcurl4 is &lt;7.37.0-37.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530695" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548729" version="1" comment="curl is &lt;7.37.0-37.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548730" version="1" comment="libcurl4 is &lt;7.37.0-37.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548731" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595134" version="1" comment="curl is &lt;7.37.0-37.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595135" version="1" comment="libcurl4 is &lt;7.37.0-37.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521764" version="1" comment="wget is &lt;1.14-21.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546709" version="1" comment="wget is &lt;1.14-21.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595525" version="1" comment="wget is &lt;1.14-21.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521455" version="1" comment="openssh is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521456" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530557" version="1" comment="openssh-fips is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521457" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551132" version="1" comment="openssh is &lt;7.2p2-74.42.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551133" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551134" version="1" comment="openssh-fips is &lt;7.2p2-74.42.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551135" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594959" version="1" comment="openssh is &lt;7.2p2-74.42.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594960" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.42.10 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594961" version="1" comment="openssh-fips is &lt;7.2p2-74.42.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594962" version="1" comment="openssh-helpers is &lt;7.2p2-74.42.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521244" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521245" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521246" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546406" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546407" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546408" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594916" version="1" comment="ghostscript is &lt;9.26a-23.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594917" version="1" comment="ghostscript-x11 is &lt;9.26a-23.19.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594918" version="1" comment="libspectre1 is &lt;0.2.7-12.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522035" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522037" version="1" comment="polkit is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522038" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548660" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548661" version="1" comment="polkit is &lt;0.113-5.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548662" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595041" version="1" comment="libpolkit0 is &lt;0.113-5.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595042" version="1" comment="polkit is &lt;0.113-5.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595043" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521654" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521655" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521656" version="1" comment="libwebkit2gtk3-lang is &lt;2.22.6-2.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521657" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521658" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530838" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521659" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530839" version="1" comment="webkit2gtk3-devel is &lt;2.22.6-2.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551359" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551360" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551361" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551362" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551363" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551364" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551365" version="1" comment="webkit2gtk3-devel is &lt;2.22.6-2.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595414" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595415" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595416" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595417" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595418" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595419" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595420" version="1" comment="webkit2gtk3-devel is &lt;2.22.6-2.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537361" version="1" comment="kgraft-patch-4_4_120-92_70-default is &lt;11-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537360" version="1" comment="kgraft-patch-4_4_121-92_73-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537362" version="1" comment="kgraft-patch-4_4_121-92_80-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537359" version="1" comment="kgraft-patch-4_4_121-92_85-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537364" version="1" comment="kgraft-patch-4_4_121-92_92-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552438" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552437" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537367" version="1" comment="kgraft-patch-4_4_121-92_95-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537363" version="1" comment="kgraft-patch-4_4_121-92_98-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595048" version="1" comment="python-Django is &lt;1.8.19-3.12.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595143" version="1" comment="python-SQLAlchemy is &lt;1.0.14-4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339424" version="1" comment="logstash is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521516" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521517" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521518" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548609" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548610" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-9.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548611" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594982" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-9.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594983" version="1" comment="sqlite3 is &lt;3.8.10.2-9.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522114" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522115" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522116" version="1" comment="libwebkit2gtk3-lang is &lt;2.24.4-2.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522117" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522118" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530696" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522119" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530697" version="1" comment="webkit2gtk3-devel is &lt;2.24.4-2.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551248" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551249" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551250" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551251" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551252" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551253" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551254" version="1" comment="webkit2gtk3-devel is &lt;2.24.4-2.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595136" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595137" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595138" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595139" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595140" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595141" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595142" version="1" comment="webkit2gtk3-devel is &lt;2.24.4-2.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530908" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530909" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530910" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.1-2.50.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530911" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530912" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530913" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530914" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530915" version="1" comment="webkit2gtk3-devel is &lt;2.28.1-2.50.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551423" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551424" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551425" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551426" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551427" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551428" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551429" version="1" comment="webkit2gtk3-devel is &lt;2.28.1-2.50.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595536" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595537" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595538" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595539" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595540" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595541" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595542" version="1" comment="webkit2gtk3-devel is &lt;2.28.1-2.50.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522393" version="1" comment="cups is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522394" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522395" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522396" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548841" version="1" comment="cups is &lt;1.7.5-20.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548842" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548843" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548844" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595283" version="1" comment="cups is &lt;1.7.5-20.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595284" version="1" comment="cups-client is &lt;1.7.5-20.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595285" version="1" comment="cups-libs is &lt;1.7.5-20.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521702" version="1" comment="ntp is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521703" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548943" version="1" comment="ntp is &lt;4.2.8p13-85.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548944" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595484" version="1" comment="ntp is &lt;4.2.8p13-85.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595485" version="1" comment="ntp-doc is &lt;4.2.8p13-85.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521236" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521237" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521777" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521238" version="1" comment="python is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530548" version="1" comment="python-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521239" version="1" comment="python-base is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530549" version="1" comment="python-base-32bit is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521240" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530550" version="1" comment="python-demo is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530551" version="1" comment="python-doc is &lt;2.7.13-28.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530552" version="1" comment="python-doc-pdf is &lt;2.7.13-28.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530553" version="1" comment="python-gdbm is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530554" version="1" comment="python-idle is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521242" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521243" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521778" version="1" comment="python3 is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521779" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521780" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521241" version="1" comment="python-devel is &lt;2.7.13-28.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548574" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548575" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546710" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548576" version="1" comment="python is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548577" version="1" comment="python-32bit is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548578" version="1" comment="python-base is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548579" version="1" comment="python-base-32bit is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548580" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548581" version="1" comment="python-demo is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548582" version="1" comment="python-devel is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548583" version="1" comment="python-gdbm is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548584" version="1" comment="python-idle is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548585" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548586" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546711" version="1" comment="python3 is &lt;3.4.6-25.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009546712" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551422" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594906" version="1" comment="libpython2_7-1_0 is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595526" version="1" comment="libpython3_4m1_0 is &lt;3.4.6-25.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594907" version="1" comment="python is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594908" version="1" comment="python-base is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594909" version="1" comment="python-curses is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594910" version="1" comment="python-demo is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594911" version="1" comment="python-devel is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594912" version="1" comment="python-gdbm is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594913" version="1" comment="python-idle is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594914" version="1" comment="python-tk is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594915" version="1" comment="python-xml is &lt;2.7.13-28.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595527" version="1" comment="python3 is &lt;3.4.6-25.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595528" version="1" comment="python3-base is &lt;3.4.6-25.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595529" version="1" comment="python3-curses is &lt;3.4.6-25.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530973" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530974" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530975" version="1" comment="python is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530976" version="1" comment="python-32bit is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530977" version="1" comment="python-base is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530978" version="1" comment="python-base-32bit is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530979" version="1" comment="python-curses is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530980" version="1" comment="python-demo is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530982" version="1" comment="python-doc is &lt;2.7.17-28.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530983" version="1" comment="python-doc-pdf is &lt;2.7.17-28.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530984" version="1" comment="python-gdbm is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530985" version="1" comment="python-idle is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530987" version="1" comment="python-tk is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530988" version="1" comment="python-xml is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530981" version="1" comment="python-devel is &lt;2.7.17-28.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548994" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548995" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548996" version="1" comment="python is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548997" version="1" comment="python-32bit is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548998" version="1" comment="python-base is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548999" version="1" comment="python-base-32bit is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549000" version="1" comment="python-curses is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549001" version="1" comment="python-demo is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549002" version="1" comment="python-devel is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549003" version="1" comment="python-gdbm is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549004" version="1" comment="python-idle is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549005" version="1" comment="python-tk is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549006" version="1" comment="python-xml is &lt;2.7.17-28.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595582" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595583" version="1" comment="python is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595584" version="1" comment="python-base is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595585" version="1" comment="python-curses is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595586" version="1" comment="python-demo is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595587" version="1" comment="python-devel is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595588" version="1" comment="python-gdbm is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595589" version="1" comment="python-idle is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595590" version="1" comment="python-tk is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595591" version="1" comment="python-xml is &lt;2.7.17-28.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522352" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522353" version="1" comment="libseccomp2-32bit is &lt;2.4.1-11.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551318" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551319" version="1" comment="libseccomp2-32bit is &lt;2.4.1-11.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595269" version="1" comment="libseccomp2 is &lt;2.4.1-11.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521744" version="1" comment="bash is &lt;4.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521745" version="1" comment="bash-doc is &lt;4.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521747" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521748" version="1" comment="libreadline6-32bit is &lt;6.3-83.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521749" version="1" comment="readline-doc is &lt;6.3-83.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551414" version="1" comment="bash is &lt;4.3-83.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551415" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551416" version="1" comment="libreadline6-32bit is &lt;6.3-83.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595507" version="1" comment="bash is &lt;4.3-83.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595508" version="1" comment="libreadline6 is &lt;6.3-83.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521520" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521493" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521494" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-13.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521495" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521523" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521496" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521497" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521498" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521499" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521500" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521525" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-18.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521502" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521503" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521504" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521505" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521506" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521507" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521508" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521509" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521510" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009521511" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009122942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551158" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-18.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551141" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551142" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551159" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-18.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551143" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551144" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551145" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551146" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551147" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551160" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-18.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551148" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551149" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551150" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551151" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551152" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551153" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551154" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551155" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551156" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551157" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594970" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594971" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594972" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594973" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594974" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594975" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594976" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594977" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594978" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594979" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594980" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009594981" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-13.3.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009562703" version="1" comment="python-futures is &lt;3.0.2-15.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009131848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677635" version="1" comment="libexif12 is &lt;0.6.22-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677562" version="1" comment="libexif12-32bit is &lt;0.6.22-8.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552467" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552466" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552468" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;3-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009128366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552465" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552464" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552478" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552490" version="1" comment="kgraft-patch-4_4_121-92_149-default is &lt;2-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537828" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537827" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537829" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;3-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537826" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537825" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537943" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538219" version="1" comment="kgraft-patch-4_4_121-92_149-default is &lt;2-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552296" version="1" comment="kernel-default is &lt;4.4.121-92.155.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552297" version="1" comment="kernel-default-base is &lt;4.4.121-92.155.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552298" version="1" comment="kernel-default-devel is &lt;4.4.121-92.155.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552299" version="1" comment="kernel-devel is &lt;4.4.121-92.155.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552300" version="1" comment="kernel-macros is &lt;4.4.121-92.155.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552301" version="1" comment="kernel-source is &lt;4.4.121-92.155.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552302" version="1" comment="kernel-syms is &lt;4.4.121-92.155.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552489" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;8-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552488" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552487" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552486" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552485" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538135" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;8-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538134" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538133" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538132" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538131" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339567" version="1" comment="flac is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531825" version="1" comment="libFLAC++6 is &lt;1.3.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531826" version="1" comment="libFLAC8 is &lt;1.3.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531827" version="1" comment="libFLAC8-32bit is &lt;1.3.0-12.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552053" version="1" comment="libFLAC++6 is &lt;1.3.0-12.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552054" version="1" comment="libFLAC8 is &lt;1.3.0-12.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552055" version="1" comment="libFLAC8-32bit is &lt;1.3.0-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596314" version="1" comment="libFLAC++6 is &lt;1.3.0-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596315" version="1" comment="libFLAC8 is &lt;1.3.0-12.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531025" version="1" comment="kernel-default is &lt;4.4.121-92.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531026" version="1" comment="kernel-default-base is &lt;4.4.121-92.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531027" version="1" comment="kernel-default-devel is &lt;4.4.121-92.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531028" version="1" comment="kernel-devel is &lt;4.4.121-92.135.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531029" version="1" comment="kernel-macros is &lt;4.4.121-92.135.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531030" version="1" comment="kernel-source is &lt;4.4.121-92.135.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531031" version="1" comment="kernel-syms is &lt;4.4.121-92.135.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531024" version="1" comment="ucode-intel is &lt;20200602-13.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531370" version="1" comment="xen is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531371" version="1" comment="xen-doc-html is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531372" version="1" comment="xen-libs is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531373" version="1" comment="xen-libs-32bit is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531374" version="1" comment="xen-tools is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531375" version="1" comment="xen-tools-domU is &lt;4.7.6_10-43.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531032" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;1-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551480" version="1" comment="kernel-default is &lt;4.4.121-92.135.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551481" version="1" comment="kernel-default-base is &lt;4.4.121-92.135.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551482" version="1" comment="kernel-default-devel is &lt;4.4.121-92.135.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551483" version="1" comment="kernel-default-man is &lt;4.4.121-92.135.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551484" version="1" comment="kernel-syms is &lt;4.4.121-92.135.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537513" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;1-3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595617" version="1" comment="kernel-default is &lt;4.4.121-92.135.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595618" version="1" comment="kernel-default-base is &lt;4.4.121-92.135.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595619" version="1" comment="kernel-default-devel is &lt;4.4.121-92.135.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595620" version="1" comment="kernel-syms is &lt;4.4.121-92.135.1 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531615" version="1" comment="bluez is &lt;5.13-5.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531616" version="1" comment="libbluetooth3 is &lt;5.13-5.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551959" version="1" comment="bluez is &lt;5.13-5.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551960" version="1" comment="libbluetooth3 is &lt;5.13-5.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596106" version="1" comment="bluez is &lt;5.13-5.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596107" version="1" comment="libbluetooth3 is &lt;5.13-5.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334189" version="1" comment="libqt5-qtbase is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338728" version="1" comment="ucode-intel is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531393" version="1" comment="glibc is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531394" version="1" comment="glibc-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531395" version="1" comment="glibc-devel is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531396" version="1" comment="glibc-devel-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531397" version="1" comment="glibc-html is &lt;2.22-113.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531398" version="1" comment="glibc-i18ndata is &lt;2.22-113.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531399" version="1" comment="glibc-info is &lt;2.22-113.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531400" version="1" comment="glibc-locale is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531401" version="1" comment="glibc-locale-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531402" version="1" comment="glibc-profile is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531403" version="1" comment="glibc-profile-32bit is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531404" version="1" comment="nscd is &lt;2.22-113.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551771" version="1" comment="glibc is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551772" version="1" comment="glibc-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551773" version="1" comment="glibc-devel is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551774" version="1" comment="glibc-devel-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551775" version="1" comment="glibc-locale is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551776" version="1" comment="glibc-locale-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551777" version="1" comment="glibc-profile is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551778" version="1" comment="glibc-profile-32bit is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551779" version="1" comment="nscd is &lt;2.22-113.4 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595953" version="1" comment="glibc is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595954" version="1" comment="glibc-devel is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595955" version="1" comment="glibc-locale is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595956" version="1" comment="glibc-profile is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595957" version="1" comment="nscd is &lt;2.22-113.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531003" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531004" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551462" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551463" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595598" version="1" comment="krb5-appl-clients is &lt;1.0.3-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595599" version="1" comment="krb5-appl-servers is &lt;1.0.3-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334396" version="1" comment="python-Pillow is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530921" version="1" comment="libicu-doc is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530922" version="1" comment="libicu52_1 is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530923" version="1" comment="libicu52_1-32bit is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530924" version="1" comment="libicu52_1-data is &lt;52.1-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548969" version="1" comment="libicu-doc is &lt;52.1-8.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548970" version="1" comment="libicu52_1 is &lt;52.1-8.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548971" version="1" comment="libicu52_1-32bit is &lt;52.1-8.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548972" version="1" comment="libicu52_1-data is &lt;52.1-8.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595548" version="1" comment="libicu-doc is &lt;52.1-8.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595549" version="1" comment="libicu52_1 is &lt;52.1-8.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595550" version="1" comment="libicu52_1-data is &lt;52.1-8.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531034" version="1" comment="perl is &lt;5.18.2-12.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531035" version="1" comment="perl-32bit is &lt;5.18.2-12.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531036" version="1" comment="perl-base is &lt;5.18.2-12.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531037" version="1" comment="perl-doc is &lt;5.18.2-12.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551487" version="1" comment="perl is &lt;5.18.2-12.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551488" version="1" comment="perl-32bit is &lt;5.18.2-12.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551489" version="1" comment="perl-base is &lt;5.18.2-12.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595624" version="1" comment="perl is &lt;5.18.2-12.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595625" version="1" comment="perl-base is &lt;5.18.2-12.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531113" version="1" comment="grub2 is &lt;2.02~beta2-115.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531114" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-115.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531115" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-115.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531116" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-115.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531117" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-115.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531118" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-115.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537694" version="1" comment="shim is &lt;15+git47-22.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551546" version="1" comment="grub2 is &lt;2.02~beta2-115.49.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537579" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-115.49.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551547" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-115.49.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595673" version="1" comment="grub2 is &lt;2.02~beta2-115.49.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531196" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531197" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531198" version="1" comment="libdcerpc0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531199" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531200" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531201" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531202" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531203" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531204" version="1" comment="libndr-standard0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531205" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531206" version="1" comment="libndr0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531207" version="1" comment="libndr0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531208" version="1" comment="libnetapi0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531209" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531210" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531211" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531212" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531213" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531214" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531215" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531216" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531217" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531218" version="1" comment="libsamba-util0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531219" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531220" version="1" comment="libsamdb0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531221" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531222" version="1" comment="libsmbclient0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531223" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531224" version="1" comment="libsmbconf0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531225" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531226" version="1" comment="libsmbldap0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531227" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531228" version="1" comment="libtevent-util0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531229" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531230" version="1" comment="libwbclient0 is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531231" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531232" version="1" comment="samba is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531233" version="1" comment="samba-client is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531234" version="1" comment="samba-client-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531235" version="1" comment="samba-doc is &lt;4.4.2-38.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531236" version="1" comment="samba-libs is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531237" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531238" version="1" comment="samba-winbind is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531239" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551608" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551609" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551610" version="1" comment="libdcerpc0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551611" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551612" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551613" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551614" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551615" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551616" version="1" comment="libndr-standard0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551617" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551618" version="1" comment="libndr0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551619" version="1" comment="libndr0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551620" version="1" comment="libnetapi0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551621" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551622" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551623" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551624" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551625" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551626" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551627" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551628" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551629" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551630" version="1" comment="libsamba-util0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551631" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551632" version="1" comment="libsamdb0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551633" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551634" version="1" comment="libsmbclient0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551635" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551636" version="1" comment="libsmbconf0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551637" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551638" version="1" comment="libsmbldap0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551639" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551640" version="1" comment="libtevent-util0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551641" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551642" version="1" comment="libwbclient0 is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551643" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551644" version="1" comment="samba is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551645" version="1" comment="samba-client is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551646" version="1" comment="samba-client-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551647" version="1" comment="samba-libs is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551648" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551649" version="1" comment="samba-winbind is &lt;4.4.2-38.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551650" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595719" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595720" version="1" comment="libdcerpc0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595721" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595722" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595723" version="1" comment="libndr-standard0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595724" version="1" comment="libndr0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595725" version="1" comment="libnetapi0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595726" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595727" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595728" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595729" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595730" version="1" comment="libsamba-util0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595731" version="1" comment="libsamdb0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595732" version="1" comment="libsmbclient0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595733" version="1" comment="libsmbconf0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595734" version="1" comment="libsmbldap0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595735" version="1" comment="libtevent-util0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595736" version="1" comment="libwbclient0 is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595737" version="1" comment="samba is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595738" version="1" comment="samba-client is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595739" version="1" comment="samba-libs is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595740" version="1" comment="samba-winbind is &lt;4.4.2-38.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552448" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;6-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552447" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537530" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;6-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537529" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530961" version="1" comment="git-core is &lt;2.26.2-27.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530962" version="1" comment="git-doc is &lt;2.26.2-27.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548984" version="1" comment="git-core is &lt;2.26.2-27.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595580" version="1" comment="git-core is &lt;2.26.2-27.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525303" version="1" comment="python-httplib2 is &lt;0.19.0-7.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531180" version="1" comment="xen is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531181" version="1" comment="xen-doc-html is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531182" version="1" comment="xen-libs is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531183" version="1" comment="xen-libs-32bit is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531184" version="1" comment="xen-tools is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531185" version="1" comment="xen-tools-domU is &lt;4.7.6_08-43.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552212" version="1" comment="qemu is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552213" version="1" comment="qemu-block-curl is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552214" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552215" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552216" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552217" version="1" comment="qemu-ipxe is &lt;1.0.0-41.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552218" version="1" comment="qemu-kvm is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552219" version="1" comment="qemu-lang is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552220" version="1" comment="qemu-seabios is &lt;1.9.1_0_gb3ef39f-41.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552221" version="1" comment="qemu-sgabios is &lt;8-41.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552222" version="1" comment="qemu-tools is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552223" version="1" comment="qemu-vgabios is &lt;1.9.1_0_gb3ef39f-41.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552224" version="1" comment="qemu-x86 is &lt;2.6.2-41.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531259" version="1" comment="apache2 is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531260" version="1" comment="apache2-doc is &lt;2.4.23-29.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531261" version="1" comment="apache2-example-pages is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531262" version="1" comment="apache2-prefork is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531263" version="1" comment="apache2-utils is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531264" version="1" comment="apache2-worker is &lt;2.4.23-29.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551666" version="1" comment="apache2 is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551667" version="1" comment="apache2-example-pages is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551668" version="1" comment="apache2-prefork is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551669" version="1" comment="apache2-utils is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551670" version="1" comment="apache2-worker is &lt;2.4.23-29.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595758" version="1" comment="apache2 is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595759" version="1" comment="apache2-example-pages is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595760" version="1" comment="apache2-prefork is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595761" version="1" comment="apache2-utils is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595762" version="1" comment="apache2-worker is &lt;2.4.23-29.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530963" version="1" comment="mailman is &lt;2.1.17-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548985" version="1" comment="mailman is &lt;2.1.17-3.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595581" version="1" comment="mailman is &lt;2.1.17-3.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530925" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530926" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530927" version="1" comment="openldap2 is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530928" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530929" version="1" comment="openldap2-client is &lt;2.4.41-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530930" version="1" comment="openldap2-doc is &lt;2.4.41-18.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530931" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551430" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551431" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551432" version="1" comment="openldap2 is &lt;2.4.41-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551433" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551434" version="1" comment="openldap2-client is &lt;2.4.41-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551435" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.68.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595551" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595552" version="1" comment="openldap2 is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595553" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595554" version="1" comment="openldap2-client is &lt;2.4.41-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595555" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.68.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530940" version="1" comment="ghostscript is &lt;9.52-23.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530941" version="1" comment="ghostscript-x11 is &lt;9.52-23.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530942" version="1" comment="libspectre1 is &lt;0.2.7-12.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548978" version="1" comment="ghostscript is &lt;9.52-23.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548979" version="1" comment="ghostscript-x11 is &lt;9.52-23.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548980" version="1" comment="libspectre1 is &lt;0.2.7-12.10.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595563" version="1" comment="ghostscript is &lt;9.52-23.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595564" version="1" comment="ghostscript-x11 is &lt;9.52-23.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595565" version="1" comment="libspectre1 is &lt;0.2.7-12.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531578" version="1" comment="kernel-firmware is &lt;20170530-21.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531579" version="1" comment="ucode-amd is &lt;20170530-21.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530943" version="1" comment="MozillaFirefox is &lt;68.8.0-109.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530944" version="1" comment="MozillaFirefox-devel is &lt;68.8.0-109.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530945" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-109.119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548981" version="1" comment="MozillaFirefox is &lt;68.8.0-109.119.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548982" version="1" comment="MozillaFirefox-devel is &lt;68.8.0-109.119.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548983" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-109.119.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595566" version="1" comment="MozillaFirefox is &lt;68.8.0-109.119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595567" version="1" comment="MozillaFirefox-devel is &lt;68.8.0-109.119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595568" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-109.119.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633044" version="1" comment="libfreebl3 is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633045" version="1" comment="libfreebl3-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633046" version="1" comment="libfreebl3-hmac is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633047" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633048" version="1" comment="libsoftokn3 is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633049" version="1" comment="libsoftokn3-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633050" version="1" comment="libsoftokn3-hmac is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633051" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633052" version="1" comment="mozilla-nspr is &lt;4.32-19.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633053" version="1" comment="mozilla-nspr-32bit is &lt;4.32-19.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633054" version="1" comment="mozilla-nss is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633055" version="1" comment="mozilla-nss-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633056" version="1" comment="mozilla-nss-certs is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633057" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633058" version="1" comment="mozilla-nss-sysinit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633059" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633060" version="1" comment="mozilla-nss-tools is &lt;3.68-58.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531092" version="1" comment="MozillaFirefox is &lt;78.0.1-112.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531093" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-35.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531094" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-112.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531095" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-112.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551527" version="1" comment="MozillaFirefox is &lt;78.0.1-112.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551528" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-35.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551529" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-112.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551530" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-112.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595655" version="1" comment="MozillaFirefox is &lt;78.0.1-112.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595656" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-35.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595657" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-112.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595658" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-112.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531010" version="1" comment="MozillaFirefox is &lt;68.9.0-109.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531011" version="1" comment="MozillaFirefox-devel is &lt;68.9.0-109.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531012" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-109.123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551466" version="1" comment="MozillaFirefox is &lt;68.9.0-109.123.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551467" version="1" comment="MozillaFirefox-devel is &lt;68.9.0-109.123.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551468" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-109.123.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595603" version="1" comment="MozillaFirefox is &lt;68.9.0-109.123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595604" version="1" comment="MozillaFirefox-devel is &lt;68.9.0-109.123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595605" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-109.123.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552445" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;10-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552444" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;9-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552443" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;8-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552442" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;7-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552441" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552446" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;2-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537471" version="1" comment="kgraft-patch-4_4_121-92_109-default is &lt;10-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537470" version="1" comment="kgraft-patch-4_4_121-92_114-default is &lt;9-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537469" version="1" comment="kgraft-patch-4_4_121-92_117-default is &lt;8-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537468" version="1" comment="kgraft-patch-4_4_121-92_120-default is &lt;7-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537467" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537472" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;2-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531186" version="1" comment="dovecot22 is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531187" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531188" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531189" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551602" version="1" comment="dovecot22 is &lt;2.2.31-19.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551603" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551604" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551605" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595714" version="1" comment="dovecot22 is &lt;2.2.31-19.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595715" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595716" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595717" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596127" version="1" comment="mariadb is &lt;10.2.36-19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596128" version="1" comment="mariadb-client is &lt;10.2.36-19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596129" version="1" comment="mariadb-errormessages is &lt;10.2.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596130" version="1" comment="mariadb-galera is &lt;10.2.36-19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596131" version="1" comment="mariadb-tools is &lt;10.2.36-19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552370" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552371" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539068" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.1-2.63.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552372" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552373" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552374" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552375" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552376" version="1" comment="webkit2gtk3-devel is &lt;2.32.1-2.63.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659102" version="1" comment="glib-networking is &lt;2.48.2-6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659084" version="1" comment="glib-networking-lang is &lt;2.48.2-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531105" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531106" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531107" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.3-2.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531108" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531109" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531110" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531111" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531112" version="1" comment="webkit2gtk3-devel is &lt;2.28.3-2.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551539" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551540" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551541" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551542" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551543" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551544" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551545" version="1" comment="webkit2gtk3-devel is &lt;2.28.3-2.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595666" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595667" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595668" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595669" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595670" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595671" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595672" version="1" comment="webkit2gtk3-devel is &lt;2.28.3-2.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525304" version="1" comment="python-rsa is &lt;3.1.4-12.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531497" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531498" version="1" comment="libasan6-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531499" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531500" version="1" comment="libatomic1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531501" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531502" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531503" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531504" version="1" comment="libgfortran5-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531505" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531506" version="1" comment="libgo16-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531507" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531508" version="1" comment="libgomp1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531509" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531510" version="1" comment="libitm1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531511" version="1" comment="liblsan0 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531512" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531513" version="1" comment="libobjc4-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531514" version="1" comment="libquadmath0 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531515" version="1" comment="libquadmath0-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531516" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531517" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531518" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531519" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531520" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531521" version="1" comment="libtsan0 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531522" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531523" version="1" comment="libubsan1-32bit is &lt;10.2.1+git583-1.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551865" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551866" version="1" comment="libasan6-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551867" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551868" version="1" comment="libatomic1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551869" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551870" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551871" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551872" version="1" comment="libgfortran5-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551873" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551874" version="1" comment="libgo16-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551875" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551876" version="1" comment="libgomp1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551877" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551878" version="1" comment="libitm1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537837" version="1" comment="liblsan0 is &lt;10.2.1+git583-1.3.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551879" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551880" version="1" comment="libobjc4-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537839" version="1" comment="libquadmath0 is &lt;10.2.1+git583-1.3.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551881" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551882" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551883" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551884" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009525349" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537843" version="1" comment="libtsan0 is &lt;10.2.1+git583-1.3.5 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551885" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.5 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551886" version="1" comment="libubsan1-32bit is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596029" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596030" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596031" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596032" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596033" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596034" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596035" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596036" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596037" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596038" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596039" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596040" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.5 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531293" version="1" comment="tomcat is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531294" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531295" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531296" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531297" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531298" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531299" version="1" comment="tomcat-lib is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531300" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531301" version="1" comment="tomcat-webapps is &lt;8.0.53-29.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334197" version="1" comment="python-rtslib-fb is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531064" version="1" comment="mutt is &lt;1.10.1-55.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551500" version="1" comment="mutt is &lt;1.10.1-55.11.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595637" version="1" comment="mutt is &lt;1.10.1-55.11.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531851" version="1" comment="openssh is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531852" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531853" version="1" comment="openssh-fips is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531854" version="1" comment="openssh-helpers is &lt;7.2p2-74.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552069" version="1" comment="openssh is &lt;7.2p2-74.57.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552070" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.57.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552071" version="1" comment="openssh-fips is &lt;7.2p2-74.57.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552072" version="1" comment="openssh-helpers is &lt;7.2p2-74.57.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596339" version="1" comment="openssh is &lt;7.2p2-74.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596340" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596341" version="1" comment="openssh-fips is &lt;7.2p2-74.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596342" version="1" comment="openssh-helpers is &lt;7.2p2-74.57.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531408" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531409" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531410" version="1" comment="libdcerpc0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531411" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531412" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531413" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531414" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531415" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531416" version="1" comment="libndr-standard0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531417" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531418" version="1" comment="libndr0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531419" version="1" comment="libndr0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531420" version="1" comment="libnetapi0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531421" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531422" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531423" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531424" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531425" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531426" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531427" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531428" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531429" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531430" version="1" comment="libsamba-util0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531431" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531432" version="1" comment="libsamdb0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531433" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531434" version="1" comment="libsmbclient0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531435" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531436" version="1" comment="libsmbconf0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531437" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531438" version="1" comment="libsmbldap0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531439" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531440" version="1" comment="libtevent-util0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531441" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531442" version="1" comment="libwbclient0 is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531443" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531444" version="1" comment="samba is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531445" version="1" comment="samba-client is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531446" version="1" comment="samba-client-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531447" version="1" comment="samba-doc is &lt;4.4.2-38.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531448" version="1" comment="samba-libs is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531449" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531450" version="1" comment="samba-winbind is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531451" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551783" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551784" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551785" version="1" comment="libdcerpc0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551786" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551787" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551788" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551789" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551790" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551791" version="1" comment="libndr-standard0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551792" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551793" version="1" comment="libndr0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551794" version="1" comment="libndr0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551795" version="1" comment="libnetapi0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551796" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551797" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551798" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551799" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551800" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551801" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551802" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551803" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551804" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551805" version="1" comment="libsamba-util0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551806" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551807" version="1" comment="libsamdb0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551808" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551809" version="1" comment="libsmbclient0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551810" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551811" version="1" comment="libsmbconf0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551812" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551813" version="1" comment="libsmbldap0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551814" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551815" version="1" comment="libtevent-util0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551816" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551817" version="1" comment="libwbclient0 is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551818" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551819" version="1" comment="samba is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551820" version="1" comment="samba-client is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551821" version="1" comment="samba-client-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551822" version="1" comment="samba-libs is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551823" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551824" version="1" comment="samba-winbind is &lt;4.4.2-38.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551825" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595961" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595962" version="1" comment="libdcerpc0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595963" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595964" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595965" version="1" comment="libndr-standard0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595966" version="1" comment="libndr0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595967" version="1" comment="libnetapi0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595968" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595969" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595970" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595971" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595972" version="1" comment="libsamba-util0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595973" version="1" comment="libsamdb0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595974" version="1" comment="libsmbclient0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595975" version="1" comment="libsmbconf0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595976" version="1" comment="libsmbldap0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595977" version="1" comment="libtevent-util0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595978" version="1" comment="libwbclient0 is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595979" version="1" comment="samba is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595980" version="1" comment="samba-client is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595981" version="1" comment="samba-libs is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595982" version="1" comment="samba-winbind is &lt;4.4.2-38.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628227" version="1" comment="python-PyYAML is &lt;5.3.1-28.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531165" version="1" comment="libX11-6 is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531166" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531167" version="1" comment="libX11-data is &lt;1.6.2-12.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531168" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531169" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531129" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531130" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531131" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531132" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531133" version="1" comment="libxcb-glx0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531134" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531135" version="1" comment="libxcb-present0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531136" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531137" version="1" comment="libxcb-randr0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531138" version="1" comment="libxcb-render0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531139" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531140" version="1" comment="libxcb-shape0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531141" version="1" comment="libxcb-shm0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531142" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531143" version="1" comment="libxcb-sync1 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531144" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531145" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531146" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531147" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531148" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531149" version="1" comment="libxcb-xkb1 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531150" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531151" version="1" comment="libxcb-xv0 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531152" version="1" comment="libxcb1 is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531153" version="1" comment="libxcb1-32bit is &lt;1.10-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551589" version="1" comment="libX11-6 is &lt;1.6.2-12.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551590" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551591" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.12.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551592" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551557" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551558" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551559" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551560" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551561" version="1" comment="libxcb-glx0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551562" version="1" comment="libxcb-glx0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551563" version="1" comment="libxcb-present0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551564" version="1" comment="libxcb-present0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551565" version="1" comment="libxcb-randr0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551566" version="1" comment="libxcb-render0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551567" version="1" comment="libxcb-render0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551568" version="1" comment="libxcb-shape0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551569" version="1" comment="libxcb-shm0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551570" version="1" comment="libxcb-shm0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551571" version="1" comment="libxcb-sync1 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551572" version="1" comment="libxcb-sync1-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551573" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551574" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551575" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551576" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551577" version="1" comment="libxcb-xkb1 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551578" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551579" version="1" comment="libxcb-xv0 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551580" version="1" comment="libxcb1 is &lt;1.10-4.5.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551581" version="1" comment="libxcb1-32bit is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595704" version="1" comment="libX11-6 is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595705" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595681" version="1" comment="libxcb-dri2-0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595682" version="1" comment="libxcb-dri3-0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595683" version="1" comment="libxcb-glx0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595684" version="1" comment="libxcb-present0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595685" version="1" comment="libxcb-randr0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595686" version="1" comment="libxcb-render0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595687" version="1" comment="libxcb-shape0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595688" version="1" comment="libxcb-shm0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595689" version="1" comment="libxcb-sync1 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595690" version="1" comment="libxcb-xf86dri0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595691" version="1" comment="libxcb-xfixes0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595692" version="1" comment="libxcb-xinerama0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595693" version="1" comment="libxcb-xkb1 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595694" version="1" comment="libxcb-xv0 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595695" version="1" comment="libxcb1 is &lt;1.10-4.5.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531240" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531241" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551651" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551652" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595741" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595742" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531636" version="1" comment="libecpg6 is &lt;12.5-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531637" version="1" comment="libpq5 is &lt;12.5-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531638" version="1" comment="libpq5-32bit is &lt;12.5-3.9.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531592" version="1" comment="postgresql10 is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531593" version="1" comment="postgresql10-contrib is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531594" version="1" comment="postgresql10-docs is &lt;10.15-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531595" version="1" comment="postgresql10-plperl is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531596" version="1" comment="postgresql10-plpython is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531597" version="1" comment="postgresql10-pltcl is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531598" version="1" comment="postgresql10-server is &lt;10.15-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551978" version="1" comment="libecpg6 is &lt;12.5-3.9.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551979" version="1" comment="libpq5 is &lt;12.5-3.9.3 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551980" version="1" comment="libpq5-32bit is &lt;12.5-3.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551942" version="1" comment="postgresql10 is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551943" version="1" comment="postgresql10-contrib is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551944" version="1" comment="postgresql10-plperl is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551945" version="1" comment="postgresql10-plpython is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551946" version="1" comment="postgresql10-pltcl is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551947" version="1" comment="postgresql10-server is &lt;10.15-4.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596134" version="1" comment="libecpg6 is &lt;12.5-3.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596135" version="1" comment="libpq5 is &lt;12.5-3.9.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596090" version="1" comment="postgresql10 is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596091" version="1" comment="postgresql10-contrib is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596092" version="1" comment="postgresql10-plperl is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596093" version="1" comment="postgresql10-plpython is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596094" version="1" comment="postgresql10-pltcl is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596095" version="1" comment="postgresql10-server is &lt;10.15-4.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334083" version="1" comment="postgresql is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531599" version="1" comment="postgresql96 is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531600" version="1" comment="postgresql96-contrib is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531601" version="1" comment="postgresql96-docs is &lt;9.6.20-6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531602" version="1" comment="postgresql96-plperl is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531603" version="1" comment="postgresql96-plpython is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531604" version="1" comment="postgresql96-pltcl is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531605" version="1" comment="postgresql96-server is &lt;9.6.20-6.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551948" version="1" comment="postgresql96 is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551949" version="1" comment="postgresql96-contrib is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551950" version="1" comment="postgresql96-plperl is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551951" version="1" comment="postgresql96-plpython is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551952" version="1" comment="postgresql96-pltcl is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551953" version="1" comment="postgresql96-server is &lt;9.6.20-6.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596096" version="1" comment="postgresql96 is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596097" version="1" comment="postgresql96-contrib is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596098" version="1" comment="postgresql96-plperl is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596099" version="1" comment="postgresql96-plpython is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596100" version="1" comment="postgresql96-pltcl is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596101" version="1" comment="postgresql96-server is &lt;9.6.20-6.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552356" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552357" version="1" comment="libspice-client-glib-helper is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552358" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552359" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552360" version="1" comment="libspice-controller0 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552355" version="1" comment="libspice-server1 is &lt;0.12.7-10.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552361" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552362" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-9.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531622" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531623" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551966" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551967" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.37.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596113" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596114" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.37.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531257" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531258" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551664" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551665" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595756" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595757" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531270" version="1" comment="libX11-6 is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531271" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531272" version="1" comment="libX11-data is &lt;1.6.2-12.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531273" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531274" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551673" version="1" comment="libX11-6 is &lt;1.6.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551674" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551675" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551676" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595767" version="1" comment="libX11-6 is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595768" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659981" version="1" comment="chrony is &lt;4.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531930" version="1" comment="grub2 is &lt;2.02-115.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531931" version="1" comment="grub2-i386-pc is &lt;2.02-115.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531932" version="1" comment="grub2-snapper-plugin is &lt;2.02-115.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531933" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02-115.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531934" version="1" comment="grub2-x86_64-efi is &lt;2.02-115.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531935" version="1" comment="grub2-x86_64-xen is &lt;2.02-115.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552128" version="1" comment="grub2 is &lt;2.02-115.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538177" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02-115.59.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552129" version="1" comment="grub2-s390x-emu is &lt;2.02-115.59.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596396" version="1" comment="grub2 is &lt;2.02-115.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531302" version="1" comment="perl-DBI is &lt;1.628-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551687" version="1" comment="perl-DBI is &lt;1.628-5.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595783" version="1" comment="perl-DBI is &lt;1.628-5.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679549" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-15.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679539" version="1" comment="libSDL-1_2-0-32bit is &lt;1.2.15-15.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531162" version="1" comment="python-ipaddress is &lt;1.0.18-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531493" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531494" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531495" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531496" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-27.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551861" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551862" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551863" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551864" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-27.48.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596025" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596026" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596027" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596028" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-27.48.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531377" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531378" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531379" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531380" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.271-43.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551755" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.271-43.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551756" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.271-43.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551757" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.271-43.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551758" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.271-43.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595832" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.271-43.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595833" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.271-43.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595834" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.271-43.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595835" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.271-43.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531308" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531309" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531310" version="1" comment="libdcerpc0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531311" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531312" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531313" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531314" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531315" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531316" version="1" comment="libndr-standard0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531317" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531318" version="1" comment="libndr0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531319" version="1" comment="libndr0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531320" version="1" comment="libnetapi0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531321" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531322" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531323" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531324" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531325" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531326" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531327" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531328" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531329" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531330" version="1" comment="libsamba-util0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531331" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531332" version="1" comment="libsamdb0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531333" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531334" version="1" comment="libsmbclient0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531335" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531336" version="1" comment="libsmbconf0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531337" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531338" version="1" comment="libsmbldap0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531339" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531340" version="1" comment="libtevent-util0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531341" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531342" version="1" comment="libwbclient0 is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531343" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531344" version="1" comment="samba is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531345" version="1" comment="samba-client is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531346" version="1" comment="samba-client-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531347" version="1" comment="samba-doc is &lt;4.4.2-38.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531348" version="1" comment="samba-libs is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531349" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531350" version="1" comment="samba-winbind is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531351" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551693" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551694" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551695" version="1" comment="libdcerpc0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551696" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551697" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551698" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551699" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551700" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551701" version="1" comment="libndr-standard0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551702" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551703" version="1" comment="libndr0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551704" version="1" comment="libndr0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551705" version="1" comment="libnetapi0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551706" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551707" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551708" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551709" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551710" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551711" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551712" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551713" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551714" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551715" version="1" comment="libsamba-util0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551716" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551717" version="1" comment="libsamdb0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551718" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551719" version="1" comment="libsmbclient0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551720" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551721" version="1" comment="libsmbconf0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551722" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551723" version="1" comment="libsmbldap0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551724" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551725" version="1" comment="libtevent-util0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551726" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551727" version="1" comment="libwbclient0 is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551728" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551729" version="1" comment="samba is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551730" version="1" comment="samba-client is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551731" version="1" comment="samba-client-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551732" version="1" comment="samba-libs is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551733" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551734" version="1" comment="samba-winbind is &lt;4.4.2-38.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551735" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595791" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595792" version="1" comment="libdcerpc0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595793" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595794" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595795" version="1" comment="libndr-standard0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595796" version="1" comment="libndr0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595797" version="1" comment="libnetapi0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595798" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595799" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595800" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595801" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595802" version="1" comment="libsamba-util0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595803" version="1" comment="libsamdb0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595804" version="1" comment="libsmbclient0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595805" version="1" comment="libsmbconf0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595806" version="1" comment="libsmbldap0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595807" version="1" comment="libtevent-util0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595808" version="1" comment="libwbclient0 is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595809" version="1" comment="samba is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595810" version="1" comment="samba-client is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595811" version="1" comment="samba-libs is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595812" version="1" comment="samba-winbind is &lt;4.4.2-38.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531526" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531527" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531528" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531529" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.281-43.44.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531832" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531833" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531834" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531835" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531836" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.75-38.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531863" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531864" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531865" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531866" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.20-30.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551896" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.281-43.44.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551897" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.281-43.44.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551898" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.281-43.44.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551899" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.281-43.44.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552060" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-38.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543165" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-38.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552061" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-38.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552079" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.20-30.78.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543206" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.20-30.78.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596047" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.281-43.44.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596048" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.281-43.44.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596049" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.281-43.44.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596050" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.281-43.44.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596321" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.75-38.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596322" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.75-38.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596323" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.75-38.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596349" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.20-30.78.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596350" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.20-30.78.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531909" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531910" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531911" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531912" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531913" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.80-38.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531920" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531921" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531922" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531923" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.25-30.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531916" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531917" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531918" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531919" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-27.56.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552114" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-38.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543223" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-38.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552115" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-38.62.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552122" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.25-30.81.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009543254" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.25-30.81.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552118" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-27.56.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552119" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-27.56.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552120" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-27.56.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552121" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-27.56.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596380" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.80-38.62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596381" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.80-38.62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596382" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.80-38.62.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596389" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.25-30.81.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596390" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.25-30.81.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596385" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-27.56.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596386" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-27.56.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596387" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-27.56.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596388" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-27.56.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333996" version="1" comment="openssh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531104" version="1" comment="mailman is &lt;2.1.17-3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551538" version="1" comment="mailman is &lt;2.1.17-3.23.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595665" version="1" comment="mailman is &lt;2.1.17-3.23.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531103" version="1" comment="squid is &lt;3.5.21-26.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551537" version="1" comment="squid is &lt;3.5.21-26.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595664" version="1" comment="squid is &lt;3.5.21-26.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595785" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531121" version="1" comment="MozillaFirefox is &lt;78.1.0-112.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531122" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-112.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531123" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-112.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551550" version="1" comment="MozillaFirefox is &lt;78.1.0-112.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551551" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-112.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551552" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-112.8.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595676" version="1" comment="MozillaFirefox is &lt;78.1.0-112.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595677" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-112.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595678" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-112.8.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531280" version="1" comment="MozillaFirefox is &lt;78.2.0-112.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531281" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-112.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531282" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-112.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551679" version="1" comment="MozillaFirefox is &lt;78.2.0-112.19.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551680" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-112.19.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551681" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-112.19.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595772" version="1" comment="MozillaFirefox is &lt;78.2.0-112.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595773" version="1" comment="MozillaFirefox-devel is &lt;78.2.0-112.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595774" version="1" comment="MozillaFirefox-translations-common is &lt;78.2.0-112.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531352" version="1" comment="MozillaFirefox is &lt;78.3.0-112.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531353" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-112.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531354" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-112.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551736" version="1" comment="MozillaFirefox is &lt;78.3.0-112.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551737" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-112.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551738" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-112.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595813" version="1" comment="MozillaFirefox is &lt;78.3.0-112.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595814" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-112.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595815" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-112.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531405" version="1" comment="MozillaFirefox is &lt;78.4.0-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531406" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531407" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-112.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551780" version="1" comment="MozillaFirefox is &lt;78.4.0-112.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551781" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-112.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551782" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-112.28.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595958" version="1" comment="MozillaFirefox is &lt;78.4.0-112.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595959" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-112.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595960" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-112.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531190" version="1" comment="grub2 is &lt;2.02~beta2-115.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531191" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-115.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531192" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-115.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531193" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-115.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531194" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-115.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531195" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-115.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551606" version="1" comment="grub2 is &lt;2.02~beta2-115.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537624" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-115.56.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551607" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-115.56.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595718" version="1" comment="grub2 is &lt;2.02~beta2-115.56.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531456" version="1" comment="libvirt is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531457" version="1" comment="libvirt-client is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531458" version="1" comment="libvirt-daemon is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531459" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531460" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531461" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531462" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531463" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531464" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531465" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531466" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531467" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531468" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531469" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531470" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531471" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531472" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531473" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531474" version="1" comment="libvirt-doc is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531475" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531476" version="1" comment="libvirt-nss is &lt;2.0.0-27.64.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551827" version="1" comment="libvirt is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551828" version="1" comment="libvirt-client is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551829" version="1" comment="libvirt-daemon is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551830" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551831" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551832" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551833" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551834" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551835" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551836" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551837" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551838" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551839" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551840" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551841" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551842" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551843" version="1" comment="libvirt-doc is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551844" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551845" version="1" comment="libvirt-nss is &lt;2.0.0-27.64.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595991" version="1" comment="libvirt is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595992" version="1" comment="libvirt-client is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595993" version="1" comment="libvirt-daemon is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595994" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595995" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595996" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595997" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595998" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595999" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596000" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596001" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596002" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596003" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596004" version="1" comment="libvirt-daemon-hooks is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596005" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596006" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596007" version="1" comment="libvirt-doc is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596008" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596009" version="1" comment="libvirt-nss is &lt;2.0.0-27.64.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531269" version="1" comment="squid is &lt;3.5.21-26.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551672" version="1" comment="squid is &lt;3.5.21-26.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595766" version="1" comment="squid is &lt;3.5.21-26.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661606" version="1" comment="libsnmp30 is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661599" version="1" comment="libsnmp30-32bit is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661607" version="1" comment="net-snmp is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661608" version="1" comment="perl-SNMP is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661609" version="1" comment="snmp-mibs is &lt;5.7.3-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334180" version="1" comment="lua is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334181" version="1" comment="lua51 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531119" version="1" comment="ghostscript is &lt;9.52-23.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531120" version="1" comment="ghostscript-x11 is &lt;9.52-23.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551548" version="1" comment="ghostscript is &lt;9.52-23.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551549" version="1" comment="ghostscript-x11 is &lt;9.52-23.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595674" version="1" comment="ghostscript is &lt;9.52-23.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595675" version="1" comment="ghostscript-x11 is &lt;9.52-23.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531617" version="1" comment="MozillaFirefox is &lt;78.5.0-112.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531618" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-112.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531619" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-112.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531390" version="1" comment="ft2demos is &lt;2.6.3-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531391" version="1" comment="libfreetype6 is &lt;2.6.3-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531392" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551961" version="1" comment="MozillaFirefox is &lt;78.5.0-112.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551962" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-112.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551963" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-112.36.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551768" version="1" comment="ft2demos is &lt;2.6.3-7.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551769" version="1" comment="libfreetype6 is &lt;2.6.3-7.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551770" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596108" version="1" comment="MozillaFirefox is &lt;78.5.0-112.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596109" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-112.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596110" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-112.36.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595951" version="1" comment="ft2demos is &lt;2.6.3-7.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595952" version="1" comment="libfreetype6 is &lt;2.6.3-7.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334204" version="1" comment="freetype is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531677" version="1" comment="MozillaFirefox is &lt;78.6.0-112.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531678" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-112.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531679" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-112.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552008" version="1" comment="MozillaFirefox is &lt;78.6.0-112.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552009" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-112.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552010" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-112.39.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596161" version="1" comment="MozillaFirefox is &lt;78.6.0-112.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596162" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-112.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596163" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-112.39.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531977" version="1" comment="MozillaFirefox is &lt;78.6.1-112.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531978" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-112.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531979" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-112.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552164" version="1" comment="MozillaFirefox is &lt;78.6.1-112.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552165" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-112.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552166" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-112.42.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596426" version="1" comment="MozillaFirefox is &lt;78.6.1-112.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596427" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-112.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596428" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-112.42.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531629" version="1" comment="gdm is &lt;3.10.0.1-54.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531630" version="1" comment="gdm-lang is &lt;3.10.0.1-54.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531631" version="1" comment="gdmflexiserver is &lt;3.10.0.1-54.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531632" version="1" comment="libgdm1 is &lt;3.10.0.1-54.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531633" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551973" version="1" comment="gdm is &lt;3.10.0.1-54.17.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551974" version="1" comment="libgdm1 is &lt;3.10.0.1-54.17.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551975" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.17.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596120" version="1" comment="gdm is &lt;3.10.0.1-54.17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596121" version="1" comment="libgdm1 is &lt;3.10.0.1-54.17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596122" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-54.17.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338842" version="1" comment="accountsservice is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522619" version="1" comment="libsystemd0 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522620" version="1" comment="libsystemd0-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522621" version="1" comment="libudev1 is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522622" version="1" comment="libudev1-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522623" version="1" comment="systemd is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522624" version="1" comment="systemd-32bit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522625" version="1" comment="systemd-bash-completion is &lt;228-150.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522626" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522627" version="1" comment="udev is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531525" version="1" comment="libudev-devel is &lt;228-150.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551887" version="1" comment="libsystemd0 is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551888" version="1" comment="libsystemd0-32bit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551889" version="1" comment="libudev-devel is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551890" version="1" comment="libudev1 is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551891" version="1" comment="libudev1-32bit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551892" version="1" comment="systemd is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551893" version="1" comment="systemd-32bit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551894" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551895" version="1" comment="udev is &lt;228-150.82.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596041" version="1" comment="libsystemd0 is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596042" version="1" comment="libudev-devel is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596043" version="1" comment="libudev1 is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596044" version="1" comment="systemd is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596045" version="1" comment="systemd-sysvinit is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596046" version="1" comment="udev is &lt;228-150.82.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522670" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522671" version="1" comment="libpq5 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522672" version="1" comment="libpq5-32bit is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522673" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531765" version="1" comment="postgresql10-contrib is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531766" version="1" comment="postgresql10-docs is &lt;10.12-1.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531767" version="1" comment="postgresql10-plperl is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531768" version="1" comment="postgresql10-plpython is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531769" version="1" comment="postgresql10-pltcl is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531770" version="1" comment="postgresql10-server is &lt;10.12-1.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531754" version="1" comment="postgresql96 is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531755" version="1" comment="postgresql96-contrib is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531756" version="1" comment="postgresql96-docs is &lt;9.6.17-3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531757" version="1" comment="postgresql96-plperl is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531758" version="1" comment="postgresql96-plpython is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531759" version="1" comment="postgresql96-pltcl is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531760" version="1" comment="postgresql96-server is &lt;9.6.17-3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549102" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549103" version="1" comment="libpq5 is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549104" version="1" comment="libpq5-32bit is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549105" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549106" version="1" comment="postgresql10-contrib is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549107" version="1" comment="postgresql10-plperl is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549108" version="1" comment="postgresql10-plpython is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549109" version="1" comment="postgresql10-pltcl is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549110" version="1" comment="postgresql10-server is &lt;10.12-1.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549089" version="1" comment="postgresql96 is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549090" version="1" comment="postgresql96-contrib is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549091" version="1" comment="postgresql96-plperl is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549092" version="1" comment="postgresql96-plpython is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549093" version="1" comment="postgresql96-pltcl is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549094" version="1" comment="postgresql96-server is &lt;9.6.17-3.33.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596236" version="1" comment="libecpg6 is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596237" version="1" comment="libpq5 is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596238" version="1" comment="postgresql10 is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596239" version="1" comment="postgresql10-contrib is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596240" version="1" comment="postgresql10-plperl is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596241" version="1" comment="postgresql10-plpython is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596242" version="1" comment="postgresql10-pltcl is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596243" version="1" comment="postgresql10-server is &lt;10.12-1.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596222" version="1" comment="postgresql96 is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596223" version="1" comment="postgresql96-contrib is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596224" version="1" comment="postgresql96-plperl is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596225" version="1" comment="postgresql96-plpython is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596226" version="1" comment="postgresql96-pltcl is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596227" version="1" comment="postgresql96-server is &lt;9.6.17-3.33.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595579" version="1" comment="python-PyYAML is &lt;5.1.2-26.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334171" version="1" comment="gnome-shell is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531355" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531356" version="1" comment="libQt5Core5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531357" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531358" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531359" version="1" comment="libQt5Network5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531360" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531361" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531362" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531363" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531364" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531365" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531366" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531367" version="1" comment="libQt5Test5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531368" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531369" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551739" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551740" version="1" comment="libQt5Core5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551741" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551742" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551743" version="1" comment="libQt5Network5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551744" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551745" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551746" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551747" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551748" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551749" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551750" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551751" version="1" comment="libQt5Test5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551752" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551753" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595816" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595817" version="1" comment="libQt5Core5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595818" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595819" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595820" version="1" comment="libQt5Network5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595821" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595822" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595823" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595824" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595825" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595826" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595827" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595828" version="1" comment="libQt5Test5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595829" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595830" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677624" version="1" comment="glibc is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677550" version="1" comment="glibc-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677625" version="1" comment="glibc-devel is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677552" version="1" comment="glibc-devel-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677553" version="1" comment="glibc-html is &lt;2.22-123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677554" version="1" comment="glibc-i18ndata is &lt;2.22-123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677555" version="1" comment="glibc-info is &lt;2.22-123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677626" version="1" comment="glibc-locale is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677557" version="1" comment="glibc-locale-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677627" version="1" comment="glibc-profile is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677559" version="1" comment="glibc-profile-32bit is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677628" version="1" comment="nscd is &lt;2.22-123.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552308" version="1" comment="graphviz is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552309" version="1" comment="graphviz-gd is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552310" version="1" comment="graphviz-gnome is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552311" version="1" comment="graphviz-tcl is &lt;2.28.0-29.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530955" version="1" comment="apache2 is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530956" version="1" comment="apache2-doc is &lt;2.4.23-29.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530957" version="1" comment="apache2-example-pages is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530958" version="1" comment="apache2-prefork is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530959" version="1" comment="apache2-utils is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530960" version="1" comment="apache2-worker is &lt;2.4.23-29.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551449" version="1" comment="apache2 is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551450" version="1" comment="apache2-example-pages is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551451" version="1" comment="apache2-prefork is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551452" version="1" comment="apache2-utils is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551453" version="1" comment="apache2-worker is &lt;2.4.23-29.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595574" version="1" comment="apache2 is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595575" version="1" comment="apache2-example-pages is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595576" version="1" comment="apache2-prefork is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595577" version="1" comment="apache2-utils is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595578" version="1" comment="apache2-worker is &lt;2.4.23-29.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531774" version="1" comment="tomcat is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531775" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531776" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531777" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531778" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531779" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531780" version="1" comment="tomcat-lib is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531781" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531782" version="1" comment="tomcat-webapps is &lt;8.0.53-29.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339431" version="1" comment="couchdb is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531837" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531838" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531839" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531840" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.154.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552062" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.154.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552063" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.154.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552064" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.154.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552065" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.154.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596332" version="1" comment="ImageMagick-config-6-SUSE is &lt;6.8.8.1-71.154.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596333" version="1" comment="ImageMagick-config-6-upstream is &lt;6.8.8.1-71.154.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596334" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-71.154.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596335" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-71.154.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531646" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531647" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531648" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531649" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531650" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531651" version="1" comment="openssl is &lt;1.0.2j-60.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531652" version="1" comment="openssl-doc is &lt;1.0.2j-60.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551982" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551983" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551984" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551985" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551986" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551987" version="1" comment="openssl is &lt;1.0.2j-60.63.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596137" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596138" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596139" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596140" version="1" comment="openssl is &lt;1.0.2j-60.63.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653544" version="1" comment="transfig is &lt;3.2.8b-2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334081" version="1" comment="libarchive is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531828" version="1" comment="dovecot22 is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531829" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531830" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531831" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552056" version="1" comment="dovecot22 is &lt;2.2.31-19.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552057" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552058" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552059" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596316" version="1" comment="dovecot22 is &lt;2.2.31-19.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596317" version="1" comment="dovecot22-backend-mysql is &lt;2.2.31-19.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596318" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.31-19.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596319" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.31-19.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539041" version="1" comment="ucode-intel is &lt;20210525-13.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625783" version="1" comment="kernel-default is &lt;4.4.121-92.158.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625784" version="1" comment="kernel-default-base is &lt;4.4.121-92.158.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625785" version="1" comment="kernel-default-devel is &lt;4.4.121-92.158.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625786" version="1" comment="kernel-devel is &lt;4.4.121-92.158.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625787" version="1" comment="kernel-macros is &lt;4.4.121-92.158.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625788" version="1" comment="kernel-source is &lt;4.4.121-92.158.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625789" version="1" comment="kernel-syms is &lt;4.4.121-92.158.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634372" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634373" version="1" comment="libQt5Core5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634374" version="1" comment="libQt5DBus5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634375" version="1" comment="libQt5Gui5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634376" version="1" comment="libQt5Network5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634377" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634378" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634379" version="1" comment="libQt5Sql5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634380" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634381" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634382" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634383" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634384" version="1" comment="libQt5Test5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634385" version="1" comment="libQt5Widgets5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634386" version="1" comment="libQt5Xml5 is &lt;5.6.1-17.21.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333991" version="1" comment="squid is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531384" version="1" comment="libproxy1 is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531385" version="1" comment="libproxy1-32bit is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531386" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531387" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531388" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531389" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-18.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551762" version="1" comment="libproxy1 is &lt;0.4.13-18.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551763" version="1" comment="libproxy1-32bit is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551764" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-18.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551765" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551766" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-18.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551767" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-18.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595839" version="1" comment="libproxy1 is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595840" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595841" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595842" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-18.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657553" version="1" comment="libruby2_1-2_1 is &lt;2.1.9-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657554" version="1" comment="ruby2.1 is &lt;2.1.9-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657555" version="1" comment="ruby2.1-stdlib is &lt;2.1.9-19.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339432" version="1" comment="erlang is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552473" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552472" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552471" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552470" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552469" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;3-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537899" version="1" comment="kgraft-patch-4_4_121-92_125-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537898" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537897" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537896" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537895" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;3-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531634" version="1" comment="python-cryptography is &lt;2.1.4-7.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531635" version="1" comment="python3-cryptography is &lt;2.1.4-7.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551976" version="1" comment="python-cryptography is &lt;2.1.4-7.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551977" version="1" comment="python3-cryptography is &lt;2.1.4-7.31.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596132" version="1" comment="python-cryptography is &lt;2.1.4-7.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596133" version="1" comment="python3-cryptography is &lt;2.1.4-7.31.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552474" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552475" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;5-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552476" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;5-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552477" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;4-2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537939" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537940" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;5-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537941" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;5-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009537942" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;4-2.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531824" version="1" comment="dnsmasq is &lt;2.78-18.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552052" version="1" comment="dnsmasq is &lt;2.78-18.15.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596312" version="1" comment="dnsmasq is &lt;2.78-18.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596313" version="1" comment="dnsmasq-utils is &lt;2.78-18.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531530" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531531" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531532" version="1" comment="openldap2 is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531533" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531534" version="1" comment="openldap2-client is &lt;2.4.41-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531535" version="1" comment="openldap2-doc is &lt;2.4.41-18.77.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531536" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551900" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551901" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551902" version="1" comment="openldap2 is &lt;2.4.41-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551903" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551904" version="1" comment="openldap2-client is &lt;2.4.41-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551905" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596051" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596052" version="1" comment="openldap2 is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596053" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596054" version="1" comment="openldap2-client is &lt;2.4.41-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596055" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.77.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531841" version="1" comment="libecpg6 is &lt;13.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531842" version="1" comment="libpq5 is &lt;13.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531843" version="1" comment="libpq5-32bit is &lt;13.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531844" version="1" comment="postgresql is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531845" version="1" comment="postgresql-contrib is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531846" version="1" comment="postgresql-docs is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531847" version="1" comment="postgresql-plperl is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531848" version="1" comment="postgresql-plpython is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531849" version="1" comment="postgresql-pltcl is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531850" version="1" comment="postgresql-server is &lt;13-4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552066" version="1" comment="libecpg6 is &lt;13.1-3.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552067" version="1" comment="libpq5 is &lt;13.1-3.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552068" version="1" comment="libpq5-32bit is &lt;13.1-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596337" version="1" comment="libecpg6 is &lt;13.1-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596338" version="1" comment="libpq5 is &lt;13.1-3.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531620" version="1" comment="libvncclient0 is &lt;0.9.9-17.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531621" version="1" comment="libvncserver0 is &lt;0.9.9-17.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551964" version="1" comment="libvncclient0 is &lt;0.9.9-17.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551965" version="1" comment="libvncserver0 is &lt;0.9.9-17.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596111" version="1" comment="libvncclient0 is &lt;0.9.9-17.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596112" version="1" comment="libvncserver0 is &lt;0.9.9-17.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522665" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531761" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531762" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522666" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531724" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531725" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531726" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531727" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531728" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.60-38.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522598" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531291" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531292" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522599" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549095" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549096" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.251-43.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549097" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.251-43.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549098" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549059" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-38.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542713" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-38.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549060" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-38.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549013" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549014" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-27.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549015" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-27.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549016" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596228" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.251-43.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596229" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.251-43.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596230" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.251-43.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596231" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.251-43.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596184" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.60-38.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596185" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.60-38.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596186" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.60-38.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595779" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-27.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595780" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-27.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595781" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-27.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595782" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-27.41.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596373" version="1" comment="python-urllib3 is &lt;1.16-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531381" version="1" comment="libXvnc1 is &lt;1.6.0-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531382" version="1" comment="tigervnc is &lt;1.6.0-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531383" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551759" version="1" comment="libXvnc1 is &lt;1.6.0-27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551760" version="1" comment="tigervnc is &lt;1.6.0-27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551761" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595836" version="1" comment="libXvnc1 is &lt;1.6.0-27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595837" version="1" comment="tigervnc is &lt;1.6.0-27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595838" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631062" version="1" comment="python3-urllib3 is &lt;1.25.10-3.31.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531038" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531039" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531040" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531041" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531042" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.65-38.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551490" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-38.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009542540" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-38.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551491" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-38.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009127681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595626" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.65-38.53.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595627" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.65-38.53.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595628" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.65-38.53.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339189" version="1" comment="libass is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531537" version="1" comment="MozillaFirefox is &lt;78.4.1-112.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531538" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-112.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531539" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-112.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551906" version="1" comment="MozillaFirefox is &lt;78.4.1-112.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551907" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-112.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551908" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-112.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596056" version="1" comment="MozillaFirefox is &lt;78.4.1-112.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596057" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-112.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596058" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-112.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531856" version="1" comment="MozillaFirefox is &lt;78.7.0-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531857" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531858" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-112.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552074" version="1" comment="MozillaFirefox is &lt;78.7.0-112.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552075" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-112.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552076" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-112.45.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596344" version="1" comment="MozillaFirefox is &lt;78.7.0-112.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596345" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-112.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596346" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-112.45.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531047" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531048" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531049" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531050" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-27.45.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551493" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-27.45.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551494" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-27.45.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551495" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-27.45.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551496" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-27.45.6 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595631" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-27.45.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595632" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-27.45.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595633" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-27.45.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595634" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-27.45.6 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531017" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531018" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531019" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531020" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.261-43.38.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551473" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.261-43.38.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551474" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.261-43.38.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551475" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.261-43.38.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551476" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.261-43.38.8 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595610" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.261-43.38.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595611" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.261-43.38.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595612" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.261-43.38.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595613" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.261-43.38.8 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552303" version="1" comment="libpython3_4m1_0 is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552304" version="1" comment="python3 is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552305" version="1" comment="python3-base is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552306" version="1" comment="python3-curses is &lt;3.4.10-25.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531640" version="1" comment="xen is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531641" version="1" comment="xen-doc-html is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531642" version="1" comment="xen-libs is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531643" version="1" comment="xen-libs-32bit is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531644" version="1" comment="xen-tools is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531645" version="1" comment="xen-tools-domU is &lt;4.7.6_12-43.70.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334112" version="1" comment="pam is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552494" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;9-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552493" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531992" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;7-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552492" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;6-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552491" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;4-2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009125094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538223" version="1" comment="kgraft-patch-4_4_121-92_129-default is &lt;9-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538222" version="1" comment="kgraft-patch-4_4_121-92_135-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538224" version="1" comment="kgraft-patch-4_4_121-92_138-default is &lt;7-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538221" version="1" comment="kgraft-patch-4_4_121-92_141-default is &lt;6-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538220" version="1" comment="kgraft-patch-4_4_121-92_146-default is &lt;4-2.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531859" version="1" comment="openvswitch is &lt;2.5.11-25.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531860" version="1" comment="openvswitch-dpdk is &lt;2.5.11-25.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531861" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.11-25.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531862" version="1" comment="openvswitch-switch is &lt;2.5.11-25.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552077" version="1" comment="openvswitch is &lt;2.5.11-25.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552078" version="1" comment="openvswitch-switch is &lt;2.5.11-25.26.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596347" version="1" comment="openvswitch is &lt;2.5.11-25.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596348" version="1" comment="openvswitch-switch is &lt;2.5.11-25.26.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531900" version="1" comment="libjasper1 is &lt;1.900.14-195.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531901" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552106" version="1" comment="libjasper1 is &lt;1.900.14-195.25.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552107" version="1" comment="libjasper1-32bit is &lt;1.900.14-195.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596374" version="1" comment="libjasper1 is &lt;1.900.14-195.25.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531584" version="1" comment="krb5 is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531585" version="1" comment="krb5-32bit is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531586" version="1" comment="krb5-client is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531587" version="1" comment="krb5-doc is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531588" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531589" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531590" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531591" version="1" comment="krb5-server is &lt;1.12.5-40.40.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551934" version="1" comment="krb5 is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551935" version="1" comment="krb5-32bit is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551936" version="1" comment="krb5-client is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551937" version="1" comment="krb5-doc is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551938" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551939" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551940" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551941" version="1" comment="krb5-server is &lt;1.12.5-40.40.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596083" version="1" comment="krb5 is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596084" version="1" comment="krb5-client is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596085" version="1" comment="krb5-doc is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596086" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596087" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596088" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596089" version="1" comment="krb5-server is &lt;1.12.5-40.40.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531943" version="1" comment="kernel-default is &lt;4.4.121-92.152.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531944" version="1" comment="kernel-default-base is &lt;4.4.121-92.152.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531945" version="1" comment="kernel-default-devel is &lt;4.4.121-92.152.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531946" version="1" comment="kernel-devel is &lt;4.4.121-92.152.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531947" version="1" comment="kernel-macros is &lt;4.4.121-92.152.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531948" version="1" comment="kernel-source is &lt;4.4.121-92.152.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531949" version="1" comment="kernel-syms is &lt;4.4.121-92.152.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531950" version="1" comment="kgraft-patch-4_4_121-92_152-default is &lt;1-3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552136" version="1" comment="kernel-default is &lt;4.4.121-92.152.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552137" version="1" comment="kernel-default-base is &lt;4.4.121-92.152.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552138" version="1" comment="kernel-default-devel is &lt;4.4.121-92.152.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552139" version="1" comment="kernel-default-man is &lt;4.4.121-92.152.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552140" version="1" comment="kernel-syms is &lt;4.4.121-92.152.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538188" version="1" comment="kgraft-patch-4_4_121-92_152-default is &lt;1-3.3.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596402" version="1" comment="kernel-default is &lt;4.4.121-92.152.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596403" version="1" comment="kernel-default-base is &lt;4.4.121-92.152.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596404" version="1" comment="kernel-default-devel is &lt;4.4.121-92.152.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596405" version="1" comment="kernel-syms is &lt;4.4.121-92.152.2 for s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530079" version="1" comment="python-Jinja2 is &lt;2.8-22.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531639" version="1" comment="mutt is &lt;1.10.1-55.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551981" version="1" comment="mutt is &lt;1.10.1-55.18.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596136" version="1" comment="mutt is &lt;1.10.1-55.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531680" version="1" comment="xen is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531681" version="1" comment="xen-doc-html is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531682" version="1" comment="xen-libs is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531683" version="1" comment="xen-libs-32bit is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531684" version="1" comment="xen-tools is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531685" version="1" comment="xen-tools-domU is &lt;4.7.6_14-43.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339494" version="1" comment="p11-kit is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552377" version="1" comment="apache2 is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539074" version="1" comment="apache2-doc is &lt;2.4.23-29.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552378" version="1" comment="apache2-example-pages is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552379" version="1" comment="apache2-prefork is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552380" version="1" comment="apache2-utils is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552381" version="1" comment="apache2-worker is &lt;2.4.23-29.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334276" version="1" comment="cairo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531895" version="1" comment="openvswitch is &lt;2.5.11-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531896" version="1" comment="openvswitch-dpdk is &lt;2.5.11-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531897" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.11-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531898" version="1" comment="openvswitch-switch is &lt;2.5.11-25.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552103" version="1" comment="openvswitch is &lt;2.5.11-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552104" version="1" comment="openvswitch-switch is &lt;2.5.11-25.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596370" version="1" comment="openvswitch is &lt;2.5.11-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596371" version="1" comment="openvswitch-switch is &lt;2.5.11-25.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653168" version="1" comment="qemu is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653169" version="1" comment="qemu-block-curl is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653170" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653171" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653172" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653173" version="1" comment="qemu-ipxe is &lt;1.0.0-41.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653174" version="1" comment="qemu-kvm is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653175" version="1" comment="qemu-lang is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653176" version="1" comment="qemu-seabios is &lt;1.9.1_0_gb3ef39f-41.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653177" version="1" comment="qemu-sgabios is &lt;8-41.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653178" version="1" comment="qemu-tools is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653179" version="1" comment="qemu-vgabios is &lt;1.9.1_0_gb3ef39f-41.73.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653180" version="1" comment="qemu-x86 is &lt;2.6.2-41.73.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596324" version="1" comment="python-Pillow is &lt;2.8.1-4.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531994" version="1" comment="libwavpack1 is &lt;4.60.99-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552179" version="1" comment="libwavpack1 is &lt;4.60.99-5.9.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596436" version="1" comment="libwavpack1 is &lt;4.60.99-5.9.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531936" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531937" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531938" version="1" comment="openldap2 is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531939" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531940" version="1" comment="openldap2-client is &lt;2.4.41-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531941" version="1" comment="openldap2-doc is &lt;2.4.41-18.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531942" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552130" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552131" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552132" version="1" comment="openldap2 is &lt;2.4.41-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552133" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552134" version="1" comment="openldap2-client is &lt;2.4.41-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552135" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596397" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596398" version="1" comment="openldap2 is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596399" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596400" version="1" comment="openldap2-client is &lt;2.4.41-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596401" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.83.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531928" version="1" comment="python-cryptography is &lt;2.1.4-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531929" version="1" comment="python3-cryptography is &lt;2.1.4-7.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552126" version="1" comment="python-cryptography is &lt;2.1.4-7.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552127" version="1" comment="python3-cryptography is &lt;2.1.4-7.34.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596394" version="1" comment="python-cryptography is &lt;2.1.4-7.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596395" version="1" comment="python3-cryptography is &lt;2.1.4-7.34.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530902" version="1" comment="cups is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530903" version="1" comment="cups-client is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530904" version="1" comment="cups-libs is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530905" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548953" version="1" comment="cups is &lt;1.7.5-20.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548954" version="1" comment="cups-client is &lt;1.7.5-20.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548955" version="1" comment="cups-libs is &lt;1.7.5-20.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009548956" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595532" version="1" comment="cups is &lt;1.7.5-20.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595533" version="1" comment="cups-client is &lt;1.7.5-20.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595534" version="1" comment="cups-libs is &lt;1.7.5-20.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530932" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530933" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530934" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.2-2.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530935" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530936" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530937" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530938" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009530939" version="1" comment="webkit2gtk3-devel is &lt;2.28.2-2.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551436" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551437" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551438" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551439" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551440" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551441" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551442" version="1" comment="webkit2gtk3-devel is &lt;2.28.2-2.53.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595556" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595557" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595558" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595559" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595560" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595561" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595562" version="1" comment="webkit2gtk3-devel is &lt;2.28.2-2.53.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340775" version="1" comment="rubygem-rails-html-sanitizer is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339435" version="1" comment="python-waitress is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531810" version="1" comment="libpcre2-16-0 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531811" version="1" comment="libpcre2-32-0 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531812" version="1" comment="libpcre2-8-0 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531813" version="1" comment="libpcre2-posix2 is &lt;10.34-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531814" version="1" comment="perl-CGI is &lt;4.38-1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549152" version="1" comment="libpcre2-16-0 is &lt;10.34-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549153" version="1" comment="libpcre2-32-0 is &lt;10.34-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549154" version="1" comment="libpcre2-8-0 is &lt;10.34-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549155" version="1" comment="libpcre2-posix2 is &lt;10.34-1.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596306" version="1" comment="libpcre2-16-0 is &lt;10.34-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596307" version="1" comment="libpcre2-32-0 is &lt;10.34-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596308" version="1" comment="libpcre2-8-0 is &lt;10.34-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596309" version="1" comment="libpcre2-posix2 is &lt;10.34-1.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596301" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522638" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531668" version="1" comment="MozillaFirefox-devel is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522639" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549026" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549027" version="1" comment="MozillaFirefox-devel is &lt;68.5.0-109.106.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549028" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596151" version="1" comment="MozillaFirefox is &lt;68.5.0-109.106.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596152" version="1" comment="MozillaFirefox-devel is &lt;68.5.0-109.106.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596153" version="1" comment="MozillaFirefox-translations-common is &lt;68.5.0-109.106.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531802" version="1" comment="MozillaFirefox is &lt;68.6.1-109.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531803" version="1" comment="MozillaFirefox-devel is &lt;68.6.1-109.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531804" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-109.113.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549145" version="1" comment="MozillaFirefox is &lt;68.6.1-109.113.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549146" version="1" comment="MozillaFirefox-devel is &lt;68.6.1-109.113.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549147" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-109.113.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596298" version="1" comment="MozillaFirefox is &lt;68.6.1-109.113.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596299" version="1" comment="MozillaFirefox-devel is &lt;68.6.1-109.113.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596300" version="1" comment="MozillaFirefox-translations-common is &lt;68.6.1-109.113.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531805" version="1" comment="MozillaFirefox is &lt;68.7.0-109.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531806" version="1" comment="MozillaFirefox-devel is &lt;68.7.0-109.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531807" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-109.116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549148" version="1" comment="MozillaFirefox is &lt;68.7.0-109.116.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549149" version="1" comment="MozillaFirefox-devel is &lt;68.7.0-109.116.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549150" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-109.116.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596302" version="1" comment="MozillaFirefox is &lt;68.7.0-109.116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596303" version="1" comment="MozillaFirefox-devel is &lt;68.7.0-109.116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596304" version="1" comment="MozillaFirefox-translations-common is &lt;68.7.0-109.116.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334022" version="1" comment="python-urllib3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595623" version="1" comment="nodejs6 is &lt;6.17.1-11.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531753" version="1" comment="permissions is &lt;2015.09.28.1626-17.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552042" version="1" comment="permissions is &lt;2015.09.28.1626-17.27.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596219" version="1" comment="permissions is &lt;2015.09.28.1626-17.27.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531054" version="1" comment="tomcat is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531055" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531056" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531057" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531058" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531059" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531060" version="1" comment="tomcat-lib is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531061" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531062" version="1" comment="tomcat-webapps is &lt;8.0.53-29.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531085" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531086" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531087" version="1" comment="openldap2 is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531088" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531089" version="1" comment="openldap2-client is &lt;2.4.41-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531090" version="1" comment="openldap2-doc is &lt;2.4.41-18.71.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531091" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551521" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551522" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551523" version="1" comment="openldap2 is &lt;2.4.41-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551524" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551525" version="1" comment="openldap2-client is &lt;2.4.41-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551526" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.71.2 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595650" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595651" version="1" comment="openldap2 is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595652" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595653" version="1" comment="openldap2-client is &lt;2.4.41-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595654" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-18.71.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334167" version="1" comment="permissions is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625490" version="1" comment="cyrus-sasl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595700" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.9-9.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595701" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334393" version="1" comment="rubygem-actionpack-4_2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595950" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.9-7.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334394" version="1" comment="rubygem-actionview-4_2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531051" version="1" comment="curl is &lt;7.37.0-37.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531052" version="1" comment="libcurl4 is &lt;7.37.0-37.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531053" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551497" version="1" comment="curl is &lt;7.37.0-37.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551498" version="1" comment="libcurl4 is &lt;7.37.0-37.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551499" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595635" version="1" comment="curl is &lt;7.37.0-37.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595636" version="1" comment="libcurl4 is &lt;7.37.0-37.47.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009522651" version="1" comment="ppp is &lt;2.4.7-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009549063" version="1" comment="ppp is &lt;2.4.7-4.3.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596193" version="1" comment="ppp is &lt;2.4.7-4.3.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627796" version="1" comment="bind is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627797" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627784" version="1" comment="bind-doc is &lt;9.9.9P1-63.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627798" version="1" comment="bind-libs is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627786" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627799" version="1" comment="bind-utils is &lt;9.9.9P1-63.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531903" version="1" comment="bind is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531904" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531905" version="1" comment="bind-doc is &lt;9.9.9P1-63.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531906" version="1" comment="bind-libs is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531907" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531908" version="1" comment="bind-utils is &lt;9.9.9P1-63.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552109" version="1" comment="bind is &lt;9.9.9P1-63.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552110" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552111" version="1" comment="bind-libs is &lt;9.9.9P1-63.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552112" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552113" version="1" comment="bind-utils is &lt;9.9.9P1-63.20.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596376" version="1" comment="bind is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596377" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596378" version="1" comment="bind-libs is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596379" version="1" comment="bind-utils is &lt;9.9.9P1-63.20.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531614" version="1" comment="ucode-intel is &lt;20201118-13.81.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531172" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531173" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531174" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.4-2.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531175" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531176" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531177" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531178" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531179" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-2.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551595" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551596" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551597" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551598" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551599" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551600" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009551601" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-2.59.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595707" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595708" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595709" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595710" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595711" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595712" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009595713" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-2.59.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009140920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634688" version="1" comment="xen is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634689" version="1" comment="xen-doc-html is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634690" version="1" comment="xen-libs is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634691" version="1" comment="xen-libs-32bit is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634692" version="1" comment="xen-tools is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634693" version="1" comment="xen-tools-domU is &lt;4.7.6_16-43.79.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667937" version="1" comment="ucode-intel is &lt;20220207-13.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552210" version="1" comment="clamav is &lt;0.103.2-33.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334089" version="1" comment="libjpeg-turbo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339049" version="1" comment="postgresql10 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334198" version="1" comment="postgresql96 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347616" version="1" comment="rpm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552281" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552237" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552238" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552239" version="1" comment="libdcerpc0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552240" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552241" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552242" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552243" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552244" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552245" version="1" comment="libndr-standard0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552246" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552247" version="1" comment="libndr0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552248" version="1" comment="libndr0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552249" version="1" comment="libnetapi0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552250" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552251" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552252" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552253" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552254" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552255" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552256" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552257" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552258" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552259" version="1" comment="libsamba-util0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552260" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552261" version="1" comment="libsamdb0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552262" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552263" version="1" comment="libsmbclient0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552264" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552265" version="1" comment="libsmbconf0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552266" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552267" version="1" comment="libsmbldap0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552268" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552269" version="1" comment="libtevent-util0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552270" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552271" version="1" comment="libwbclient0 is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552272" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552273" version="1" comment="samba is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552274" version="1" comment="samba-client is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552275" version="1" comment="samba-client-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552276" version="1" comment="samba-doc is &lt;4.4.2-38.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552277" version="1" comment="samba-libs is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552278" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552279" version="1" comment="samba-winbind is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552280" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680614" version="1" comment="xen is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680615" version="1" comment="xen-doc-html is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680616" version="1" comment="xen-libs is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680617" version="1" comment="xen-libs-32bit is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680618" version="1" comment="xen-tools is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680619" version="1" comment="xen-tools-domU is &lt;4.7.6_22-43.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654414" version="1" comment="binutils is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654415" version="1" comment="binutils-devel is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654416" version="1" comment="libctf-nobfd0 is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654417" version="1" comment="libctf0 is &lt;2.37-9.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333999" version="1" comment="NetworkManager is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627947" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627948" version="1" comment="openexr is &lt;2.1.0-6.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552228" version="1" comment="libhogweed2 is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538876" version="1" comment="libhogweed2-32bit is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552229" version="1" comment="libnettle4 is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538878" version="1" comment="libnettle4-32bit is &lt;2.7.1-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531952" version="1" comment="git is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531953" version="1" comment="git-core is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531954" version="1" comment="git-cvs is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531955" version="1" comment="git-daemon is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531956" version="1" comment="git-doc is &lt;2.26.2-27.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531957" version="1" comment="git-email is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531958" version="1" comment="git-gui is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531959" version="1" comment="git-svn is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531960" version="1" comment="git-web is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531961" version="1" comment="gitk is &lt;2.26.2-27.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552142" version="1" comment="git is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552143" version="1" comment="git-core is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552144" version="1" comment="git-cvs is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552145" version="1" comment="git-daemon is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552146" version="1" comment="git-email is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552147" version="1" comment="git-gui is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552148" version="1" comment="git-svn is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552149" version="1" comment="git-web is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552150" version="1" comment="gitk is &lt;2.26.2-27.43.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596407" version="1" comment="git is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596408" version="1" comment="git-core is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596409" version="1" comment="git-cvs is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596410" version="1" comment="git-daemon is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596411" version="1" comment="git-email is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596412" version="1" comment="git-gui is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596413" version="1" comment="git-svn is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596414" version="1" comment="git-web is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596415" version="1" comment="gitk is &lt;2.26.2-27.43.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009474466" version="1" comment="python-aioeventlet is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627215" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627216" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627217" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627218" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.302-27.63.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662499" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662487" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662500" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662501" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662490" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.0-38.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662502" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662492" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662503" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662494" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.0-30.84.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552366" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552367" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552368" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552369" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.292-27.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627312" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627313" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627305" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.3-2.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627314" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627315" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627316" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627317" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627318" version="1" comment="webkit2gtk3-devel is &lt;2.32.3-2.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634387" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634388" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634365" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-2.71.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634389" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634390" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634391" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634392" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634393" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-2.71.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596311" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.9-7.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656243" version="1" comment="libecpg6 is &lt;14.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656244" version="1" comment="libpq5 is &lt;14.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656229" version="1" comment="libpq5-32bit is &lt;14.1-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656230" version="1" comment="postgresql is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656231" version="1" comment="postgresql-contrib is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656232" version="1" comment="postgresql-docs is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656233" version="1" comment="postgresql-plperl is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656234" version="1" comment="postgresql-plpython is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656235" version="1" comment="postgresql-pltcl is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656236" version="1" comment="postgresql-server is &lt;14-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656548" version="1" comment="postgresql10 is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656549" version="1" comment="postgresql10-contrib is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656534" version="1" comment="postgresql10-docs is &lt;10.19-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656550" version="1" comment="postgresql10-plperl is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656551" version="1" comment="postgresql10-plpython is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656552" version="1" comment="postgresql10-pltcl is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656553" version="1" comment="postgresql10-server is &lt;10.19-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656863" version="1" comment="postgresql96 is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656864" version="1" comment="postgresql96-contrib is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656857" version="1" comment="postgresql96-docs is &lt;9.6.24-6.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656865" version="1" comment="postgresql96-plperl is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656866" version="1" comment="postgresql96-plpython is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656867" version="1" comment="postgresql96-pltcl is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656868" version="1" comment="postgresql96-server is &lt;9.6.24-6.18.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531855" version="1" comment="sudo is &lt;1.8.10p3-10.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552073" version="1" comment="sudo is &lt;1.8.10p3-10.29.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596343" version="1" comment="sudo is &lt;1.8.10p3-10.29.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531996" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531997" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531998" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531999" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532000" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532001" version="1" comment="openssl is &lt;1.0.2j-60.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532002" version="1" comment="openssl-doc is &lt;1.0.2j-60.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552181" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.66.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552182" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.66.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552183" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552184" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.66.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552185" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552186" version="1" comment="openssl is &lt;1.0.2j-60.66.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596438" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596439" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596440" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596441" version="1" comment="openssl is &lt;1.0.2j-60.66.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552225" version="1" comment="MozillaFirefox is &lt;78.10.0-112.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552226" version="1" comment="MozillaFirefox-devel is &lt;78.10.0-112.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552227" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-112.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531925" version="1" comment="MozillaFirefox is &lt;78.8.0-112.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531926" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-112.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531927" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-112.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552123" version="1" comment="MozillaFirefox is &lt;78.8.0-112.51.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552124" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-112.51.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552125" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-112.51.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596391" version="1" comment="MozillaFirefox is &lt;78.8.0-112.51.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596392" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-112.51.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596393" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-112.51.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532003" version="1" comment="MozillaFirefox is &lt;78.9.0-112.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532004" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-112.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009532005" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-112.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552187" version="1" comment="MozillaFirefox is &lt;78.9.0-112.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552188" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-112.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552189" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-112.54.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596442" version="1" comment="MozillaFirefox is &lt;78.9.0-112.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596443" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-112.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596444" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-112.54.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552285" version="1" comment="bind is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552286" version="1" comment="bind-chrootenv is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538903" version="1" comment="bind-doc is &lt;9.9.9P1-63.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552287" version="1" comment="bind-libs is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538905" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552288" version="1" comment="bind-utils is &lt;9.9.9P1-63.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552316" version="1" comment="dhcp is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552317" version="1" comment="dhcp-client is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552318" version="1" comment="dhcp-relay is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552319" version="1" comment="dhcp-server is &lt;4.3.3-10.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552282" version="1" comment="cups is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552283" version="1" comment="cups-client is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552284" version="1" comment="cups-libs is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538900" version="1" comment="cups-libs-32bit is &lt;1.7.5-20.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615943" version="1" comment="arpwatch is &lt;2.1a15-159.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538884" version="1" comment="tomcat is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538885" version="1" comment="tomcat-admin-webapps is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538886" version="1" comment="tomcat-docs-webapp is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538887" version="1" comment="tomcat-el-3_0-api is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538888" version="1" comment="tomcat-javadoc is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538889" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538890" version="1" comment="tomcat-lib is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538891" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538892" version="1" comment="tomcat-webapps is &lt;8.0.53-29.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531902" version="1" comment="screen is &lt;4.0.4-23.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552108" version="1" comment="screen is &lt;4.0.4-23.6.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596375" version="1" comment="screen is &lt;4.0.4-23.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552382" version="1" comment="xterm is &lt;308-5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531980" version="1" comment="glib2-lang is &lt;2.48.2-12.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531981" version="1" comment="glib2-tools is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531982" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531983" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531984" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531985" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531986" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531987" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531988" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531989" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531990" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531991" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552167" version="1" comment="glib2-tools is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552168" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552169" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552170" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552171" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552172" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552173" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552174" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552175" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552176" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.22.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552177" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596429" version="1" comment="glib2-tools is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596430" version="1" comment="libgio-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596431" version="1" comment="libglib-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596432" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596433" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596434" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-12.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531818" version="1" comment="xen is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531819" version="1" comment="xen-doc-html is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531820" version="1" comment="xen-libs is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531821" version="1" comment="xen-libs-32bit is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531822" version="1" comment="xen-tools is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531823" version="1" comment="xen-tools-domU is &lt;4.7.6_14-43.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531951" version="1" comment="wpa_supplicant is &lt;2.6-15.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552141" version="1" comment="wpa_supplicant is &lt;2.6-15.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596406" version="1" comment="wpa_supplicant is &lt;2.6-15.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351411" version="1" comment="zip is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658680" version="1" comment="xen is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658681" version="1" comment="xen-doc-html is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658682" version="1" comment="xen-libs is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658683" version="1" comment="xen-libs-32bit is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658684" version="1" comment="xen-tools is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658685" version="1" comment="xen-tools-domU is &lt;4.7.6_18-43.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552350" version="1" comment="MozillaFirefox is &lt;78.11.0-112.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552351" version="1" comment="MozillaFirefox-devel is &lt;78.11.0-112.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552352" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-112.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625232" version="1" comment="MozillaFirefox is &lt;78.12.0-112.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625233" version="1" comment="MozillaFirefox-devel is &lt;78.12.0-112.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625234" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-112.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682635" version="1" comment="MozillaFirefox is &lt;91.9.0-112.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633611" version="1" comment="MozillaFirefox-branding-SLE is &lt;91-35.6.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682636" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682637" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.104.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670823" version="1" comment="libcaca0 is &lt;0.99.beta18-14.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669696" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669697" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669688" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.5-2.85.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669698" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669699" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669700" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669701" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669702" version="1" comment="webkit2gtk3-devel is &lt;2.34.5-2.85.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552353" version="1" comment="libX11-6 is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539021" version="1" comment="libX11-6-32bit is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539022" version="1" comment="libX11-data is &lt;1.6.2-12.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552354" version="1" comment="libX11-xcb1 is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539024" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-12.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552211" version="1" comment="sudo is &lt;1.8.10p3-10.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009531993" version="1" comment="sudo is &lt;1.8.10p3-10.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009124580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552178" version="1" comment="sudo is &lt;1.8.10p3-10.32.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009596435" version="1" comment="sudo is &lt;1.8.10p3-10.32.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009141090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552339" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539006" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-18.3.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552340" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552341" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552342" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552343" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552344" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552345" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552338" version="1" comment="libgstegl-1_0-0 is &lt;1.2.4-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552346" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552347" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552348" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552349" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-18.3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652164" version="1" comment="postgresql10 is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652165" version="1" comment="postgresql10-contrib is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652158" version="1" comment="postgresql10-docs is &lt;10.18-4.19.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652166" version="1" comment="postgresql10-plperl is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652167" version="1" comment="postgresql10-plpython is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652168" version="1" comment="postgresql10-pltcl is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652169" version="1" comment="postgresql10-server is &lt;10.18-4.19.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651862" version="1" comment="MozillaFirefox is &lt;91.2.0-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651863" version="1" comment="MozillaFirefox-devel is &lt;91.2.0-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651864" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-112.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009616441" version="1" comment="python3-urllib3 is &lt;1.25.10-3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552394" version="1" comment="libgcrypt20 is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539096" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552395" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539098" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651126" version="1" comment="glibc is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651115" version="1" comment="glibc-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651127" version="1" comment="glibc-devel is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651117" version="1" comment="glibc-devel-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651118" version="1" comment="glibc-html is &lt;2.22-116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651119" version="1" comment="glibc-i18ndata is &lt;2.22-116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651120" version="1" comment="glibc-info is &lt;2.22-116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651128" version="1" comment="glibc-locale is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651122" version="1" comment="glibc-locale-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651129" version="1" comment="glibc-profile is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651124" version="1" comment="glibc-profile-32bit is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651130" version="1" comment="nscd is &lt;2.22-116.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625777" version="1" comment="libsystemd0 is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625743" version="1" comment="libsystemd0-32bit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625778" version="1" comment="libudev1 is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625746" version="1" comment="libudev1-32bit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625779" version="1" comment="systemd is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625748" version="1" comment="systemd-32bit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625749" version="1" comment="systemd-bash-completion is &lt;228-150.98.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625780" version="1" comment="systemd-devel is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625781" version="1" comment="systemd-sysvinit is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625782" version="1" comment="udev is &lt;228-150.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338902" version="1" comment="grub2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679550" version="1" comment="dnsmasq is &lt;2.78-18.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627134" version="1" comment="python-Pillow is &lt;2.8.1-4.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009350632" version="1" comment="libmicrohttpd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552289" version="1" comment="avahi is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538952" version="1" comment="avahi-lang is &lt;0.6.32-32.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552290" version="1" comment="avahi-utils is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552291" version="1" comment="libavahi-client3 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538955" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552292" version="1" comment="libavahi-common3 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538957" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552293" version="1" comment="libavahi-core7 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552294" version="1" comment="libavahi-glib1 is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538960" version="1" comment="libavahi-glib1-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552295" version="1" comment="libdns_sd is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538962" version="1" comment="libdns_sd-32bit is &lt;0.6.32-32.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552208" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552209" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552396" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552397" version="1" comment="openexr is &lt;2.1.0-6.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633904" version="1" comment="apache2 is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633898" version="1" comment="apache2-doc is &lt;2.4.23-29.80.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633905" version="1" comment="apache2-example-pages is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633906" version="1" comment="apache2-prefork is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633907" version="1" comment="apache2-utils is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633908" version="1" comment="apache2-worker is &lt;2.4.23-29.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552315" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552312" version="1" comment="libxml2-2 is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538983" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009538984" version="1" comment="libxml2-doc is &lt;2.9.4-46.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552313" version="1" comment="libxml2-tools is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552314" version="1" comment="python-libxml2 is &lt;2.9.4-46.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334391" version="1" comment="rubygem-nokogiri is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656897" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656898" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656899" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656900" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.321-43.53.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657044" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657045" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657046" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657047" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.312-27.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552335" version="1" comment="libpolkit0 is &lt;0.113-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552336" version="1" comment="polkit is &lt;0.113-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552337" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552363" version="1" comment="caribou-common is &lt;0.4.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552364" version="1" comment="libcaribou0 is &lt;0.4.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552365" version="1" comment="typelib-1_0-Caribou-1_0 is &lt;0.4.21-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009129815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626114" version="1" comment="linuxptp is &lt;1.4-15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552386" version="1" comment="libhogweed2 is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539091" version="1" comment="libhogweed2-32bit is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009552387" version="1" comment="libnettle4 is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009539093" version="1" comment="libnettle4-32bit is &lt;2.7.1-13.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009126096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625003" version="1" comment="qemu is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625004" version="1" comment="qemu-block-curl is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625005" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625006" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625007" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625008" version="1" comment="qemu-ipxe is &lt;1.0.0-41.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625009" version="1" comment="qemu-kvm is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625010" version="1" comment="qemu-lang is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625011" version="1" comment="qemu-seabios is &lt;1.9.1_0_gb3ef39f-41.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625012" version="1" comment="qemu-sgabios is &lt;8-41.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625013" version="1" comment="qemu-tools is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625014" version="1" comment="qemu-vgabios is &lt;1.9.1_0_gb3ef39f-41.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625015" version="1" comment="qemu-x86 is &lt;2.6.2-41.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627946" version="1" comment="libdjvulibre21 is &lt;3.5.25.3-5.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630872" version="1" comment="fetchmail is &lt;6.3.26-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630873" version="1" comment="fetchmailconf is &lt;6.3.26-13.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630393" version="1" comment="libcares2 is &lt;1.9.1-9.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632419" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632420" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632401" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632421" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632403" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632422" version="1" comment="openssl is &lt;1.0.2j-60.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632405" version="1" comment="openssl-doc is &lt;1.0.2j-60.72.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677611" version="1" comment="libblkid1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677612" version="1" comment="libblkid1-32bit is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677613" version="1" comment="libfdisk1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677614" version="1" comment="libmount1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677615" version="1" comment="libmount1-32bit is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677616" version="1" comment="libsmartcols1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677617" version="1" comment="libuuid1 is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677618" version="1" comment="libuuid1-32bit is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677619" version="1" comment="python-libmount is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677620" version="1" comment="util-linux is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677621" version="1" comment="util-linux-lang is &lt;2.28-44.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677622" version="1" comment="util-linux-systemd is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677623" version="1" comment="uuidd is &lt;2.28-44.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632780" version="1" comment="ghostscript is &lt;9.52-23.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632781" version="1" comment="ghostscript-devel is &lt;9.52-23.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632782" version="1" comment="ghostscript-x11 is &lt;9.52-23.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632783" version="1" comment="libspectre-devel is &lt;0.2.7-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632784" version="1" comment="libspectre1 is &lt;0.2.7-12.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631542" version="1" comment="cpio is &lt;2.11-36.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631541" version="1" comment="cpio-lang is &lt;2.11-36.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655637" version="1" comment="MozillaFirefox is &lt;91.3.0-112.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655638" version="1" comment="MozillaFirefox-devel is &lt;91.3.0-112.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655639" version="1" comment="MozillaFirefox-translations-common is &lt;91.3.0-112.80.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631842" version="1" comment="openstack-neutron-doc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673031" version="1" comment="glibc is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673010" version="1" comment="glibc-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673032" version="1" comment="glibc-devel is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673012" version="1" comment="glibc-devel-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673013" version="1" comment="glibc-html is &lt;2.22-119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673014" version="1" comment="glibc-i18ndata is &lt;2.22-119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673015" version="1" comment="glibc-info is &lt;2.22-119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673033" version="1" comment="glibc-locale is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673017" version="1" comment="glibc-locale-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673034" version="1" comment="glibc-profile is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673019" version="1" comment="glibc-profile-32bit is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673035" version="1" comment="nscd is &lt;2.22-119.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659889" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659890" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660798" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-76.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660799" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-76.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664690" version="1" comment="libpolkit0 is &lt;0.113-5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664691" version="1" comment="polkit is &lt;0.113-5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664692" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660148" version="1" comment="log4j is &lt;1.2.15-126.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663799" version="1" comment="MozillaFirefox is &lt;91.5.0-112.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663800" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-112.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663801" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-112.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662498" version="1" comment="libsndfile1 is &lt;1.0.25-36.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662485" version="1" comment="libsndfile1-32bit is &lt;1.0.25-36.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658348" version="1" comment="openssh is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658349" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658350" version="1" comment="openssh-fips is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658351" version="1" comment="openssh-helpers is &lt;7.2p2-74.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652805" version="1" comment="strongswan is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652801" version="1" comment="strongswan-doc is &lt;5.1.3-26.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652806" version="1" comment="strongswan-hmac is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652807" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652808" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657339" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657340" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657332" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-2.74.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657341" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657342" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657343" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657344" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657345" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-2.74.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653628" version="1" comment="opensc is &lt;0.13.0-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659103" version="1" comment="libfreebl3 is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659086" version="1" comment="libfreebl3-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659104" version="1" comment="libfreebl3-hmac is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659088" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659105" version="1" comment="libsoftokn3 is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659090" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659106" version="1" comment="libsoftokn3-hmac is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659092" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659107" version="1" comment="mozilla-nss is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659094" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659108" version="1" comment="mozilla-nss-certs is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659096" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659109" version="1" comment="mozilla-nss-sysinit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659099" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659110" version="1" comment="mozilla-nss-tools is &lt;3.68.1-58.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659444" version="1" comment="MozillaFirefox is &lt;91.4.0-112.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659445" version="1" comment="MozillaFirefox-devel is &lt;91.4.0-112.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659446" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-112.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666238" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666239" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666240" version="1" comment="libdcerpc0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666241" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666242" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666243" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666244" version="1" comment="libndr-nbt0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666245" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666246" version="1" comment="libndr-standard0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666247" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666248" version="1" comment="libndr0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666249" version="1" comment="libndr0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666250" version="1" comment="libnetapi0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666251" version="1" comment="libnetapi0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666252" version="1" comment="libsamba-credentials0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666253" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666254" version="1" comment="libsamba-errors0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666255" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666256" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666257" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666258" version="1" comment="libsamba-passdb0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666259" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666260" version="1" comment="libsamba-util0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666261" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666262" version="1" comment="libsamdb0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666263" version="1" comment="libsamdb0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666264" version="1" comment="libsmbclient0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666265" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666266" version="1" comment="libsmbconf0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666267" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666268" version="1" comment="libsmbldap0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666269" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666270" version="1" comment="libtevent-util0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666271" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666272" version="1" comment="libwbclient0 is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666273" version="1" comment="libwbclient0-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666274" version="1" comment="samba is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666275" version="1" comment="samba-client is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666276" version="1" comment="samba-client-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666277" version="1" comment="samba-doc is &lt;4.4.2-38.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666278" version="1" comment="samba-libs is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666279" version="1" comment="samba-libs-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666280" version="1" comment="samba-winbind is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666281" version="1" comment="samba-winbind-32bit is &lt;4.4.2-38.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663078" version="1" comment="apache2 is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663071" version="1" comment="apache2-doc is &lt;2.4.23-29.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663079" version="1" comment="apache2-example-pages is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663080" version="1" comment="apache2-prefork is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663081" version="1" comment="apache2-utils is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663082" version="1" comment="apache2-worker is &lt;2.4.23-29.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664933" version="1" comment="strongswan is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664929" version="1" comment="strongswan-doc is &lt;5.1.3-26.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664934" version="1" comment="strongswan-hmac is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664935" version="1" comment="strongswan-ipsec is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664936" version="1" comment="strongswan-libs0 is &lt;5.1.3-26.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664239" version="1" comment="aide is &lt;0.16-20.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679304" version="1" comment="kernel-default is &lt;4.4.121-92.172.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679305" version="1" comment="kernel-default-base is &lt;4.4.121-92.172.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679306" version="1" comment="kernel-default-devel is &lt;4.4.121-92.172.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679307" version="1" comment="kernel-devel is &lt;4.4.121-92.172.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679308" version="1" comment="kernel-macros is &lt;4.4.121-92.172.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679309" version="1" comment="kernel-source is &lt;4.4.121-92.172.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679310" version="1" comment="kernel-syms is &lt;4.4.121-92.172.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664107" version="1" comment="expat is &lt;2.1.0-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664108" version="1" comment="libexpat1 is &lt;2.1.0-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664105" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667335" version="1" comment="libvirglrenderer0 is &lt;0.5.0-12.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676877" version="1" comment="openvpn is &lt;2.3.8-16.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676878" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673055" version="1" comment="libopenssl-devel is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673056" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673023" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673057" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673025" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673058" version="1" comment="openssl is &lt;1.0.2j-60.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673027" version="1" comment="openssl-doc is &lt;1.0.2j-60.75.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678497" version="1" comment="MozillaFirefox is &lt;91.8.0-112.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678498" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-112.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678499" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-112.98.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678285" version="1" comment="libfreebl3 is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678251" version="1" comment="libfreebl3-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678286" version="1" comment="libfreebl3-hmac is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678253" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678287" version="1" comment="libsoftokn3 is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678255" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678288" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678257" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678289" version="1" comment="mozilla-nss is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678259" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678290" version="1" comment="mozilla-nss-certs is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678261" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678291" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678264" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678292" version="1" comment="mozilla-nss-tools is &lt;3.68.3-58.69.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682638" version="1" comment="gzip is &lt;1.6-9.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679302" version="1" comment="liblzma5 is &lt;5.0.5-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679278" version="1" comment="liblzma5-32bit is &lt;5.0.5-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679303" version="1" comment="xz is &lt;5.0.5-6.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679280" version="1" comment="xz-lang is &lt;5.0.5-6.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682319" version="1" comment="e2fsprogs is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682320" version="1" comment="libcom_err2 is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682310" version="1" comment="libcom_err2-32bit is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682321" version="1" comment="libext2fs2 is &lt;1.42.11-16.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664693" version="1" comment="clamav is &lt;0.103.5-33.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009683677" version="1" comment="ucode-intel is &lt;20220510-13.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674029" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674007" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674030" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674031" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674010" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr5.5-38.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674027" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674003" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674028" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674005" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.5-30.87.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672567" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672568" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672569" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672570" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.322-27.72.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681316" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681317" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681309" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.0-2.96.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681318" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681319" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681320" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681321" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681322" version="1" comment="webkit2gtk3-devel is &lt;2.36.0-2.96.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670816" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670817" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670802" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.6-2.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670818" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670819" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670820" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670821" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670822" version="1" comment="webkit2gtk3-devel is &lt;2.34.6-2.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673758" version="1" comment="apache2 is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673736" version="1" comment="apache2-doc is &lt;2.4.23-29.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673759" version="1" comment="apache2-example-pages is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673760" version="1" comment="apache2-prefork is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673761" version="1" comment="apache2-utils is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673762" version="1" comment="apache2-worker is &lt;2.4.23-29.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668887" version="1" comment="MozillaFirefox is &lt;91.6.0-112.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668888" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-112.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668889" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-112.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666228" version="1" comment="xen is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666229" version="1" comment="xen-doc-html is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666230" version="1" comment="xen-libs is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666231" version="1" comment="xen-libs-32bit is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666232" version="1" comment="xen-tools is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666233" version="1" comment="xen-tools-domU is &lt;4.7.6_20-43.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664687" version="1" comment="log4j is &lt;1.2.15-126.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680015" version="1" comment="libxml2-2 is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679983" version="1" comment="libxml2-2-32bit is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679984" version="1" comment="libxml2-doc is &lt;2.9.4-46.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680016" version="1" comment="libxml2-tools is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680017" version="1" comment="python-libxml2 is &lt;2.9.4-46.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667934" version="1" comment="xerces-j2 is &lt;2.8.1-268.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667935" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-268.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667936" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-268.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666236" version="1" comment="expat is &lt;2.1.0-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666237" version="1" comment="libexpat1 is &lt;2.1.0-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666209" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669342" version="1" comment="cyrus-sasl is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669310" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669343" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669312" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669344" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669345" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669315" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669346" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669317" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669347" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669319" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669348" version="1" comment="libsasl2-3 is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669321" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-8.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680006" version="1" comment="git is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680007" version="1" comment="git-core is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680008" version="1" comment="git-cvs is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680009" version="1" comment="git-daemon is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679999" version="1" comment="git-doc is &lt;2.26.2-27.52.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680010" version="1" comment="git-email is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680011" version="1" comment="git-gui is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680012" version="1" comment="git-svn is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680013" version="1" comment="git-web is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680014" version="1" comment="gitk is &lt;2.26.2-27.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669382" version="1" comment="expat is &lt;2.1.0-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669383" version="1" comment="libexpat1 is &lt;2.1.0-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669384" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671277" version="1" comment="expat is &lt;2.1.0-21.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671278" version="1" comment="libexpat1 is &lt;2.1.0-21.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671275" version="1" comment="libexpat1-32bit is &lt;2.1.0-21.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672571" version="1" comment="MozillaFirefox is &lt;91.7.0-112.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672572" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-112.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672573" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-112.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671783" version="1" comment="MozillaFirefox is &lt;91.6.1-112.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671784" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-112.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671785" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-112.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681235" version="1" comment="cifs-utils is &lt;6.9-9.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684081" version="1" comment="curl is &lt;7.37.0-37.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684082" version="1" comment="libcurl4 is &lt;7.37.0-37.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684074" version="1" comment="libcurl4-32bit is &lt;7.37.0-37.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682642" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682621" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682643" version="1" comment="openldap2 is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682644" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682645" version="1" comment="openldap2-client is &lt;2.4.41-18.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682625" version="1" comment="openldap2-doc is &lt;2.4.41-18.89.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684083" version="1" comment="MozillaFirefox is &lt;91.9.0-112.108.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684084" version="1" comment="MozillaFirefox-devel is &lt;91.9.0-112.108.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684085" version="1" comment="MozillaFirefox-translations-common is &lt;91.9.0-112.108.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334203" version="1" comment="mariadb is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334051" version="1" comment="ruby2.1 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334334" version="1" comment="NetworkManager is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334475" version="1" comment="axis is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334655" version="1" comment="unrar is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334695" version="1" comment="rubygem-rack is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334476" version="1" comment="xrdp is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334402" version="1" comment="rubygem-nokogiri is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339425" version="1" comment="xtrabackup is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334694" version="1" comment="nodejs6 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338032" version="1" comment="kernel-default is &gt;0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333995" version="1" comment="kernel-source is &gt;0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685552" version="1" comment="rubygem-actionmailer-4_2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685553" version="1" comment="rubygem-actionpack-4_2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334085" version="1" comment="zsh is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685554" version="1" comment="rubygem-railties-4_2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334676" version="1" comment="ansible is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334480" version="1" comment="unzip is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685555" version="1" comment="rubygem-actionview-4_2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685556" version="1" comment="rubygem-activejob-4_2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685557" version="1" comment="rubygem-activemodel-4_2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348062" version="1" comment="rubygem-activerecord-4_2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685558" version="1" comment="rubygem-activesupport-4_2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334405" version="1" comment="rubygem-rails-4_2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334577" version="1" comment="dnsmasq is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333982" version="1" comment="sqlite3 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685234" version="1" comment="conntrack-tools is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334570" version="1" comment="freeradius-server is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334041" version="1" comment="libarchive is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334078" version="1" comment="ruby is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334206" version="1" comment="libqt5-qtbase is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334502" version="1" comment="qpdf is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339358" version="1" comment="openstack-nova is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334002" version="1" comment="lcms2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334045" version="1" comment="glibc is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334486" version="1" comment="texlive is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334529" version="1" comment="elfutils is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334176" version="1" comment="openssh is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334312" version="1" comment="patch is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334028" version="1" comment="samba is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334688" version="1" comment="python-Django is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334013" version="1" comment="MozillaFirefox is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333930" version="1" comment="tiff is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338898" version="1" comment="libjansson is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334188" version="1" comment="bluez is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334495" version="1" comment="perl-XML-Twig is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334493" version="1" comment="jasper is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334067" version="1" comment="webkitgtk3 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334036" version="1" comment="libQtWebKit4 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338940" version="1" comment="libgsf is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334653" version="1" comment="libnl-1_1 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334647" version="1" comment="libnl3 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334164" version="1" comment="python is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334667" version="1" comment="evince is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339394" version="1" comment="kibana is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334500" version="1" comment="vim is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334237" version="1" comment="emacs is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334300" version="1" comment="ImageMagick is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338952" version="1" comment="libao is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685559" version="1" comment="python-supervisor is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338970" version="1" comment="libquicktime is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334654" version="1" comment="libapr1 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334373" version="1" comment="xerces-c is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334032" version="1" comment="libpng15 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334150" version="1" comment="binutils is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338978" version="1" comment="gedit is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334082" version="1" comment="libvorbis is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334183" version="1" comment="dovecot22 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334027" version="1" comment="exiv2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334510" version="1" comment="openexr is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334656" version="1" comment="libtcnative-1-0 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334235" version="1" comment="apache2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338833" version="1" comment="busybox is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334512" version="1" comment="xorg-x11-libs is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334047" version="1" comment="gdb is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334515" version="1" comment="openslp is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334563" version="1" comment="exempi is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334490" version="1" comment="libxml2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334072" version="1" comment="poppler is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334518" version="1" comment="python-PyYAML is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334671" version="1" comment="ed is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009340773" version="1" comment="zookeeper is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334519" version="1" comment="netpbm is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334521" version="1" comment="gtk-vnc is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334522" version="1" comment="gtk-vnc2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334066" version="1" comment="apparmor is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334524" version="1" comment="NetworkManager-gnome is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334525" version="1" comment="flac is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333973" version="1" comment="pcre is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334658" version="1" comment="libsamplerate is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334531" version="1" comment="libcroco is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341644" version="1" comment="crowbar-openstack is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334358" version="1" comment="oniguruma is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334162" version="1" comment="libzypp is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334340" version="1" comment="zypper is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334532" version="1" comment="gnuplot is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338992" version="1" comment="libmtp is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334540" version="1" comment="libgxps is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334018" version="1" comment="openssl is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334534" version="1" comment="memcached is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334020" version="1" comment="curl is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334558" version="1" comment="libtasn1 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334356" version="1" comment="ghostscript is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334537" version="1" comment="rzsz is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334538" version="1" comment="graphviz is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334000" version="1" comment="xen is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334541" version="1" comment="strongswan is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334170" version="1" comment="spice is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334604" version="1" comment="spice-gtk is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334015" version="1" comment="qemu is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334088" version="1" comment="PackageKit is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334168" version="1" comment="squid is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333959" version="1" comment="libjpeg-turbo is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333960" version="1" comment="libjpeg62-turbo is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334103" version="1" comment="java-1_7_1-ibm is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334104" version="1" comment="java-1_8_0-ibm is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334551" version="1" comment="gettext-runtime is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334503" version="1" comment="libsndfile is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341598" version="1" comment="libqt5-qtsvg is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341602" version="1" comment="libqt5-qtimageformats is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684537" version="1" comment="libwebp is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334216" version="1" comment="ucode-intel is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685560" version="1" comment="rubygem-sprockets-2_12 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334148" version="1" comment="openjpeg2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333968" version="1" comment="bind is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334559" version="1" comment="w3m is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334549" version="1" comment="perl is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334545" version="1" comment="ntp is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334562" version="1" comment="unixODBC is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334565" version="1" comment="openvpn is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334567" version="1" comment="apache-commons-beanutils is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334139" version="1" comment="postgresql96 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334005" version="1" comment="spamassassin is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334152" version="1" comment="ovmf is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334576" version="1" comment="ibus is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348061" version="1" comment="rubygem-activerecord-session_store is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334585" version="1" comment="sudo is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334662" version="1" comment="aspell is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334160" version="1" comment="python3 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334590" version="1" comment="libssh2_org is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334506" version="1" comment="webkit2gtk3 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334602" version="1" comment="targetcli-fb is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333989" version="1" comment="tomcat is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334638" version="1" comment="trousers is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334629" version="1" comment="mozilla-nss is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334606" version="1" comment="spice-vdagent is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334130" version="1" comment="LibVNCServer is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334211" version="1" comment="openldap2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334501" version="1" comment="tcpdump is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339282" version="1" comment="lvm2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334603" version="1" comment="cifs-utils is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334615" version="1" comment="stunnel is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009343418" version="1" comment="xterm is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334489" version="1" comment="wpa_supplicant is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334201" version="1" comment="libX11 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334065" version="1" comment="gstreamer-plugins-bad is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338879" version="1" comment="avahi is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334030" version="1" comment="xorg-x11-server is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-openstack-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler44</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-p2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xlockmore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-cups-browsed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-foomatic-rip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>res-signingkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_1-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests-kerberos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-chardet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMClient-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NetworkManager-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-core-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-openstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-monasca-ui-drilldown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-monasca-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-log-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-dhcp-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ha-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-l3-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-linuxbridge-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-macvtap-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metadata-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metering-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-openvswitch-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-monasca-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-log-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ruby-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-natel-discrete-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-evaluator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-expirer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-listener</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-aodh-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-keystone-listener</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-retry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-barbican-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-carbonara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-indexer-sqlalchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-metricd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-gnocchi-statsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cfn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cloudwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-plugin-heat_docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-magnum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-share</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-monasca-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-murano-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpn-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vyatta-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cells</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-consoleauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-novncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-placement-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-serialproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-vncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-aodh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-barbican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gnocchi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-monasca-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-murano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-crowbar-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-easy_diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-ppc64le</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleshammer-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquagga_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzebra1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionmailer-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionpack-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activejob-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activemodel-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activesupport-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-railties-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradosstriper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-XStatic-jquery-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-ha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Twig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstegl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monasca-installer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kibana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard-theme-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-psql2mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-psutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>release-notes-suse-openstack-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activeresource</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-json-1_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zookeeper-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caasp-openstack-heat-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>galera-python-clustercheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-ipmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-collector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-polling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-gbp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyKMIP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-heat-gbp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>galera-3-wsrep-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-cloud-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.messaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-haml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-mysql2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrabackup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-session_store</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kafka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>couchdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-92_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-92_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_85-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-user-dirs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-designate-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-designate-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SuSEfirewall2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-yajl-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_146-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.concurrency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.middleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.serialization</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.versionedobjects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.vmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslotest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tablib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gtk-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>selinux-policy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>selinux-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>selinux-policy-minimum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapparmor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-glare</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm-nimbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>storm-supervisor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-92_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-ffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-amqp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xattr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sinatra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logstash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-os-vif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-6-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-loofah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-octavia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hostinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sprockets-2_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql96-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rest-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_135-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shared-python-startup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_149-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-ispell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-futures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rtslib-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua51</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_121-92_152-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-aioeventlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaribou0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Caribou-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-railties-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activejob-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libao</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-supervisor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zookeeper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oniguruma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-session_store</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009079458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">0</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-181.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-181.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">7</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-14.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-1.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-30.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7.392</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-7.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1.178</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-14.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-49.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5.429</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-57.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-5.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-70.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-18.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.17-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.3-15.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.0_12-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-353.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-724.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-4.221</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-37.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.84.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.39-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-16.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-117.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.265</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-3.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-4.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-24.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-3.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.498</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.4-33.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.36-11.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.32.4-14.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-120.238</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.30-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.18-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-778.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.641_ge4ef6e9-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29.1-9.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-255.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.4-14.216</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2018.4.16-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1574788924.e4a6aeb0c-9.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1574869671.9c7bade2d-9.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.5~dev3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1~dev18-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3~dev3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-104.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.50-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.71-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.53-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.53-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.53-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.16-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-30.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-30.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.20-30.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.36-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3.0-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1600767499.0615a418f-9.69.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1599037255.25b759234-9.74.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.9-1.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5~dev2-2.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5~dev2-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev9-2.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev9-2.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.5~dev6-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7~dev1-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7~dev10-5.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7~dev10-5.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.5~dev3-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2~dev7-14.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2~dev7-14.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev30-4.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev30-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1~dev4-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev21-7.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev21-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1~dev8-5.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.2~dev3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-7.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-122.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_04-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1570463621.40b11cd48-9.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1569429513.e7016b2b6-9.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-1.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.3~dev9-7.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.2~dev11-4.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.1~a0~dev177-4.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.32.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-0.18.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.161-43.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.15-38.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.5-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.5-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.151-27.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.2.0esr-108.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-23.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.15-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.8-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.021-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p11-64.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.57-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.9.0esr-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.0-109.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.28-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.28-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.5-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.4+git.1481215985.12b091b-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.0esr-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.3-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.21-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.21-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.37-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-44.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.29-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.29-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2~a0~dev20-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2~a0~dev20-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_02-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1528801103.f5708341-7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1534246408.3ab19c567-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1533750802.5768e73-4.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1604938545.30c10db18-9.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0+git.1533844061.4ac8e723-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.109.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:044-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.43-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.10.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.2-3.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-12.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.6.2-4.12.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p10-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170912_10.45-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_03-43.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.5-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.5-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.5-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.38-29.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.38-29.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.38-29.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.22-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1_06-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-3.3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3.0-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1580209654.1d112d31f-9.66.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1585316203.d6ad2c8-4.52.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1589804581.9972163f0-9.71.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.17-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180608_12.47-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.2-5.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev30-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~dev30-4.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2~dev5-4.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2~dev5-4.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.1~a0~dev177-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0+git.1589351878.4ef877c-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.20180803-3.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-61.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.11.1-11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.5.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+git.1553079189.3bf8922-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1551088848.823bcaa3-7.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1556285635.ab602dd4d-9.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1556181005.47c643d-4.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1554887450.ff7c30c1c-9.51.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0+git.1506329536.8f5878c-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1~dev4-4.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1~dev1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-7.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+git.1560518045.ad7dc6d-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1573109906.0f62e9503-9.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1573038068.1e32b3205-9.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0+git.1547500033.d0fb2bf2-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.25-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.25-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2016.2-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1515995585.81ed236-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20170124-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-38.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.10-38.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.10-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.10-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.144-27.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.33-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.3.23-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.15-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.15-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.10-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0019-6.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8-48.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.18-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1616146720.44daffca0-9.81.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.4-1.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.6-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180608_12.47-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-11.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.2-3.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.58-15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.5-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.15-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.3-33.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4~a0~dev1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.43-29.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.2-2.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.120-92.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-11.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.9-48.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_04-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.3-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.2-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-25.12.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-25.12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.6-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-8.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.114-92.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.5~dev6-4.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2~dev1-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.2~dev21-7.27.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.2~dev11-4.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4_02-43.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3_06-43.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.4_06-43.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.312-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.50-29.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-17.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.10~dev13-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.10~dev13-4.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.4-58.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.19-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2.2esr-109.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-19.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20160518_1.9.4-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22-269.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5e-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-48.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-44.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.12-48.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.13-48.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.90-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-62.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.121_92.92-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.18.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.66.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.6-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.2-3.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-4.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.29.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.11-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.0-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.141-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.30-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.30-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.31-29.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.131-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.32-29.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.7-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.5-15.3.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.5_k4.4.114_92.67-15.3.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180312-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.5_02-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.5_04-43.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.103-92.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-17.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-12.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20140730-36.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-20.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_02-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0~git.1456906198.f422461-16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev7-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.5~a0~dev1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.4~a0~dev2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.1~a0~dev6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev4-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.2~a0~dev2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.2~a0~dev2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2~a0~dev22-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1~a0~dev27-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.6~a0~dev16-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.6~a0~dev16-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.15.2-27.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.30-18.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.12-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.2-16.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.15-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.43.0-16.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.13-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_04-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.3.0esr-109.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.4.0esr-109.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.29.5-58.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.5.0esr-109.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.4-77.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.2_06-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-103.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-103.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-103.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-149.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-18.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-18.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-18.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.20-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.45-18.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.4-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:044.1-109.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.39-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.1-33.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-58.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.20-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.4.0esr-109.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.4-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.16.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.9-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0+git.1539592188.13e5d0f-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0.0-4.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32-9.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.5_02-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.16-21.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.17-21.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.8-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.4-34.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1_k4.4.121_92.95-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.5-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-21.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-21.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.19-21.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.10-3.22.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.221-43.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.40-38.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.40-30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.212-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-48.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-44.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_02-43.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.24-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-48.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.1-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.2.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180608_12.47-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190618-13.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p12-64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.9.0esr-109.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.3.0-109.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.37-52.23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.37-52.23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.37-52.23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.38-52.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.38-52.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.38-52.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+git.1540887180.64bfde8-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.30-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-38.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-30.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-38.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-30.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.201-43.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.35-38.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.25-30.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.191-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-30.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-30.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.25-38.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.15-30.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.6~dev4-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7~dev10-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2~dev1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.3~dev9-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.0.11~dev13-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-33.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.2-33.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_05-43.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.25-23.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.11-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0dev-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2~dev5-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.6.1esr-109.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.41.1-58.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.5.0esr-109.58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60-32.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_05-43.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.30-30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-19.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0-95.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.36-2.27.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-27.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.54-18.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.8-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.34-29.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.171-43.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.20-38.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.10-30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.10-30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.161-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.35-29.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.181-43.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.171-27.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.181-27.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20180807-13.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_04-43.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1534254269.ce598a9fe-9.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.4-2.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.5-2.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.6.0esr-109.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.7.3esr-109.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-109.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.0esr-109.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.8.1esr-109.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.66.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.14.3-11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.18.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9-1.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-21.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-21.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-21.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.24-21.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.15-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.45-38.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr5.35-30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.1-2.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20191112a-13.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-160.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.0-109.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.1-109.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.1-109.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.1-109.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.7.2-109.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.1-58.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.1.0-109.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68-32.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.47.1-58.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.23-19.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.3.0-109.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-38.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-38.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.50-38.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_06-43.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-44.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.1-9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-33.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-33.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-30.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-33.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.0-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-17.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.3-27.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.1+r275327-1.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2015+git1462940744.321151f-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.13-15.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.27-23.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.0-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.1-11.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-18.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1_0_gb3ef39f-41.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1578392992.fabfd186c-9.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0+git.1579171175.d53ab6363-9.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.1-7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.1-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.13-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-58.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-19.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.4.1-109.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-126.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.0-30.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.0-30.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.0-30.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.70-38.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.100.3-33.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.28-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.22-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.11-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200207.5feb6c1-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-28.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|ppc64le|s390|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|s390|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-27.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.57-18.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.57-18.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-27.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.57-18.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.2-27.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.57-18.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.37-2.27.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.21.4-27.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-109.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-109.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.0-109.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.326-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.6.2-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-31.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.6.1-18.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.222-27.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.241-43.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-38.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-38.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.55-38.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-30.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-30.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-30.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.40.2-29.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.5-30.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.5-30.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.5-30.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.1-104.9.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-104.9.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14-21.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.26a-23.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.6-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.19-3.12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.14-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.4-2.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.13-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-28.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-83.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-18.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009122943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.36-18.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009131848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009128366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200602-13.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_10-43.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-113.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:52.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.2-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15+git47-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_08-43.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1_0_gb3ef39f-41.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20170530-21.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-109.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-109.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.8.0-109.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-58.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-19.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-112.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-35.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-112.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-35.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-112.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-35.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-109.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-109.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-109.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.36-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.36-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.36-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-2.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.1-2.63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-2.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.20-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31-9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.7-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02-115.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.628-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-15.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-27.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.271-43.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.271-43.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.271-43.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.281-43.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-30.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.281-43.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-30.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.281-43.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.75-38.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-30.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-30.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-27.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-30.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-27.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.80-38.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-30.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-27.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.17-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-112.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-112.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-112.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-112.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-112.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.2.0-112.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-112.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-112.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-112.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-112.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009125799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-115.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-27.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.21-26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-112.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-112.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-112.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-112.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-112.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-112.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-112.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-112.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-112.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-54.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.12-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.17-3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-26.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.0-29.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-71.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.31-19.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210525-13.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-17.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.13-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.9-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.9-17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.251-43.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.60-38.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-27.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-3.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009127681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.65-38.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-112.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-112.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-112.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-112.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-27.45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-27.45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-27.45.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-43.38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-43.38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.261-43.38.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-25.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_12-43.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.900.14-195.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.5-40.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.152.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-22.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-55.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_14-43.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.11-25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1_0_gb3ef39f-41.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.60.99-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.38-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.34-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.5.0-109.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-109.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-109.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.6.1-109.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-109.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-109.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.7.0-109.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.17.1-11.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2015.09.28.1626-17.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-18.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201118-13.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009140920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-2.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_16-43.79.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220207-13.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_22-43.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-9.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-27.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.0-38.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.0-30.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-27.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-2.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.24-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.24-6.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-112.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-112.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-112.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-112.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-112.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-112.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-112.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-63.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.5-20.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-159.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.53-29.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:308-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_14-43.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_18-43.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-112.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-112.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-35.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta18-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.5-2.85.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.5-2.85.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-12.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009124580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009141090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-10.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.3-18.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.18-4.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.18-4.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-112.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:228-150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.32-32.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0.321-43.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-27.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009129815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009126096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1_0_gb3ef39f-41.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-41.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25.3-5.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-44.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-23.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.7-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11-36.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-112.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22-119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-76.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.113-5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-126.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-112.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.25-36.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2p2-74.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.74.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-2.74.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-58.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-112.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-38.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.3-26.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.121-92.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-12.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2j-60.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-112.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-58.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.5-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.11-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-33.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220510-13.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr5.5-38.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.5-30.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-27.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-2.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-2.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.23-29.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-112.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.6_20-43.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-126.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-46.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-268.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-27.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-112.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-112.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.37.0-37.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-112.108.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009079459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than">0:0-0</evr>
  </rpminfo_state>
</states>
</oval_definitions>
